®
Secure Perfect
Access Control and Integrated
Security Management System
User Manual
imagination at work
READ ME FIRST!
The content of this User Manual was generated from the Secure Perfect 6.1.1
Online Help system.
1. Books
sections
, as displayed in the Online Help, Contents, have become
in this document.
2. Hyperlink locations throughout this Guide display in green text.
3. Reference Topics (displayed as hyperlinks in the Online Help System)
can be accessed in this document as well, using typical Adobe PDF
navigation, including the Adobe Acrobat bookmark navigation pane.
4. We encourage you to take advantage of the Adobe Reader Search icons
, when navigating this manual.
5. ‘Show me’ video demonstration files can be executed and viewed from
the Secure Perfect Online Help ONLY.
6. Increase or decrease the page magnification
prefer for your personal use.
as you
Secure Perfect 6.1.1 User Manual
1
Secure Perfect 6.1.1 User Manual
2
Table of Contents
Welcome........................................................................................................................... 13
What's New?..................................................................................................................... 14
Client/Server Architecture................................................................................................. 17
Getting Started.................................................................................................................. 18
Navigation.................................................................................................................. 19
Log On/Log Off or Shut Down .......................................................................................... 19
Navigational Conventions ................................................................................................. 20
Frequently Performed Tasks.................................................................................... 23
Tasks and Functions You Will Perform Frequently .......................................................... 23
Operations Menu....................................................................................................... 24
Activity Monitoring............................................................................................................. 24
Overview ..................................................................................................................................24
Activity Monitoring Using the Activity Monitor Form..................................................................24
Alarm Graphics Functions................................................................................................. 27
Alarm Graphics Editor ..............................................................................................................27
Alarm Graphics Viewer.............................................................................................................28
Alarm Monitoring...............................................................................................................29
Overview ..................................................................................................................................29
Alarm Monitoring Using the Alarm Monitor Form......................................................................30
Changing Operator Password........................................................................................... 32
Change Password....................................................................................................................32
Client Monitoring............................................................................................................... 33
Client Monitoring ......................................................................................................................33
Digital Input Status Configuration ..................................................................................... 35
Digital Input Status...................................................................................................................35
Digital Output Status ................................................................................................................35
Digital Video Viewer Program Configuration .................................................................... 35
Digital Video Viewer Application...............................................................................................35
Enable Alarm Video Window ............................................................................................ 36
Enable Alarm Video Pop-up.....................................................................................................36
Manually Control - Doors, DOs, Alarms, DIs, Intrusion Zones ......................................... 36
Overview ..................................................................................................................................36
Micro Monitoring ...............................................................................................................37
Overview ..................................................................................................................................37
Micro Monitoring Using the Micro Utility Form..........................................................................37
Selecting Facilities ............................................................................................................ 39
Select Facilities ........................................................................................................................39
Devices ...................................................................................................................... 40
Configuring Devices.......................................................................................................... 40
Secure Perfect 6.1.1 User Manual
3
Alarms............................................................................................................................... 40
Overview ..................................................................................................................................40
Alarm Form Completion ...........................................................................................................41
Alarm Groups.................................................................................................................... 42
Alarm Groups...........................................................................................................................42
Cameras............................................................................................................................ 43
Camera Form...........................................................................................................................43
Digital Input Form Completion..................................................................................................43
Digital Output Form ..................................................................................................................44
Digital Output Groups ....................................................................................................... 45
Digital Output Group Form .......................................................................................................45
Digital Video Recorders .................................................................................................... 45
Overview ..................................................................................................................................45
Digital Video Recorder Form Completion.................................................................................46
Overview ..................................................................................................................................47
Elevator Form...........................................................................................................................48
Overview ..................................................................................................................................48
Micro Form Completion............................................................................................................50
Readers Overview....................................................................................................................51
Person Records Creation ......................................................................................... 52
Departments ..................................................................................................................... 52
Person Records Creation.................................................................................................. 53
Personnel Type Assignment............................................................................................. 53
Badging...................................................................................................................... 54
Badge Design ...................................................................................................................54
Badging Overview............................................................................................................. 56
Administration Menu Options .................................................................................. 60
Alarm Notifier Form........................................................................................................... 60
Alarm Response Form...................................................................................................... 61
Badge Format Form.......................................................................................................... 63
Camera Preset Form ........................................................................................................ 63
Client Form ....................................................................................................................... 64
Client Group Form ............................................................................................................ 65
Event Schedule Form ....................................................................................................... 66
Event Trigger Form Completion........................................................................................ 67
Guard Tour Form .............................................................................................................. 68
Secure Perfect 6.1.1 User Manual
4
LogFile Form..................................................................................................................... 70
Operator Form ..................................................................................................................71
Override Form................................................................................................................... 71
Parameters Form.............................................................................................................. 71
Permission Form............................................................................................................... 72
Tour Point Form................................................................................................................76
Reporting Capabilities .............................................................................................. 77
Overview - Reports ........................................................................................................... 77
Reports.............................................................................................................................. 78
Administration Report...............................................................................................................78
Alarm History Report Form.......................................................................................................78
Badge History Report Form......................................................................................................78
Badge Report Form..................................................................................................................79
Device Report Form .................................................................................................................79
DI History Report Form ............................................................................................................79
Floor Access Report Form .......................................................................................................80
Guard Tour History Report Form..............................................................................................80
Operator History Report Form..................................................................................................80
Person Report..........................................................................................................................81
Reader Access Report Form....................................................................................................81
Roll Call Report Form...............................................................................................................81
Schedule Report Form .............................................................................................................82
Time and Attendance History Report Form..............................................................................82
Zone History Report Form........................................................................................................82
Troubleshooting and Help........................................................................................ 83
Customer Support............................................................................................................. 83
Help Menu Selections....................................................................................................... 83
Overview - Diagnostics ..................................................................................................... 83
Index of 'Show me' Demo Files ................................................................................ 85
Index of 'Show Me' Demo Files......................................................................................... 85
Reference Topics (Elements, Descriptions)............................................................ 87
About Secure Perfect ...............................................................................................................87
Access Right ............................................................................................................................87
Access Rights Assignment.......................................................................................................88
Access Rights Tab ...................................................................................................................88
Access Rights Tab ...................................................................................................................88
Activity Monitor.........................................................................................................................88
Activity Monitor Form Shortcut Menu .......................................................................................89
Activity Monitor Form Toolbar...................................................................................................90
Add Map...................................................................................................................................90
Add New Icon to Database.......................................................................................................90
Adding Sound to an Alarm .......................................................................................................91
Additional Filters Tab................................................................................................................91
Additional Filters Tab - Badge History Report Form.................................................................91
Additional Filters Tab - Zone History Report ............................................................................92
Address Fields Tab ..................................................................................................................92
Administration...........................................................................................................................92
Administration Menu Selections...............................................................................................93
Alarm........................................................................................................................................94
Secure Perfect 6.1.1 User Manual
5
Alarm Assignment....................................................................................................................94
Alarm Bumping Client Group Assignment Dialog Box..............................................................94
Alarm/Digital Input Tab.............................................................................................................94
Alarm Graphics Editor ..............................................................................................................95
Alarm Graphics Viewer.............................................................................................................95
Alarm Graphics Viewer Shortcut Menu ....................................................................................96
Alarm Group.............................................................................................................................96
Alarm History............................................................................................................................97
Alarm Instruction Assignment...................................................................................................97
Alarm Instruction Tab ...............................................................................................................97
Alarm Monitor...........................................................................................................................97
Alarm Monitor Form Shortcut Menu .........................................................................................98
Alarm Monitor Form Toolbar ....................................................................................................99
Alarm Notifier............................................................................................................................99
Alarm Response Tab................................................................................................................99
Alarm Routing and Bumping ....................................................................................................99
Alarm Routing Client Group Assignment Dialog Box..............................................................100
Alarm Selection Tab...............................................................................................................100
Alarm Sense Time..................................................................................................................100
Alarm Tab...............................................................................................................................101
Alarms Tab - Alarm Routing and Bumping Form....................................................................102
Alarms Tab.............................................................................................................................102
Antipassback..........................................................................................................................103
Antipassback Definitions ........................................................................................................103
APB Region Configuration Tab - Region Form ......................................................................104
API Connections.....................................................................................................................104
Appending Archive Databases...............................................................................................105
Archiving ................................................................................................................................105
Arm/Disarm an Intrusion Zone................................................................................................106
Arrange Icons.........................................................................................................................107
Assign Micro Phone Numbers Dialog Box..............................................................................107
Auto Shutdown of Client Services..........................................................................................108
Auto Update ...........................................................................................................................108
Backing Up Data ....................................................................................................................109
Backup Clients Assignment Dialog Box .................................................................................110
Backup Clients Tab ................................................................................................................110
Backup Region Assignment Dialog Box.................................................................................111
Backup Regions Tab - Region Form ......................................................................................112
Badge.....................................................................................................................................112
Badge.....................................................................................................................................112
Badge Alias............................................................................................................................113
Badge Alias Tab.....................................................................................................................113
Badge Assignment Dialog Box...............................................................................................113
Badge Definition Tab..............................................................................................................114
Badge Design.........................................................................................................................115
Badge Format.........................................................................................................................115
Badge Formats in 40-Bit and 55-Bit Wiegand Protocol ..........................................................115
Badge Format Tab .................................................................................................................116
Badge History.........................................................................................................................117
C...................................................................................................................................... 118
Calendar Dialog......................................................................................................................118
Camera ..................................................................................................................................118
Camera Preset.......................................................................................................................118
Camera Preset Assignment Dialog ........................................................................................118
Can I Customize the Toolbar?................................................................................................118
Cascade.................................................................................................................................118
CCTV Alarm...........................................................................................................................119
CCTV Alarm Assignment .......................................................................................................119
CCTV Tab ..............................................................................................................................119
CCTV Tab ..............................................................................................................................119
Change Password..................................................................................................................119
Secure Perfect 6.1.1 User Manual
6
Change State .........................................................................................................................120
Check for Update ...................................................................................................................120
Clear Archive Tab...................................................................................................................120
Clear Button ...........................................................................................................................121
Clear Search ..........................................................................................................................121
Client......................................................................................................................................121
Client Assignment Dialog Box................................................................................................121
Client Group...........................................................................................................................121
Client Group Tab - Client Group Form ...................................................................................122
Client Monitor.........................................................................................................................122
Client Monitor Form Shortcut Menu........................................................................................123
Client Monitor Form Toolbar...................................................................................................123
Client Redundancy Overview.................................................................................................124
Client Tab...............................................................................................................................125
Comments Tab.......................................................................................................................127
Communication Settings Tab .................................................................................................127
Communications Settings Tab ...............................................................................................127
Conditions of Mass Update ....................................................................................................128
Creating a Dial-Up Micro Record............................................................................................129
Creating a Direct-Connect Micro Record................................................................................130
D...................................................................................................................................... 131
Database Tab - Reports.........................................................................................................131
Database Utilites....................................................................................................................131
Date Range Tab - Reports .....................................................................................................132
Definition Tab - Alarm Routing and Bumping Form................................................................132
Definition Tab - API Connections Form..................................................................................133
Definition Tab - Camera Form................................................................................................133
Definition Tab - Camera Preset Form.....................................................................................134
Definition Tab - Digital Video Recorder Form.........................................................................134
Delete Record ........................................................................................................................134
Delete Template.....................................................................................................................135
<deleted> Displays After I Delete All the Records..................................................................135
Department ............................................................................................................................135
Department Tab .....................................................................................................................135
DES/DES III Data Encryption Standards................................................................................135
Design Tab.............................................................................................................................136
Device Configuration..............................................................................................................136
Device Menu Selections.........................................................................................................136
Diagnostic Setting ..................................................................................................................137
Diagnostic Viewer...................................................................................................................137
Diagnostic Viewer...................................................................................................................137
Dial-Up/Hangup......................................................................................................................137
Dial-Up Troubleshooting.........................................................................................................138
DI Board Records Creation ....................................................................................................139
Digital Input ............................................................................................................................139
Digital Input Status.................................................................................................................139
Digital Input Tab.....................................................................................................................140
Digital Output..........................................................................................................................140
Digital Output Assignment......................................................................................................141
Digital Output Group...............................................................................................................141
Digital Output Group Assignment...........................................................................................141
Digital Output Groups Tab......................................................................................................141
Digital Output Status ..............................................................................................................141
Digital Output Tab ..................................................................................................................142
Digital Output Tab ..................................................................................................................142
Digital Outputs Tab.................................................................................................................143
Digital Video Recorder ...........................................................................................................143
Digital Video Viewer ...............................................................................................................143
DI History ...............................................................................................................................143
Disconnect Client ...................................................................................................................143
DO Board Records Creation ..................................................................................................144
Secure Perfect 6.1.1 User Manual
7
DO Groups Tab......................................................................................................................144
DO Groups Tab......................................................................................................................144
Door Functions Tab................................................................................................................145
Download Badges..................................................................................................................146
Download Database...............................................................................................................146
DVR........................................................................................................................................146
DVR Disk is Full .....................................................................................................................146
DVR Help ...............................................................................................................................147
DVR Help - Boxes and Properties..........................................................................................147
DVR Help - Call Preset Button ...............................................................................................147
DVR Help - Camera Shortcut Menu .......................................................................................148
DVR Help - Digital Video Search Icon....................................................................................148
DVR Help - Digital Video Viewer Window ..............................................................................148
DVR Help - DVR Shortcut Menu ............................................................................................150
DVR Help - Moving the Window.............................................................................................150
DVR Help - Play Controls - Digital Video Viewer....................................................................151
DVR Help - Recorded File Name ...........................................................................................152
DVR Help - SP AutoPlay CD Creator.....................................................................................152
DVR Help - Video Window On-Screen PTZ Control...............................................................152
DVR Search ...........................................................................................................................153
DVR Search - Alarms Button..................................................................................................153
DVR Search - Cameras Button ..............................................................................................153
DVR Search - Clear Button ....................................................................................................153
DVR Search - Event Tag........................................................................................................154
DVR Search - General DVMR Events....................................................................................154
DVR Search - General Playback............................................................................................155
DVR Search - Grabbing Motion Video Clips...........................................................................156
DVR Search - Help Button .....................................................................................................156
DVR Search - Motion .............................................................................................................156
DVR Search - Play Button......................................................................................................157
DVR Search - Readers Button ...............................................................................................157
DVR Search - Search Button .................................................................................................158
DVR Search - SP Events .......................................................................................................158
DVR Search - Stop Search ....................................................................................................159
E...................................................................................................................................... 160
Edit Alarm Group....................................................................................................................160
Edit Icon .................................................................................................................................160
Edit Sense Time.....................................................................................................................160
Elevator..................................................................................................................................160
Elevator Assignment ..............................................................................................................160
Elevator Tab...........................................................................................................................161
Event Schedule......................................................................................................................161
Event Schedules Tab .............................................................................................................162
Event Trigger..........................................................................................................................162
Events Tab.............................................................................................................................163
Events Tab.............................................................................................................................163
Events Tab.............................................................................................................................163
Events Tab - Micro Form........................................................................................................164
Exchange Key Encryption ......................................................................................................164
Exit .........................................................................................................................................164
Expiration Date Filter Tab.......................................................................................................164
Export.....................................................................................................................................165
External Reports.....................................................................................................................165
F...................................................................................................................................... 166
Facilities Tab..........................................................................................................................166
Facility....................................................................................................................................166
Facility....................................................................................................................................167
Facility Assignment Dialog Box..............................................................................................167
Facility Tab.............................................................................................................................167
File Menu Selections..............................................................................................................168
Filters Tab - Alarm History Report Form.................................................................................168
Filters Tab - Badge History Report Form................................................................................168
Secure Perfect 6.1.1 User Manual
8
Filters Tab - Badge Report Form............................................................................................169
Filters Tab - Device Report Form ...........................................................................................169
Filters Tab - DI History Report Form ......................................................................................169
Filters Tab - Operator History Report Form............................................................................169
Filters Tab - Person Report Form...........................................................................................170
Filters Tab - Schedule Report Form .......................................................................................170
Filters Tab - Time and Attendance History Report Form........................................................170
Filters Tab - Zone History Report Form..................................................................................170
Find Badge.............................................................................................................................170
Flash Micro Icon.....................................................................................................................171
Floor.......................................................................................................................................171
Floor Access...........................................................................................................................171
Floor Assignment ...................................................................................................................171
Floor/Digital Output/Digital Input Selection Dialog..................................................................171
Floor/Digital Output/Digital Input Tab .....................................................................................172
Floor/Digital Output Selection Dialog......................................................................................172
Floor/Digital Output Tab .........................................................................................................172
Floor Tab................................................................................................................................173
Floor Tab................................................................................................................................173
Floor Tracking By Input ..........................................................................................................173
Floor Tracking By Keypad......................................................................................................173
Fonts Tab...............................................................................................................................174
Functions Schedule Tab.........................................................................................................174
G ..................................................................................................................................... 175
General Tab ...........................................................................................................................175
General Tab ...........................................................................................................................175
Global Edition Regional Configuration Rules .........................................................................177
Group Tab..............................................................................................................................178
Guard Tour Assignment Dialog Box.......................................................................................179
Group Tab..............................................................................................................................179
Guard Tour.............................................................................................................................179
Guard Tour History.................................................................................................................179
Guard Tour Tab - Guard Tour Form.......................................................................................180
Guard Tour Tab - Manual Control Form.................................................................................181
Guard Tours Tab - Guard Tour History Report.......................................................................182
H...................................................................................................................................... 183
Help Doesn't Display in My Assigned Language....................................................................183
Help Topics ............................................................................................................................183
Hex Characters ......................................................................................................................183
How Do I Perform a Search on a Specific Form.....................................................................183
How Do I Put a Reader Online...............................................................................................183
How Do I Remove an Alarm from the Alarm Monitor Form ....................................................184
How Do I Troubleshoot My Global Edition System?...............................................................184
I ....................................................................................................................................... 185
Installing the Printer Driver.....................................................................................................185
Instruction...............................................................................................................................185
Intrusion Zone ........................................................................................................................185
Intrusion Zone Assignment Dialog Box ..................................................................................185
Intrusion Overview..................................................................................................................186
Intrusion Zone Tab.................................................................................................................187
Intrusion Zone Tab - Event Trigger Form ...............................................................................188
Intrusion Zone Tab.................................................................................................................189
Intrusion Zone Tab.................................................................................................................190
K...................................................................................................................................... 191
Keypad Alarm Shunting..........................................................................................................191
Keypad Only Type Reader.....................................................................................................191
L ...................................................................................................................................... 192
Launch Client .........................................................................................................................192
Licensing................................................................................................................................192
Location Tab ..........................................................................................................................192
LogFile ...................................................................................................................................193
LogFile Tab ............................................................................................................................193
Secure Perfect 6.1.1 User Manual
9
Logoff .....................................................................................................................................193
Low-Battery Alarm..................................................................................................................193
M ..................................................................................................................................... 194
Manual Control.......................................................................................................................194
Manual Control Tab................................................................................................................194
Mass Update..........................................................................................................................195
Menu Buttons.........................................................................................................................196
Message Format Tab .............................................................................................................196
Micro ......................................................................................................................................197
Micro/5-PX or Micro/PX-2000 Records Generation................................................................197
Micro Assignment Dialog Box ................................................................................................197
Micro Configuration Tab.........................................................................................................198
Micro Definition Tab ...............................................................................................................199
Micro Flash and Micro Parameter Configuration....................................................................201
Micro Utility.............................................................................................................................202
Micro Utility Form Shortcut Menu...........................................................................................203
Micro Utility Form Toolbar ......................................................................................................204
Mode Labels Tab....................................................................................................................204
Mode Schedule ......................................................................................................................205
Mode Schedule Tab ...............................................................................................................205
Mode Tab...............................................................................................................................206
Multiple Language Support ....................................................................................................207
N...................................................................................................................................... 208
Networking .............................................................................................................................208
New Icon ................................................................................................................................208
New Record ...........................................................................................................................208
New Template Dialog.............................................................................................................208
Next Pane ..............................................................................................................................208
No Alarms on Alarm Monitor ..................................................................................................209
No Floor Tracking...................................................................................................................209
No Readers in List Box...........................................................................................................209
Normal Type Reader..............................................................................................................209
Notes......................................................................................................................................209
O ..................................................................................................................................... 210
Operations Menu Selections ..................................................................................................210
Operator.................................................................................................................................210
Operator History.....................................................................................................................210
Operator Tab..........................................................................................................................211
Override .................................................................................................................................212
Override Tab ..........................................................................................................................212
P...................................................................................................................................... 213
Parameters.............................................................................................................................213
Password Tab - Parameter Form ...........................................................................................213
Pause Button..........................................................................................................................213
PDF Files and Adobe Acrobat Reader ...................................................................................213
People Assignment ................................................................................................................214
Permission .............................................................................................................................214
Permission Tab ......................................................................................................................214
Person....................................................................................................................................215
Person....................................................................................................................................215
Person Selection Tab.............................................................................................................215
Personnel Menu Selections....................................................................................................216
Personnel Tab........................................................................................................................217
Personnel Type......................................................................................................................218
Personnel Type Tab...............................................................................................................219
Photo Tab...............................................................................................................................220
Point Assignment Dialog Box.................................................................................................220
Port Settings Tab....................................................................................................................221
Preset/Camera Selection .......................................................................................................221
Preset/Camera Tab................................................................................................................222
Presets Tab............................................................................................................................222
Print Preview Report ..............................................................................................................222
Secure Perfect 6.1.1 User Manual
10
Print Report............................................................................................................................222
Print Setup .............................................................................................................................223
Print Setup .............................................................................................................................223
R...................................................................................................................................... 224
Read and Keypad-Type Reader.............................................................................................224
Reader ...................................................................................................................................224
Reader Access.......................................................................................................................224
Reader Assignment................................................................................................................224
Reader Board Records Generation........................................................................................225
Reader Button........................................................................................................................225
Reader Tab ............................................................................................................................227
Reader Type Events Tab .......................................................................................................229
Readers Tab ..........................................................................................................................229
Readers Tab - Reports...........................................................................................................230
Readers Tab - Time and Attendance History Report Form ....................................................230
Recall Search.........................................................................................................................230
Recorded Video Currently Being Accessed ...........................................................................230
Records Generation ...............................................................................................................230
Region....................................................................................................................................231
Region Form Tab ...................................................................................................................231
Remove All Button..................................................................................................................232
Remove Individual Button ......................................................................................................232
Replication and Synchronization Conflicts .............................................................................232
Report Templates Window.....................................................................................................233
Reports Menu Selections .......................................................................................................234
Reset Micro............................................................................................................................234
Response...............................................................................................................................234
Restoring Secure Perfect Databases .....................................................................................235
Resume Button.......................................................................................................................235
Return Date Filter Tab............................................................................................................235
Roll Call..................................................................................................................................235
Routing Schedule Tab............................................................................................................236
Routing Tab............................................................................................................................237
S...................................................................................................................................... 238
Save Record ..........................................................................................................................238
Save Template As..................................................................................................................238
Schedule Tab.........................................................................................................................238
Schedule Tab.........................................................................................................................239
Schedule Tab.........................................................................................................................239
Schedule Tab.........................................................................................................................239
Schedules/Events...................................................................................................................239
Search....................................................................................................................................240
Search Menu Selections ........................................................................................................240
Secure Perfect Services.........................................................................................................241
Select Columns......................................................................................................................243
Select Criteria and Micro Selection ........................................................................................243
Select Default Alarms.............................................................................................................243
Select Facilities ......................................................................................................................244
Set As Default Template ........................................................................................................244
Set Instruction Tab.................................................................................................................244
Setting the Automatic Logoff Time .........................................................................................244
Setting Up an Elevator ...........................................................................................................245
Settings Tab...........................................................................................................................245
Settings Tab...........................................................................................................................246
Settings to Reach Host Tab ...................................................................................................247
Settings to Reach Micro Tab..................................................................................................248
Sort Fields Dialog...................................................................................................................248
Split ........................................................................................................................................249
Status Bar ..............................................................................................................................249
Secure Perfect 6.1.1 User Manual
11
Status Tab - Alarm Form........................................................................................................249
Status Tab - Badge Form.......................................................................................................250
Status Tab - Digital Input Form...............................................................................................250
Status Tab - Digital Input Status Tab......................................................................................251
Status Tab - Digital Output Status Form.................................................................................252
Status Tab - Digital Video Recorder Form..............................................................................252
Status Tab - Intrusion Zone Form...........................................................................................253
Status Tab - Micro Form.........................................................................................................253
Status Tab - Reader Form......................................................................................................254
Supervised DI Points on 2SRP Board Not Working ...............................................................254
Swipe and Show Button .........................................................................................................254
Swipe and Show Option.........................................................................................................255
T...................................................................................................................................... 256
Takeover and Recovery Timing..............................................................................................256
Template - Defined.................................................................................................................256
Tile .........................................................................................................................................256
Time and Attendance .............................................................................................................257
Time and Attendance History.................................................................................................257
Time Schedule .......................................................................................................................257
Time Schedules Tab ..............................................................................................................257
Time Zone Tab.......................................................................................................................258
Toolbar...................................................................................................................................258
Tour Point...............................................................................................................................258
Tour Point Tab........................................................................................................................259
U...................................................................................................................................... 260
UL Certification.......................................................................................................................260
User Fields Tab - Badge Form...............................................................................................260
User Fields Tab......................................................................................................................260
User Fields Tab......................................................................................................................261
Video Display Tab..................................................................................................................262
Video Driver Installation .........................................................................................................263
Video for Windows (AVI) Driver Installation............................................................................263
Video Windows - An Overview...............................................................................................264
View Menu Selections............................................................................................................265
W..................................................................................................................................... 266
Weak Encryption Key.............................................................................................................266
Why a Host PC Dials a Micro.................................................................................................266
Why Can't I Delete a Record?................................................................................................266
Wiegand Badge Formats Dialog Box .....................................................................................266
Window Menu Selections.......................................................................................................266
Z...................................................................................................................................... 267
Zone History...........................................................................................................................267
Secure Perfect 6.1.1 User Manual
12
Introduction to SP Editions
Welcome
Reference Topics:
Welcome to Secure Perfect!
Secure Perfect Editions is a multi-edition offering of Integrated Secure Management Software designed
on Microsoft Windows technology. Secure Perfect Editions provide full security management functions
including access control, intrusion zone control, alarm monitoring, reporting, photo ID badging, and CCTV
interfaces as standard features. Secure Perfect Editions also offers integrated system options that
include digital video surveillance and Web-based reporting.
Throughout this Help system, reference to Secure Perfect is represented as "SP" in text content to
avoid repetition where the product name and/or version may have already been established.
SP Global Edition: SQL Server 2000 Replication services are used to distribute the data from a Global
Server to Regional Servers. Secure Perfect installation creates the necessary components for a
replicated system, configuring publications and subscriptions at each level. The Global Database Server
is the ‘main’ Secure Perfect database server. The term ‘main’ as used in this context means that the
Global Database Server acts as a hub for all replication activity. This Global Server hosts a Distributor
whose role is to store history and miscellaneous information about merge replication. When the
Distributor is created on a database, it generates its own database to store information. Once publishing
is enabled on the Global Server, it is able to control and monitor publications and subscriptions as well as
the starting and stopping of replication agents. Regional Database Servers act as ‘client’ database
servers. They have the ability to subscribe to publications located on the Global Server. These Regional
Servers operate independent of the Global Server for a period of time as necessary. Subscriptions are
‘pushed’ to each Regional Server by the Global Server. This means that the Regional Servers are not
required to request updated data from the Global Server, because updates are periodically supplied to
Regional Servers according to a set schedule. Replication intervals are configurable through SQL Server
Enterprise Manager user interface. Data is continually synchronized by implementing this customized
replication configuration. Refer to the Secure Perfect Installation Guide for a terminology list and
Replication and Synchronization Conflicts in this Help file.
SP Enterprise Edition is licensed for Windows 2000/2003 Standard Edition Server as the operating
system and SQL Server 2000 Standard Edition as the database. SP Enterprise Edition is designed for
mid to large-sized systems with capacity requirements of up to 25 client workstations, 256 micros, and
4,096 readers.
Cluster technology selections in this Enterprise-level installation provide new architecting options.
SP Professional Edition is licensed for Windows 2000 Professional Server or XP Professional Server as
the operating system and SQL Server 2000 Desktop Engine (MSDE) as the database. SP Professional
Edition is designed for small to mid-sized systems with capacity requirements of up to 5 client
workstations, 32 micros, and 256 readers.
eZ Edition is licensed for Windows 2000 Professional Server or XP Professional Server as the operating
system and SQL Server 2000 Desktop Engine (MSDE) as the database. eZ Edition is designed for small
systems with capacity requirements of 5 client workstations, 32 micros (PX-2000 Series ONLY), and 128
readers.
This Help system provides information for system administrators to configure and operate the SP Editions
software.
Secure Perfect 6.1.1 User Manual
13
What's New?
What’s New in Secure Perfect
New in 6.1.1 ONLY:
within a specific Region only. If configured across Regions, entering a Region activates the badge only in
that region and disables the badge in all other Regions.
Micro Connection Type Network + Direct Communication: This is a new network configuration option
selectable on the Micro Form, Micro Definition tab. This selection allows a micro that loses network
connection to fail over to a serial connection. On the Micro Utility Form, a network micro normally displays
an IP address in the Comm device column. When a network micro loses connection, the Alarm Monitor
Form displays a Host Comm alarm. After approximately two minutes, the alarm resets and the serial
connection begins communications. The Micro Utility Form Comm device column now displays the
Comm port.
Micro Connection Type Network + Network: This is a new network configuration option selectable on
the Micro Form, Micro Definition tab. This selection allows a micro that loses network connection to fail
over to a secondary network connection. When a network micro loses connection, Alarm Monitor Form
displays a Host Comm alarm. After approximately two minutes, the alarm resets and network
communications begin. The Micro Utility Form Comm device column now displays the backup IP address
the Secure Perfect application and can be moved outside of the Secure Perfect window area. This is
useful for dual-display monitors or wide monitor display.
Form. Select Max Invalid PIN Count and enter a number between 1 and 6 as the number of times an
invalid PIN can be entered at a reader before the badge is suspended. If the badge is suspended, the
badge must be reset to Active by a system administrator.
DVR Search - Play Single Recorded Frame: The Search Results windowpane in DVR Search returns a
list of recorded video event tags based on the search parameter criteria specified. Select an event tag
from the list and right-click to display a shortcut menu. The shortcut menu has been expanded to include
first frame of the event recording displayed as a still photo. To play the rest of the video clip, unpause the
video on the DVR Viewer.
Definition tab. A board provides direct, dial-up, and network capabilities in one board. The network
supports Ethernet only. The board also has an integrated modem option which means that the modem is
a chip that can be ordered with the board or added at a later date. This modem can also be used as dial-
up fallback to a network board. Both boards support the following reader boards, 2RP, 2SRP, 8RP, and
CK8RP. The boards provide nonvolatile storage that provides faster reset recovery and allows hostless
operation. A new Web Integrated Configuration Tool was created for flashing these micro types,
eliminating the need to install Flashtool on each computer in order to download and flash the micros.
allows you to configure the amount of time that elapes before your Secure Perfect system retries the
connection and considers that the database is not accessable.
• Timeout (sec): The default is 30 seconds. The minimum is 3 seconds; the maximum is 120 seconds.
1) In a Secure Perfect Global Edition configuration, this is the amount of time until a Regional failover
begins. 2) In a typical Secure Perfect configuration, this is the amount of time before Secure Perfect
transactions are saved, Secure Perfect services shut down, and a message advises you to repair your
database.
• Retry: The default is 3 retries. The minimum is ‘0’; the maximum is 5 retries.
Secure Perfect 6.1.1 User Manual
14
checkbox if you want your Secure Perfect system to notify you when a valid badge read occurs but the
door did not open within the configured sense time. This may be an indication of a duress situation,
someone deciding not to pass through the door, or an accidental read as someone passes a reader.
• This feature must be associated with an alarm type of door forced or door held in order to be notified
of a change in state of the door.
New in 6.1:
Guard Tour:
is an inspection of your facility premises, by a security guard. The officer stops at pre-determined tour
points along the way, where a digital input (DI) is triggered or a badge is presented to a reader so that the
Secure Perfect system can track the tour progress. Each time a badge is presented to a reader, a tour
point is ‘hit.’ DIs can also be assigned as tour points. An additional tab has been added to the Manual
configured in your Secure Perfect system. Select a Guard Tour to display tour details and tour points. An
occasion may arise that requires a tour to be started, paused, resumed, or stopped manually. This
feature and related forms are not available for input if you are not licensed for Guard Tour.
Global Edition Enhancements:
• Database Server and Fileserver Redundancy: Global Editions systems can be configured for
database redundancy, at the Region level. A Regional Database Server can be configured to have
backup servers. Refer to the Backup Regions tab of the Region Form. If a client is not able to connect
to its Regional Database Server for any reason, it fails over to the backup Regional Server.
Regional database redundancy and fileserver redundancy operate independently. One or the other, or
both can fail at the same time, whether they reside on the same server computer or are configured to
reside on separate computers.
• Client Region Failover: If you have Region backups configured, all clients in that region, by default,
will fail over to the backup Region when the system detects that it cannot access the database. You
might choose to clear this checkbox on the Client tab of the Client form, to prevent nonessential client
failover and keep extra traffic on your system network to a minimum.
Alarms:
• Alarm Bumping and Routing: The Client Group Form allow you to assign Secure Perfect computers
into logical Client Groups. Then, Alarms can be routed to these Client Groups by time schedule or at
all times. Additionally, alarms can be ‘bumped’ (forwarded) to one or more additional Client Groups
when alarms are unacknowledged and unpurged within configured time limits.
• Alarm Graphics Enhancements: Alarm Graphics can now be configured for digital inputs and digital
enhanced functionality. Operators for the Alarm Graphics Viewer must be assigned ‘Update’ and
facility permissions in order to select right-click menu options. For shortcut menu functionality, rest
your mouse pointer on an assigned point and right-click. The shortcut menu that displays with a right-
click mouse button depends on the Point Type assigned to the point. The options allow manual control
of doors.
• Duress: This selection determines whether the door will open when a duress PIN code (with the final
digit incremented by + 1) is entered with a valid badge. This feature is configured for your Secure
Event Trigger Updates:
allows you to assign Intrusion Zones and Intrusion Zone transaction type(s) that will trigger an event.
Extended Unlock Time Options:
Extended unlock time is enabled on the Personnel Tab of the Person Form. When this option is selected,
enabled badges associated with a Person record allow extra time to gain access to an entry or exit point.
Extended times (in minutes and seconds) are configured and assigned on the Door Functions tab of the
Reader Form. For example, if a door is used by disabled persons or the reader is mounted at a distance
from the door, a longer unlock time may be required to exit or enter.
Secure Perfect 6.1.1 User Manual
15
Real-Time Digital Output Status:
Digital output status is reflected in real-time updates on the Alarm Graphics Viewer if this option is
UL Certification:
294 Access Control Requirements). Your installation must adhere to the requirements listed in the
Certification section of the Secure Perfect Installation Manual, in order to qualify as UL-listed Grade A
certified.
Badging:
• Designer Upgrade: The integrated Badge Designer program is an upgraded version with many new
windowpane. This is a separate program with its own toolbar. If you had a previous version of badge
designer that created files with a .gdr extension, you will be prompted to save the file as a .dgn when
you edit a badge design for the first time. Access the extensive Online Help system from the Badge
Designer toolbar. Additionally, refer to the Badge Designer User Manual, and review the "What’s New"
• Badge Format: This option on the Administration menu allows an operator to design, import, or export
custom badge formats for your Secure Perfect system. Custom magnetic stripe or Wiegand formats
can be loaded and stored in the Secure Perfect database. After identifying the required custom format,
the format is flashed to the micro. A new tab on the Micro Flash and Micro Parameter Configuration
window allows you to configure custom badge formats.
Auto Shutdown of Secure Perfect Services:
This is a default option on the Client tab of the Client form. If selected, Secure Perfect Services will
automatically shut down when the client application is closed. A list of prerequisite criteria must be met.
Manual Control Form:
• Shortcut from Client Monitor Form to Manual Control Form: This feature allows the current operator to
quickly locate a client, right-click and select the Manual Control form, and manually perform operations
of the Secure Perfect system.
• Mode Tab on the Manual Control Form: This feature allows the operator to select all or individual
micros or clients for immediate change of mode from the Manual Control Form, on the new Mode Tab.
The micro’s current real-time mode and address are also displayed.
Report Generation Upgrades:
• Guard Tour History Report: This option on the Administration menu allows you to generate a report of
completed Guard Tours, displaying tour activities such as start points, hits, invalid points, pauses,
resumes, tour end points, tour time exceeded, manual start, and manual stops.
• Administration Report: The list of report types has been expanded to include details of Alarm Routing
and Bumping configurations and Badge Format (UBF) custom badge configurations.
Secure Perfect 6.1.1 User Manual
16
Client/Server Architecture
Reference Topic:
Secure Perfect Server, client workstation, and network-enabled microcontrollers communicate over
10/100Mb Ethernet LAN/WAN typologies. Refer to Micro Form, Micro Definition Tab for a list of supported
Microcontroller types.
PC Function
Configuration
Win2000/2003
Standard
Edition Server
Secure Perfect Software
Cluster technology or Global Edition selections in this
Enterprise-level system installation provide new architecting
options. All configuration options are detailed in the Secure Perfect
Installation Guide.
Allows database and file Server to be placed on different Windows
Server computers.
SQL Server 2000 Standard Edition Database and applicable SQL
Server Service Packs
Imaging: The feature is installed but not recommended for
production as an Imaging workstation.
Clients: Secure Perfect supports 25 system-wide clients (any client
can host a micro).
Micros: Secure Perfect supports 256 system-wide micros (32 on the
server and up to 64 per communications client).
Win2000
Secure Perfect Software
Professional
Edition Server
SQL Server 2000 Desktop Engine (MSDE) and applicable Service
Packs
Imaging: The feature is installed on the server as an Imaging
workstation.
Clients: The system supports five system-wide clients (any five can
also be configured as communications clients for hosting micros).
Micros: The system supports 32 system-wide micros.
Win2000
Secure Perfect Software
Professional
or XP
Imaging: The feature is installed.
Professional
Client
Workstation
Secure Perfect 6.1.1 User Manual
17
Getting Started
Reference Topic:
Before you proceed, make sure that your peripheral system hardware is installed and running. This
includes micros, readers, modems, printers, and network lines. Refer to your Secure Perfect Installation
Guide or follow specific installation instructions for your brand of hardware.
The following order is recommended for initial setup, beginning with configuring your Server computer
Secure Perfect system:
9. Back up your system. (This procedure is detailed in your Secure Perfect Installation Guide.)
10. Configure client computers. (This procedure is detailed in your Secure Perfect Installation
Guide.)
Related Documentation
Reference Topic:
For more information about Secure Perfect Editions and hardware that works with it, consult the
following:
•
•
•
•
•
Micro/5 Installation Guide
Micro/PX-2000 and Micro/PXN-2000 Installation Guide
Micro/PX-2000 and Micro/PXN/2000 Microcontroller Quick Installation Instructions
Secure Perfect Installation Guide
Badge Designer Manual for Picture Perfect v3 and Secure Perfect v6
is included in the media kit, shipped with your system. You must have Adobe Acrobat Reader installed on
your computer to view PDF documents. For your convenience, a copy of the Adobe Acrobat Reader
software is included on the CD.
Sources of training material include the following:
1. Additional detail or related information can be viewed by clicking the linked Reference Topics listed
at the bottom of each topic pane.
2. A Training CD-ROM is shipped with each system media kit. The CD contains an operations and
training course that consumes approximately 16 hours.
You may want to take advantage of the XtremeLearning library of convenient, comprehensive, and
interactive Web-based training courses available through your GE Security Business Partner.
Secure Perfect 6.1.1 User Manual
18
Navigation
Log On/Log Off or Shut Down
Reference Topic:
Log On/Log Off
Enter your logon/logoff ID and Password:
•
•
To start the Secure Perfect client program from the File menu.
To quit the Secure Perfect client program using the Close button in the top right corner of the
Secure Perfect window.
The default Login/logout ID is secureand the default Password is master. If you purchased your
system from GE Security, the default ID and Password are set for you.
UPGRADES: Versions of Secure Perfect 4.0 and earlier did not require case-sensitive default login
passwords. When upgrading from a version of Secure Perfect 4.0 or earlier, you may experience a
problem logging in. If you have never changed it, your Secure Perfect default password may be set to
initial caps, as in 'Master'and not 'master.'
Logoff
The Logoff option on the File menu allows you to log off of Secure Perfect without closing the program. A
message box displays. Click OK to log off of the Secure Perfect application (logging off allows an
operator to log off and another operator to log in without ending the program.) or Cancel to cancel the
logoff process. While logged off, no one can enter data into SP; however, Secure Perfect continues to
communicate with the micros, store alarm and badge transactions in the history database, and notify you
of alarms based on you facility assignment. Refer to the Client Form for information on turning alarm
notifications on and off.
The Secure Perfect services are still running but you will not receive any alarm notifications. DO NOT
shut down services unless you are instructed or the system requires maintenance.
Shutting Down
It is ESSENTIAL that you shut down Secure Perfect and your computer properly. The results could be
disastrous if you do not follow this procedure. You may be required to re-install all of the software on your
computer.
To shut down the Secure Perfect services:
1. Click START, Settings, Control Panel, Administrative Tools, and then Services. Scroll to
Secure Perfect services. The services must be stopped in the following order:
ꢀ
ꢀ
ꢀ
Secure Perfect Manager (Shutting down Secure Perfect Manager service stops micro
communications.)
Secure Perfect System Manager (Shutting down Secure Perfect System service stops client
communications.)
Secure Perfect Diagnostics
2. Exit Control Panel.
3. From the taskbar, click Start, then Shut Down.
4. From the Shut Down Windows form, verify that Shutdown the computer? is selected and click Yes.
Secure Perfect 6.1.1 User Manual
19
Navigational Conventions
Reference Topics:
Typical Microsoft Windows navigation is used in this application. Selecting menu bar, drop-down menu,
and task bar options are typical Microsoft navigational procedures. Color or format in text, or changes in
the cursor identify hotspot links to related topics.
To change the Help window size:
To make the navigation or topic panes larger:
•
Point to the divider between panes. When the pointer displays, hold down the left mouse and
drag the divider left or right.
•
Point to any corner of the windowpane. When the pointer changes to a double-sided arrow,
hold down the left mouse button and drag the corner.
Move up or down the topic window by clicking the scroll bar on the right side of the topic pane.
SP Menus
Reference Topics:
Following a successful logon, your Secure Perfect screen displays a menu bar, toolbar, and taskbar.
Selecting a menu bar item results in a drop-down group of related options. Clicking icons on the Secure
Perfect toolbar can also access many of the drop-down menu-bar options. Unavailable options will
display dimmed.
SP Menu Bar
Secure Perfect 6.1.1 User Manual
20
SP Taskbar
Reference Topic:
You can elect to view the Secure Perfect Taskbar across the bottom of your Secure Perfect window
indicating the current operator, communication port status, number of clients connected, number of
alarms, and number of background tasks. It may look similar to the following:
The numbers indicate the total status of all facilities assigned to the current operator.
Communication Port Status indicator will vary in color depending on the status:
Blue: All micros for the operator’s facility are offline.
Green: All micros for the operator’s facility are online.
Yellow: Some micros for the operator’s facility are in error state.
Clients indicates number of clients licensed, online, and logged into SP.
Alarms indicates unacknowledged alarms displaying on the Alarm Monitor Form.
Background Tasks indicates the number of tasks currently in progress. The length of the task is
dependent on size of the job and hardware components of your computer. The process may take hours
to complete.
DO NOT shut down Secure Perfect services until the background task is complete.
Secure Perfect 6.1.1 User Manual
21
SP Toolbar
The Toolbar selection on the View menu is a toggle election and determines whether or not the toolbar is
visible across the top of the Secure Perfect screen. The following toolbar icons and functionality are
unique to SP:
Click
To
Preview before printing a report.
Secure Perfect 6.1.1 User Manual
22
Frequently Performed Tasks
Tasks and Functions You Will Perform Frequently
To:
Reference Topics:
Alarm Routing and Bumping
Arm/Disarm an Intrusion Zone
Configure Devices
Configure Guard Tours
Configure/Monitor Redundancy
Contact Customer Support
Create a Dial-Up Micro Record
Create a Direct-Connect Micro
Record
Create Badges
Create Access Rights
Create Person Records
Create Reports
Display DVR Windows
Manual Control DI, DOs, & Intrusion
Zones
Mass Updates
Monitor Activities
Activity Monitoring Using the Activity
Overview – Diagnostics
Set the Automatic Logoff Time
View Alarm Graphics
View and Remove Alarms from the
Alarm Monitor Form
How Do I Remove an Alarm from the
Secure Perfect 6.1.1 User Manual
23
Operations Menu
Activity Monitoring
Overview
Reference Topics:
Activity Monitor
The Activity Monitor displays badge and intrusion zone transactions on the system’s readers. Once you
configure your readers, this is a way to verify that the configuration is correct and that the readers work
as you expect. Before the Activity Monitor can display badge transactions for a reader, the reader MUST
be marked as Active and Online and the activity for the reader MUST be routed to the Activity Monitor. By
default, routing for all transactions is set to the Activity Monitor.
Intrusion Zone activity is based on reader, Digital Inputs, or manual control transactions within assigned
Intrusion Zones. Arm, disarm, or fail activity is displayed for activity within that Intrusion Zone.
In a system using database partitioning (facilities), the Activity Monitor Form will display activity based on
the reader’s facility regardless of the person’s facility assignment.
Activity Monitoring Using the Activity Monitor Form
Reference Topics:
For a shortcut to the functions available within the Activity Monitor Form or to a related form, right-
click anywhere in the area where the badge transactions display. Not all options will be available to you.
You must click on a badge transaction with a DVR association in order to enable video options on the
shortcut menu. Camera and reader association (linking) is accomplished on the Administration Menu,
Event Trigger Form.
Date:
Displays the date in the micro on which the badge transaction occurred.
Displays the time of the badge transaction occurrence in the micro.
Displays the type of activity that occurred, along with a graphic:
Time:
Activity Type:
Type
Activity
•
•
Valid
Person was granted access.
Invalid
Person was not granted access. Examples: Person was not given
access to the reader, the badge was suspended, the reader was
inactive, the reader was offline, or the door was unlocked.
•
•
•
Lost
Badge status is lost.
Unknown
APB In Invalid
Badge is not in the Secure Perfect database.
Current badge APB current status of IN, and attempted to gain access
to an APB IN reader.
Secure Perfect 6.1.1 User Manual
24
•
•
•
•
•
•
APB Out
Invalid
Current badge APB current status of OUT, and attempted to gain
access to an APB OUT reader.
TA In Invalid
TA Out Invalid
Valid Floor
Current badge T&A current status of IN, and attempted to gain access to
T&A IN reader.
Current badge T&A current status of OUT, and attempted to gain access
to a T&A OUT reader.
Elevator control with floor tracking is being used and the person was
granted access to the selected floor.
Invalid Floor
Duress Valid
Elevator control with floor tracking is being used and the person was not
granted access to the selected floor.
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered.
•
•
Duress Invalid
‘Grant Access on Duress’ is not active on this system (not selected on
the Parameter Form) and an attempted door access with a PIN code
(with the final digit incremented by + 1) was denied.
Duress Valid
Open
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered. The door is open.
•
Duress Valid
No Passage
‘Grant Access on Duress’ is active on this system (selected on the
Parameter Form) and door access was granted with a valid badge. This
selection allows a duress alarm to be generated when a PIN code (with
the final digit incremented by + 1) is entered. The unlock time expired
and the door did not open.
•
•
Valid Open
‘Enable Valid No Passage’ is active on this reader. A valid badge read
occurs and the door opens.
Valid No
Passage
‘Enable Valid No Passage’ is active on this reader. A valid badge read
occurs but the door did not open within the configured unlock time. This
may be an indication of someone deciding not to pass through the door,
or an accidental read as someone passes a reader.
•
•
Invalid PIN
A badge was presented at a reader and an invalid PIN was entered.
This message displays for as many times as you enter an invalid PIN,
unless ‘Max Invalid Pin’ is configured on the Reader Form, Reader tab.
The badge does not grant access.
Max Invalid PIN
‘Max Invalid PIN Count’ is active on this reader and the number of
invalid badge counts has reached the maximum, as configured on the
Reader Form, Reader tab. The badge did not grant access and the
badge is suspended.
The following are intrusion zone activities:
•
•
•
Zone Armed
By reader, DI, or manual control.
Zone Disarmed
By reader, DI, or manual control.
Arm/Disarm
Failed, Zone
Not Secure
An alarm is in alarm state. Device or badge transaction failed.
•
Arm/Disarm
Failed, Time
Expired
No badge transaction. The 10-second time period allowed for
completion of the arm/disarm process at keypad and reader, has
expired.
•
•
Arm/Disarm
Failed, Invalid
Access Right
Intrusion Zone not assigned to access right or is invalid.
Arm/Disarm
Reader is not assigned to the zone.
Secure Perfect 6.1.1 User Manual
25
Failed Not in
Zone
The following are Guard Tour activities:
•
•
Tour Started
Tour Ended
Security officer has started a Guard Tour.
•
•
Security officer has completed a Guard Tour.
All tour points have been ‘hit.’
•
•
Tour Started
Manually
•
A Guard Tour was started manually, at the control station and not
by presenting a badge at a reader or DI point.
Tour Ended
Manually
A Guard Tour was ended manually, at the control station and not by
presenting a badge at a reader or DI point.
•
•
Tour Activity
A tour point was hit along a Guard Tour.
Invalid Tour
Activity
•
•
•
Double ‘hit’ of any assigned tour point.
A tour point is ‘hit’ during a paused tour.
If a tour has not started and its points are hit, an invalid tour activity
transaction is not generated.
•
•
Tour Paused
•
•
This previously started tour has been paused. The clock time to
complete this tour is temporarily stopped.
Tour Resumed
This previously paused tour has resumed. The clock time to
complete this tour is resumed
Location
•
•
Displays the DI or reader description.
If an event trigger has been defined for associating video with
transactions from specified reader(s), a camera icon will display as
part of the reader description. When selecting a badge transaction
identified with a camera icon, right-click to display the shortcut
menu, then select a video option.
•
If this badge is a guard tour badge, this field displays the description
of the tour point.
•
•
If activity is manual control, Client name displays.
Name
If this badge is assigned to a person, the name of the person
displays.
•
•
If this activity is manual control, the operator name displays.
If this badge is a guard tour badge, the name of the person
displays.
•
•
If this hit is a DI point, this field is blank.
Number
If the badge is unknown or not assigned to a person, the badge
number or, if aliasing is used, the badge alias number is displayed.
•
•
Otherwise, this field will be blank.
Reference
If this is an elevator reader (Valid Floor or Invalid Floor displayed in
the field), this field displays the floor selected.
•
•
•
If this is a zone intrusion reader, this is a zone description.
If this is a guard tour, the guard tour desciption displays.
If ‘Max Invalid PIN Count’ displays in the activity type, then ‘Badge
Suspended’ displays here.
•
For any other activity type, this field is blank.
Secure Perfect 6.1.1 User Manual
26
Alarm Graphics Functions
Alarm Graphics Editor
Reference Topic:
Alarm Graphics Editor Form
This form allows you to create a graphical view of alarm states for the alarms you select. In general, you
import a map drawn as a Windows MetaFile (.wmf or .emf) and place alarm points on the map. A single
file may be imported multiple times. An alarm may be placed on multiple maps and each point on the
map may contain multiple alarms.
Map
Click the drop-down list of available maps. If there are no maps listed or you want to create a new map,
Link Alarms to this map
box. Designate one map as the default, which means that this map will display whenever you
select this alarm point from the Alarm Monitor Form and then, display the Alarm Graphics Viewer
Form.
Magnification
Slide to zoom out or zoom in, on the map view currently displayed. Once you have zoomed in or
increased the size of the map, the scroll bars on the side and bottom of the map windowpane
become available. To return the map to the original size, use the magnification slide.
Map Taller
Click to change the width to height ratio; the map becomes taller.
Map Shorter
Click to change the width to height ratio; the map becomes shorter.
Point Settings Group:
•
•
•
Point Type: Select Alarm, Camera, Digital Input, Digital Output, or Jump to Map from the
drop-down list. Designating the point type as Camera enables access to live video only, a
camera alarm, or both.
Add Point: This button become active when you click the map at a spot where you want to
add an alarm point, then click Add Point to display the alarm point on the map. This step
activates the remaining fields in this grouping.
Delete Point: Click to remove alarms from the map. This button will become active after you
click Add Point or select an existing alarm point on the current map.
Label: Displays the current label of the alarm point.
•
•
Change: Click to display the Point Label dialog box, allowing you to change the label of the
map point.
•
Jump to map: Allows you to define the point as a jump to another map when this point is
selected from the Alarm Graphics Viewer Form. Click the drop-down list to display a list of
available maps and select the map to which you want to link.
Links for this point:
Alarm link: Link a physical alarm point to the point you are creating on this map by selecting
•
an alarm from the drop-down list. Select more than one by clicking Link to More Than One
Alarm.
- This setting label changes to Digital Input if the assigned Point Type is a Digital Input. The
drop-down displays a list of available digital inputs.
- This setting label changes to Digital Output if the assigned Point Type is a Digital Output.
Secure Perfect 6.1.1 User Manual
27
The drop-down displays a list of available digital outputs.
•
•
point to the point you are creating on this map. This button label changes based on the type
of point that you are configuring. The icon that will display for the group reflects the most
severe alarm in the group.
Camera: Select a camera from the drop-down list to link live video access from a map. (This
setting is not available if the assigned Point Type is a Digital Input or Digital Output.)
Icons for this point:
Select an appropriate icon to represent the alarm state. An alarm in reset condition is low severity. An
alarm in alarm condition is medium severity. An alarm in trouble condition is high severity.
•
Trouble: Select the icon you want to display when this alarm point is in a trouble condition
(short or cut). Click the drop-down list to display a list of currently available icons. You may
add more icons by clicking Add New Icon to Database. (This setting does not display if the
Point Type is Digital Output.)
•
Alarm: Select the icon you want to display when this alarm point is in an alarm condition.
Click the drop-down list to display a list of currently available icons. You may add more icons
by clicking Add New Icon to Database.
- This setting label changes to Set if the assigned Point Type is a Digital Input.
- This setting label changes to Active if the assigned Point Type is a Digital Output.
Inactive: Select the icon you want to display when this point is in a reset condition. Click the
drop-down list to display a list of currently available icons. You may add more icons by
clicking Add New Icon to Database.
•
•
used in the previous three fields to represent a specific alarm state.
You can navigate between the Alarm Monitor Form and Alarm Graphics by clicking the right mouse
button.
Alarm Graphics Viewer
Reference Topics:
Secure Perfect Viewer
Use this form to view an alarm graphics map, as configured on the Alarm Graphics Editor Form. This is a
separate application and can be moved anywhere on your monitor. This is useful for dual-display
monitors or wide monitor display.
•
Alarm Graphics Viewer Toolbar:
File Menu
Exit: Closes the Secure Perfect Viewer application.
This menu conveniently allows access to related Secure Perfect
Operations menu options.
Operations Menu
•
•
•
•
•
Alarm Graphics Viewer: Use this option to reopen the Alarm
Graphics Viewer Form when you have previously closed the form.
Alarm Monitor: Opens the Alarm Monitor form in the Secure
Perfect windowpane.
Activity Monitor: Opens the Activity Monitor form in the Secure
Perfect windowpane.
Manual Control: Opens the Manual Control form in the Secure
Perfect windowpane.
Alarm Graphics Viewer Form: Indicates that an Alarm Graphics
Viewer Form session is in progress.
Help Menu
Help Topics: Opens the Secure Perfect Help system.
About Secure Perfect: Opens the About Secure Perfect window in the
Secure Perfect windowpane and displays the Secure Perfect version,
service pack number, copyright information, licensing information, and
Secure Perfect 6.1.1 User Manual
28
contact information.
Magnification
Slide to zoom out or zoom in, on the map view currently displayed.
Once you have zoomed in or increased the size of the map, the
navigation bars on the side and bottom of the map windowpane
become available. To return the map to the original size, use the
magnification slide.
Map Taller
Click to change the width to height ratio; the map displays as taller and
the width narrows.
Map Shorter
Click to change the width to height ratio; the map becomes shorter and
spreads in width.
•
•
The Secure Perfect Viewer application window opens with a maximized Alarm Graphics Viewer Form
window inside. Click the controls in the top-right corner of the Alarm Graphics Viewer Form window to
minimize, return to maximized, or close. To reopen, select Alarm Graphics Viewer from the Secure
Perfect Viewer toolbar, Operations menu.
Select a map from the Map drop-down list to display in the Viewer windowpane. The Viewer
application is limited to one windowpane. For shortcut menu functionality, move your mouse pointer to
an assigned point and right-click. The menus that display with a right-click mouse button depend on
the Point Type assigned.
•
•
If another map is linked to an icon, click the icon to display the linked map.
Click the controls in the top-right corner of this window to minimize, return to maximized, or close the
Secure Perfect Viewer window.
Alarm Monitoring
Overview
Reference Topics:
Alarm Monitor
The Alarm Monitor Form displays alarm activity.
• An operator can see alarms on the Alarm Monitor Form only for facilities that are currently active
and assigned to the current operator.
• The option to monitor an alarm must be selected on the Alarm Form in order for a specific alarm to
display on the Alarm Monitor Form.
• Alarms do not display on the Alarm Monitor Form if the selection to monitor an alarm is removed,
even though Alarm Routing and Bumping may be configured.
All responses can be obtained from the Administration Report, with ‘Response’ as the selected report
type.
Secure Perfect 6.1.1 User Manual
29
Alarm Monitoring Using the Alarm Monitor Form
Reference Topics:
For a shortcut menu to the functions available within the Alarm Monitor Form or to a related form,
click the right mouse button within the first windowpane where the alarms display or the second pane
where the messages display. Not all options will be available. You must select an alarm activity with a
DVR association in order to enable video options on the shortcut menu.
Click the Show me icon to view a step-by-step animated demo.
There are three sections to the Alarm Monitor Form:
•
•
•
The top section or pane lists the alarms.
The second pane lists any instructions assigned to the current (highlighted) alarm.
The third pane allows you to respond to an alarm by either selecting a predefined response
or entering your own.
Column Headings: (These are read-only categories for display purposes and cannot be used for
sorting.)
Priority
Displays the priority of the alarm. The priority tells the system in which order it should alert the operator
when multiple alarms occur simultaneously. The priority range is 0 to 9 and the lower the number, the
higher the priority of the alarm.
Description
Displays the alarm description. Refer to the following examples:
•
Tamper Alarm: mmm-b-pp Tamperwhere mmmmrepresents the micro number to which this alarm
is associated, brepresents the board number, pprepresents the point or device number, and
Tamperis the alarm description.
•
Regional Failover on a Global System: bcttestpc–Region Failover Alarmwhere
bcttestpcis the PC Name of the client that has failed over to its configured backup Region, and
Region Failover Alarmis the alarm desciption.
If an event trigger has been defined for associating video with transactions from specified alarm(s), a
camera icon will display as part of the alarm description. When selecting an alarm transaction
identified with an alarm icon, right-click to display a shortcut menu, then select a video option.
Reference
Displays additional information relating to the type of badge alarm. Only reader alarms have a reference,
such as a person name or badge number. This column may be blank.
Alarm State
Displays the current state of the alarm. The four possible states are as follows:
•
Alarm: The point is in the Active alarm state (either Closed or Opened). The Active alarm
state for an alarm is defined on the Alarm Form.
•
•
•
Reset: The point is no longer in the active alarm state.
Cut: The wiring to the alarm point has been cut.
Short: The wiring to the alarm point has been short circuited.
Process State
The process state is either Unacknowledged or Acknowledged. To acknowledge an alarm, select the
desired alarm and click Acknowledge. The alarm icon will change to reflect the acknowledgement and
clear from the window after reset.
Secure Perfect 6.1.1 User Manual
30
Count
The number of times the alarm has entered an alarm state since the alarm was last cleared from the
Alarm Monitor.
Host Date/Time
The date and time the alarm occurred according to the system date and time.
Micro Date/Time
The date and time the alarm occurred according to the micro’s date and time.
Instructions
Displays the instructions linked to the current alarm. When an alarm is displayed on the Alarm Monitor
Form, select the alarm. The alarm instructions set up for this alarm will display in the Instruction
windowpane, providing guidelines for the operator to resolve the alarm condition. Predefined Instructions
were created on the Instruction Form of the Administration menu.
Response
This is a multi-line dialog box, allowing you to manually enter a response of up to 256 alphanumeric
characters, for the current alarm.
Response Button
Click to display a list of predefined responses. Predefined responses are created on the Alarm Response
Form of the Administration menu. If the entire list does not fit, scroll bars become available on the right of
the window. Select a response and click OK for the selected response to display in the Response
windowpane of the Alarm Monitor Form.
•
You can manually extend the response by placing your cursor at the end of the entry and
appending to a maximum of 256 alphanumeric characters.
•
•
You can append an additional predefined response without overwriting the existing entry.
When you append an additional predefined response to the existing entry, a warning
message displays if the response exceeds 256 characters. The additional response will not
be appended.
The selected response is recorded in alarm history when the alarm is acknowledged.
Acknowledge
Click to acknowledge an alarm. Forced acknowledgement to an alarm is required only if the Operator
Acknowledge check box has been checked to enable this function on the Alarm Form.
Secure Perfect 6.1.1 User Manual
31
Changing Operator Password
Change Password
Reference Topic:
Operations Menu
This dialog box is available only if this operator has permission to change the operator password, as
assigned on the Operator tab of the Operator Form.
This dialog box allows you to change the password of the operator currently logged in.
Because it is difficult to retrieve, it is very important that operators remember their login password,
exactly as created. The password is case sensitive. Create a password and write it down or store in a
safe place. The assigned password cannot match any previous five passwords.
•
•
•
•
Old password: Enter the current password.
New password: Enter the new password you will use going forward.
Confirm new password: Re-enter the new password.
Password Rules: The parameters displayed in this dialog box were assigned on the
Password tab of the Parameters Form.
An error message displays all rule violations if an attempt to change the operator password violates any
of the parameters.
Secure Perfect 6.1.1 User Manual
32
Client Monitoring
Client Monitoring
Reference Topics:
Client Monitor Form
Use this form to obtain client information, such as client type, Imaging status, and connection status. A
client is a computer that has all the functionality of the server but does not store the Secure Perfect
database and it does not validate license information.
For a shortcut menu to related functions, select an entry and then click the right mouse button.
Element
Client
Description
Name of the networked computer. To delete, client must have a
connection Status of Not Connected.
When adding clients on the Client Form, the PCName must
exactly match the network name of the computer, in order for
connection to be made.
Active Client
This column displays an entry when a client failed and a backup
client is now hosting its devices.
•
•
The column displays the currently active hostname.
If a backup attempt to a backup client failed, the column
displays [Hostname] Backup Failed where Hostname = the
backup client that was unable to host devices for the failed
default host.
•
During the process of recovery to the default client, the column
displays [Hostname] <recovering>. This only displays at the
default client computer.
Type of client: Secure Perfect or CCTV.
Client Type
Imaging Status
Shows whether the client currently has Imaging capabilities. To
change the Imaging status, the client must have a connection status
of Not Connected.
Enabled: This client has Imaging capabilities, that is, you can
capture, design, and print using this computer.
Disabled: This client does NOT have Imaging capabilities.
Thin Client
Status
Displays whether this client is licensed for Thin Client terminal
services.
Connection
Status
Current status of the connection between the client and the server:
•
•
Connected: The client and server are communicating.
Not Connected: The client and server are not communicating.
Description
Region
Displays the description of the Secure Perfect client.
This is a Global system and this is the name of the Region for this
client.
Active Region
This column displays an entry when a Regional Database Server
has failed and a backup Server is now hosting the database.
•
•
The column displays the currently active Region.
Secure Perfect 6.1.1 User Manual
33
File Server
Hosting
Display name of the File Server that is hosting the database for this
client.
Mode
Displays the status of the Mode for this client.
Primary Com
Port
Displays the primary communications port used for CCTV serial
interface.
Secondary Com
Port
Displays the secondary communications port used for CCTV serial
interface.
Connection
Information
Licenses Used: The number of clients currently connected to the
server. (CCTV interface clients do not count against client licenses.)
Client Licenses: The total number of licenses authorized.
Imaging
Information
Licenses Used: The number of clients currently given Imaging
permissions.
Imaging Licenses: The total number of Imaging licenses authorized.
Thin Client
Information
Licenses used: The number of host computers enabled with the
Thin Client option.
Thin Client Licenses: The number of Thin Client licenses
authorized.
Secure Perfect 6.1.1 User Manual
34
Digital Input Status Configuration
Digital Input Status
Reference Topic:
Digital inputs are physical sensing devices, such as door sensors or motion sensors, used to monitor an
electronic contact connected to a micro. Refer to your micro installation for information on how to connect
a digital input device to the micro.
The Digital Input Status Form provides a snapshot of the current status in the micros (active or inactive)
and physical state (open or closed) of a digital input (contact). Once you have set up your digital inputs
and alarms, you will need to verify the accuracy of your configuration.
Digital Output Status Configuration
Digital Output Status
Reference Topic:
The Digital Output Status Form provides a snapshot of the current digital output status in the micros. A
digital output represents an external device, such as lights, sirens, and door strikes that may be
connected to the micro.
Digital Video Viewer Program Configuration
Digital Video Viewer Application
The Digital Video Viewer application can be accessed from the Operations menu and by clicking the
camera icon from the toolbar.
Refer to the Digital Video Viewer Help system for additional information and features of this
program, including window management, PTZ control, and event tagging.
Secure Perfect 6.1.1 User Manual
35
Enable Alarm Video Window
Enable Alarm Video Pop-up
Related Topic:
Operations Menu
Select this item to enable/disable an automatic live video pop-up window when an alarm occurs with an
associated alarm trigger. By default, this is a toggle option and is not selected. This option must also be
activated by selection of Video Window Auto Pop-up on the Event Trigger Form, if the operator has
been assigned permission for Digital Video Viewer.
If operator permission for Digital Video Viewer is not made available, this option will not activate even
though selected here. Once selected, the operator login will retain this feature until disabled, no matter
which computer in the Secure Perfect system was used for logging in.
Manually Control - Doors, DOs, Alarms, DIs, Intrusion Zones
Overview
Reference Topics:
Manual Control Form
The Manual Control Form allows the operator to perform the following, depending on the operator’s
•
Manually lock/unlock doors.
Click the Show me icon to view a step-by-step animated
demo.
•
•
•
•
•
•
Turn on/off DO (digital output).
Monitor on/off alarms and alarm groups.
Enable/disable DI inputs.
Arm/disarm Intrusion Zones.
Change the mode of a micro.
Start/stop a Guard Tour.
Refer to the individual tab controls for additional information regarding the available functions.
Secure Perfect 6.1.1 User Manual
36
Micro Monitoring
Overview
Reference Topics:
Micro Utility Form
The Micro Utility Form allows you to view all types of micros, the activities of those micros, monitor
communications, and control each micro in the system. Using the Micro Utility Form, you have the
capability to select, sort, and display only the micros that you want to view, and then save that view. The
first time the Micro Utility Form is opened for viewing, all micros will be displayed if their number is equal
to or less than 64.
Micro Monitoring Using the Micro Utility Form
Reference Topics:
Operations Menu
For a shortcut menu to functions available within the Micro Utility Form, select a micro from the list
and right-click.
The icon to the left of the description represents the type of micro. The table below explains the micro
types.
Icons
Symbolize
a direct-connect micro
a dial-up micro
a network micro
Column Headings:
Description: Description assigned to the micro when defined on the Micro Form.
Active Hostname: The name of the computer that controls communications to the micro. (For those
have a different name than the Default Hostnamecomputer.)
Redundancy.) The hostname displayed is the computer that normally hosts this micro. The icon image
displays in green when the micros are controlled by the originating host. The icon image displays in
yellow to signify a failed system. The backup client computer listed in the Active Hostnamecolumn is
controlling the dial-up and network+dialup micros for this computer.
Firmware version: The version of firmware operating the micro.
Secure Perfect 6.1.1 User Manual
37
Address: Physical address assigned to the micro when defined.
State: Current state of the communications with the micro.
• Online means that the host will attempt to communicate with the micro.
• Offline means that the host will not attempt to communicate with the micro.
• Error means that there is a communications problem.
Connection messages include the following:
• Connected - micro is online and working.
• Shut down - No connection.
• Create port - trying to open a physical medium.
• Set up connection - physical medium is open.
• Tear down connection - connection is in the process of being closed.
• Waiting for call.
• Dialing.
• Retrying call.
• Destroy port – physical medium is being closed.
Status shows what is happening between the host and the micro. Messages include the following:
• Alarm download.
• Alarm message download.
• Badge download.
• DO download.
• DO group download.
• Download start.
• Elevator download.
• Error.
• Flash Error (See Diagnostic Log)
• Flashing Micro. (The entry includes the percent of flash download complete.)
• Flashing Completed.
• Idle.
• Incorrect micro type.
• Inquiry.
• Normal.
• Password download.
• Reader download.
• Reset.
• Schedule download.
• Telephone download.
• There are less then 4 passwords defined.
Mode: This is the current mode or state of the micro. The mode will be Normal, Mode 1, Mode 2, or
Mode 3, as previously defined on the Mode Schedule Form or by a manual control command.
Comm device messages include the following:
• If this is a direct-connect micro, lists the COM port to which this micro is connected.
• If this is a dial-up micro, the text Dial-Up will be displayed.
• If this is a network micro, the IP address of the micro will be displayed.
• If this is a network + direct micro, the IP address displays. If the micro loses network connection
and fails over to a direct connect, in approximately two minutes, the display changes from the IP
address to COM port. When a failover occurs, a yellow LED displays in the COM address column.
• If this is a network + network micro, the IP address displays. If the micro loses network
connection, fails over to a secondary network IP address, the display changes to the secondary IP
address. When a failover occurs, a yellow LED displays in the COM address column.
If a host computer is licensed for Client Redundancy, has assigned a backup client, and a
failover occurs, a failover COM port displays.
Secure Perfect 6.1.1 User Manual
38
Head Of Line
•
•
If the micro is defined as head-of-line, this field will be blank.
If the selected micro is not head-of-line, this field contains a description of the micro that is the head
of this line.
Message Count
This field will display the number of messages waiting to be sent to a selected micro.
Selecting Facilities
Select Facilities
Reference Topic:
Set Active Facilities Dialog Box
This dialog box allows you to select the active facilities (those you want to assign to the current operator)
from a list of facilities available for assignment, as set using the Operator Form.
•
•
Select, then click the right arrow to assign an available facility.
Select, then click the left arrow to unassign a facility.
Available
This column lists all facilities that have been assigned to the current operator.
Active
This column lists the facilities that are currently active. Only those access rights that are assigned to the
facilities listed in this column will be available.
Secure Perfect 6.1.1 User Manual
39
Devices
Configuring Devices
In case of a default host computer that has failed, devices that have been added to this default host
computer during the failover cannot come online until the default host has recovered and a system
recovery notification is received.
The following order is recommended for completion of Secure Perfect device configuration:
1. Create micro records (Additional device records can be configured following the creation of micro
records.)
Alarms
Overview
Reference Topic:
Alarms
An alarm is a notification that something has happened within SP. An alarm occurs when a defined
device, such as a digital input changes to a state defined as the alarm state. For example, if a digital input
alarm state is defined as Open in the Active State, then an alarm occurs when the state changes to
Open. Alarms can also be used for nonmicro related events such as CCTV alarms. Most alarms are tied
to digital output points associated with devices such as switches and motion detectors.
Not all alarms will be present at the same time, and are determined by the boards installed in the
micro.
When you set up your micro, some alarms are automatically set up for you. The Alarm Form is used to
modify an alarm record. However, alarms for digital inputs must be set up manually using the Digital Input
Form.
Secure Perfect 6.1.1 User Manual
40
Alarm Form Completion
Reference Topics:
Editing or Modifying Alarm Records on the Alarm Form
Use the Alarm Form to modify an alarm record. With the exception of external alarms, you cannot delete
alarm records; alarms are managed by the owner of the alarm record. The alarm owner can be an API,
board, CCTV Interface, digital input, Kalatel camera, Kalatel DVMR, micro, or reader. For an alarm to
display on the Alarm Monitor Form, you can either select the Monitor field on the Alarm Form or schedule
the alarm to be monitored. The alarm will now display if it is set to be monitored and changes to an alarm
condition.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Time Schedules Form or Events
Form, all schedule or event records will display.
To search for, view, or edit existing records, click Search. A list of records will display.
Description
When the records are created, the default description is in the format: mmmm-b-ppwhere mmmm
represents the micro number to which this alarm is associated, brepresents the board number, and pp
represents the point or device number.
•
Example: 0001-1-01 Tamper
This tamper alarm is on micro 1, board 1, alarm 1. To change this description, select and enter text over
the existing text and save the record. It is recommended that you keep the mmmm-b-ppprefix in each
alarm displayed to aid in locating the alarm points on the physical hardware.
•
Example Failover Alarm: BCTTOKYO Failover Alarm
A failover alarm is created when backup clients are assigned to the default client computer. The alarm
record displays the default client computer name as part of the description. This failover alarm indicates
the default client as BCTTOKYO. If the description indicates Region Failover Alarm, the name of
the Regional Database Server is included in the description.
•
Alarm descriptions coming into Secure Perfect from an API can be ambiguous, and the source of the
alarm point may be unclear. It is recommended that you rename API alarm points to correspond to the
actual physical point, to assist in processing and acknowledging when an alarm displays on the Alarm
Monitor.Facility
A facility can be assigned for the alarm from the drop-down list of available facilities for assignment by
this operator.
Secure Perfect 6.1.1 User Manual
41
Alarm Groups
Alarm Groups
Reference Topics:
Alarm Group Form
Alarm groups provide two things: 1) a convenient way of scheduling many alarms at once, and 2) a
means of disabling monitoring in many alarms from a keypad reader. Refer to the reference topic,
Keypad Alarm Shunting, for additional information. When a micro record is created, 16 alarm groups
are also created. You cannot delete an alarm group record. Alarm groups are owned by the associated
micro record. Use the Alarm Group Form to assign events or schedules to alarm groups. See Keypad
Alarm Shunting for more information.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form or Events Form, all
schedule or event records will display.
Click Search to locate and view or edit existing alarm group records.
Description
The description of the alarm group should be unique. When the records are created, the default
description includes the micro to which this alarm group is associated and the number of the alarm group,
for example 0001 Group 1, which represents alarm group one on micro one. All alarms are
automatically assigned alarm group 0. To change this description, type over the existing text and save
the record. It is recommended that you keep the alarm group number and micro number prefix to aid in
locating the alarm points on the physical hardware.
Facility
A facility option can be assigned for the alarm group from the drop-down list of available facilities for
assignment by this operator.
Be very careful when assigning the facility of an alarm group to a different facility than the micro.
You can create an undesired result if you do not fully understand facility assignment.
Secure Perfect 6.1.1 User Manual
42
Cameras
Camera Form
Reference Topics:
Use the Camera Form to edit existing camera parameters. Camera records are automatically created
when a DVR is defined on the Digital Video Recorder Form. The camera records display in the format
00X-0X Camerawhere 00Xis the DVR address and 0Xis the camera number.
Description
Enter a camera name or click Search to display a list box of existing cameras.
Device description upates are communicated to corresponding alarms, DIs, and DOs. In order for
changes to migrate to additional form windows that may be open at the time of a change, the open
windows should be closed and then re-opened before the device description is able to be seen.
Facility
Digital Inputs
Digital Input Form Completion
Reference Topics:
Digital inputs are physical sensing devices, such as door sensors or motion sensors, used to monitor an
electronic contact connected to a micro. When a micro record is created, digital input records are also
created. Use the Digital Input Form to modify a digital input record. You cannot delete digital input
records. The digital inputs are managed by the associated micro record. The number of digital inputs is
based on the micro you set up and boards that the micro contains.
The alarms for digital inputs are not created automatically when you set up a micro. Set the Type field to
Alarmand then save the record. The associated alarm record is created. Refer to the Micro Installation
Guide for information on how to connect a digital input device to the micro.
For a shortcut menu to related forms, move the mouse pointer below any tab and click the right
mouse button. If you are using this shortcut menu to get to the Time Schedules Form or Events Form, all
schedule or event records will display.
To view and edit existing records, click Search. A list of records displays.
Secure Perfect 6.1.1 User Manual
43
Description
When the records are created, the default description is in the format: mmmm-b-ppwhere mmmm
represents the micro number to which this digital input is associated, brepresents the board number, and
pprepresents the point or device number.
Example: 0001-1-01 DI
This digital input is on micro 1, board 1, point 1. To change or add to this description, enter text over the
existing text and save the record. It is recommended that you keep the mmmm-b-ppprefix in each digital
input displayed to aid in locating the alarm points on the physical hardware. This field accepts a
maximum of 64 characters.
Facility
The same facility is assigned for all devices associated with the micro when a micro is created.
Be very careful when assigning the facility of a DI to a different facility than the micro. You can
create an undesired result if you do not fully understand facility assignment.
Digital Outputs
Digital Output Form
Reference Topics:
Device Menu
A digital output represents an external device, such as lights, sirens and door strikes that may be
connected to the micro. Refer to your micro installation manual for information on how to connect a digital
output device to the micro. The digital outputs available depend on the micro setup and readers used.
Use the Digital Output Form to search and view or modify an existing digital output record.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form, all schedule
records will display.
Description
When the records are created, the default description is in the format: mmmm-b-ppwhere mmmm
represents the micro number to which this digital output is associated, brepresents the board number,
and pprepresents the point or device number.
Example: 0001-1-01 DO
This digital output is on micro 1, board 1, point 1. To change this description, type over the existing text
and save the record. It is recommended that you keep the mmm-b-ppprefix in each digital output
description displayed to aid in locating the alarm points on the physical hardware. This field accepts a
maximum of 32 characters.
Facility
A facility option can be assigned for your new Digital Output record from the Facility drop-down list.
Be very careful when assigning the facility of a digital output to a different facility than the micro.
You can create an undesired result if you do not fully understand facility assignment.
Secure Perfect 6.1.1 User Manual
44
Digital Output Groups
Digital Output Group Form
Reference Topics:
Digital output groups provide an easy, convenient way of scheduling many digital outputs at once. To
create digital output groups, manually create the groups and then assign the digital outputs to them. Use
the Digital Output Group Form to assign digital outputs to a group and schedules to digital output groups.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button. If you are using this shortcut menu to get to the Schedules Form, all schedule records will
display.
To locate and view existing records, click Search button. A list of records will display. You can either click
the Add button to add a new record OR search and view or change an existing record.
Description
Assign a unique description to the digital output group.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
If you assign DOs that belong to a different facility, you may be creating an undesired result; not all
DOs will be visible under certain facilities.
Digital Video Recorders
Overview
Reference Topic:
Digital Video Surveillance
Digital video surveillance is integrated into the Secure Perfect system and requires its own hardware and
software. The system supports the following Kalatel digital video multiplexer/recorders:
Kalatel DVMRe-4 CD
Kalatel DVMRe-10 CD
Kalatel DVMRe-16 CD
(Requires duplex PPC firmware Version 3.18 or later and MUX firmware Version 3.24 or later.)
Kalatel DVMRe-4 CT
Kalatel DVMRe-10 CT
Kalatel DVMRe-16 CT
(Requires triplex firmware Version 5.xx or later. Kalatel DVMRe Matrix is supported as a 16 CT recorder.)
Increasing the processor speed and memory on the Secure Perfect Server and/or client workstations
may be required for optimizing performance in your specific application.
The Digital Video Recorder Form allows you to configure integrated digital video surveillance within SP.
This option provides event-driven video recording, allowing you to access and control live and recorded
video and initiate camera control at any workstation within a Secure Perfect system.
Secure Perfect 6.1.1 User Manual
45
SP Professional Edition supports up to 16 licensed DVR connections.
EZ Edition supports up to 8 licensed DVR connections.
The following order is recommended for configuration of an SP Editions DVR system:
1. Set up operators and permissions.
2. Configure the DVR.
3. Configure DVR devices. DVR devices can be hosted on the SP Server computer and/or client
workstations. The actual number of DVR devices hosted on each Server computer may vary.
Distributing DVR hosting across multiple computers may be required for optimizing system
performance in your specific application.
4. Create preset records.
5. Configure cameras.
6. Set up event triggers.
7. OPTIONAL: Set up alarm graphics.
Digital Video Recorder Form Completion
Reference Topics:
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button.
Click Search to display or change an existing record or click Add to add a new record and display default
values.
Description
Enter a unique descriptive name for your DVR in the Description field.
Facility
A facility option can be assigned for your new DVR from the Facility drop-down list. When you change a
facility designation, it changes the facility for the DVR only. You receive a message displaying, Do other
devices change to the same facility as the digital video recorder? Select Yes or No. If you select
Yes, the alarm record and camera records will change as well. You will need to verify the accuracy of the
revised records.
The Digital Video Recorder Form contains the tabs listed below. Complete each tab in the order they are
listed.
Refer to the Digital Video Viewer Help file for additional information about features of PTZ control and
event tagging.
Secure Perfect 6.1.1 User Manual
46
Elevator Management
Overview
Reference Topics:
Elevators
The first step in configuring elevator control is setting up floors. The Floor Form of the Administration
menu allows you to set up floors.
Now, you can configure the elevator records. You will use the Elevator Form to configure elevator
records. Here, you select the method of elevator control, the readers, and the floors that will be used. You
can set a reader for elevator control using this form only. When you return to the Reader Form and
display a corresponding reader record, you will notice that all other options in the Logical Type section
are not available.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) must be on the same micro.
The type of boards you want to use in your dedicated micro (DO only or a combination of DO and DI
boards) determines the number of floors available. After installing the CPU board, the
Power/Communication board, and at least one reader board, there are four slots available that can be
used for digital input boards or a combination of digital input boards and digital output boards.
Methods of Elevator Control
There are three methods of implementing elevator control:
No Floor Tracking Method
With this method, you define the floors available and define a digital output for each floor. Only digital
outputs provided by the 16 DO board can be used. In addition, each DO can by used in only one
elevator and mapped to only one floor. The number of floors is limited by the number of 16 DO boards
that can be placed in the micro; the maximum is four. Therefore, the maximum number of floors
available is 64 (4 boards x 16 DOs = 64 DOs).
Floor Tracking by Input
Define the floors available, then define a digital input and digital output for each floor. The digital
inputs are used for floor selection. Only digital inputs provided by the 20 DI board can be used for floor
selection and each digital input can by used for only one elevator and mapped to only one floor. The
digital outputs are used to control where the elevator moves. Only digital outputs provided by the 16
DO board can be used, and each digital output can only be used in one elevator and mapped to one
floor. Using this method, a maximum of 32 floors can be supported (2 boards x 16 DOs = 32 DOs).
Floor Tracking by Keypad
Define the floors available and define a digital output for each floor. The reader’s keypad is used to
select the desired floor. Only digital outputs provided by the 16 DO board can be used. In addition,
each DO can be used in only one floor. The number of floors is limited by the number of 16 DO boards
that can be placed in the micro; the maximum if four. Therefore, the maximum number of floors
available is 64 (4 boards x 16 DOs = 64 DOs).
Floor Tab of Access Right Form
On the Personnel menu, select Access Right to open the Access Right Form, Floor tab to assign access
rights to elevators and floors. Select from the Available list those elevators you want to use with the form.
The elevators that display in this list are those that are set up on the Elevator Form. Floors and DOs can
be assigned an access right to define which floors a person can access and what DOs a person can
trigger with a valid badge.
Secure Perfect 6.1.1 User Manual
47
Elevator Form
Reference Topics:
Use this form to create or modify an elevator record.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) must be on the same micro.
Description
To locate and view existing records, click Search. A list of records will display. You can search and view
or edit an existing record.
Micros
Overview
Reference Topics:
Micros
Micro records can be created within Secure Perfect without having the micros attached and
configured. Additional device records can be configured after creating micro records.
Micros control access through the use of devices such as badge readers, alarm points, and output points
physically wired to the micro, which is then connected to the host by one of the following methods:
1. Directly
2. Using RS-232 cabling through a modem
3. Through a network
Secure Perfect provides a micro auto-configuration feature, allowing you to set up the database with the
exact board configuration that you selected during the micro configuration process. When you create a
micro record, only those records for the associated devices (readers, alarms, alarm groups, and digital
outputs) supported by the micro’s configuration are created. The auto-configuration feature anticipates
your configuration requirements. For example, the Micro/PX2000 is a single-board microcontroller. Other
boards do not display for selection, as shown in the image below. This board address is 2.
Secure Perfect 6.1.1 User Manual
48
In this example, notice the DI records created automatically when the Micro/PX2000 record was saved.
The Micro Form contains a combination of tabs. The settings selected on the Micro Definition tab
determine which tabs display.
Note that any time a badge that is not in a micro is presented to a reader, it is reported as unknown and
the host sends the badge to the micro. This happens regardless of the Badge Loading option. The micros
can store only a limited number of badges. When a previously unknown badge is sent to a micro whose
badge capacity is exceeded, the micro randomly chooses a badge to delete to make room for the new
badge. The badge is deleted from the micro but not from the Secure Perfect system.
Secure Perfect 6.1.1 User Manual
49
Micro Form Completion
Reference Topics:
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form or Events Form, all
schedule or event records will display.
ADDING OR MODIFYING A RECORD:
Description
The description of the micro should be unique and include where the micro is located and/or how it is
used.
Example: 1 - Building A2 North Telco Closet could represent Micro 1 located in Building A2
North in the Telco Closet.
Facility
A facility option can be assigned for your new micro record from the Facility drop-down list. All devices,
such as readers, alarms, and DIs added with the micro will belong to the same facility as the micro. If you
edit the Facility option on an existing micro record, a messages displays, Do other devices change to
the same facility as the micro? If you select Yes, all associated devices and alarms will change to
newly assigned facility. If you select No, the facility change takes place only on the micro record.
Secure Perfect 6.1.1 User Manual
50
Readers
Readers Overview
Reference Topics:
Readers Form
Readers are the devices that interpret the encoded numbers on badges. Readers are usually located
near doors or gates that the system controls. Badges are presented to the readers in order to gain
access through a door.
When a micro record is created, reader records are also created. The number of records depends on the
micro you configure and the reader boards that the micro contains. The reader is automatically enabled
as Online and Active, and configured to accept badge transactions when a reader record is created. The
number of active readers counts against your reader limit. For example, if your license key allows the use
of 128 readers, you may have only 128 readers marked as active.
When the total of all reader records equals the maximum number of active readers allowed by your
license, you will receive a warning message.
The reader record controls both the physical reader and how the door locks and unlocks. See your micro
and reader installation manual for information on how to connect readers to a micro. Use the Reader
Form to modify the reader configuration.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button. If you are using this shortcut menu to get to the Schedules Form or Events Form, all
schedule or event records will display.
ADDING OR MODIFYING A RECORD:
Click Search to display a list of previously created reader records. You can either click Add on the
Secure Perfect toolbar to add a new record OR modify an existing record.
Description
When reader records are created, the default description is in the format: mmmm-b-ppwhere mmmm
represents the micro number to which this reader is associated, brepresents the board number, and pp
represents the reader number.
Example: 0001-1-01 Reader
This reader is on micro 1, board 1, reader 1. To change or add to this description, select and enter text
over the existing text and save the record. It is recommended that you keep the mmmm-b-ppprefix in
each reader displayed to aid in locating the reader points on the physical hardware. This field accepts a
maximum of 64 characters.
Facility
A facility option can be assigned for your new Reader record from the drop-down list of available facilities
for assignment by this operator.
Secure Perfect 6.1.1 User Manual
51
Person Records Creation
Access Rights
Reference Topics:
Access Right Form
Use this form to create access rights to define where (with readers) and when (with time schedules) an
individual can gain entry. Floors and digital output groups can be assigned to an access right to define
which floors a person can access and what digital output groups a person can trigger with a valid badge.
Intrusion Zones can be assigned to an access right, allowing the ability to arm/disarm (with a reader) the
zone and access to a particular zone.
ADDING OR MODIFYING A RECORD:
Description
Click Add to add and assign a unique title to this record or Search to display or change an existing
record.
Facility
You can assign a facility from the drop-down list of those facilities available for assignment by this
operator.
For a shortcut menu to related forms, move the mouse pointer below any tab and right-click.
Departments
Reference Topic:
The Department Form allows you to create a department that you can then assign to a person record
using the Person Form. Department selection can also be used to group records when running a Person
Report.
ADDING OR MODIFYING A RECORD:
Click Search to display a list of previously created Departments. You can either click Add on the Secure
Perfect toolbar to add a new Department record OR modify an existing record.
Facility
A facility option can be assigned for the Department from the drop-down list of available facilities for
assignment by this operator.
Secure Perfect 6.1.1 User Manual
52
Person Records Creation
Reference Topics:
Person Form
Use this form to create a record for a person, someone who can access the readers controlled by the
Secure Perfect system. Click Add to add a new record or click Search to display a list of previously
created person records to review or modify.
Click the Show me icon to view a step-by-step animated demo.
Last Name
Enter the last name of the individual record you are creating. This is a required field.
A facility option can be assigned to this record from the drop-down list of available facilities for
assignment by this operator.
For a shortcut menu to related forms, right-click below any of the tabs on this form.
Personnel Type Assignment
Reference Topic:
Personnel Type Form
This form is used to create category types for employees and assign default badge designs for each
category.
Secure Perfect 6.1.1 User Manual
53
Badging
Badge Alias Form
Reference Topic:
This form is available only if aliasing option was elected during initial Secure Perfect Server
installation.
Use this form to control the alias numbers that will display in place of the encoded badge number. An
alias is a number that represents the encoded badge number. You decided whether to use badge alias
and which method during installation of SP. If you chose None, this form is unavailable in the Secure
Perfect program.
Badge alias provides added security in that the encoded number is displayed only to authorized users.
The encoded badge number is hidden on the Badge Form, reports, and Activity Monitor Form. There are
two methods of using badge alias:
Manual: Enter the badge alias number on this form.
Automatic: The badge alias number is chosen for you.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Badge Design
Reference Topics:
Complete the Badge Design Form to create badge designs. Badge designs are the graphics printed on
badges. You may want to use different graphics for different types of personnel, such as a specific
graphic for regular employees and a different graphic for contract employees within your organization.
Element
Search
Add
Description
Displays existing records.
Configure a new Badge Design record. Default values display for you.
Delete
Delete a selected Badge Design record from the list in the windowpane on the right,
that is no longer required or applicable.
Secure Perfect 6.1.1 User Manual
54
Description
Enter a unique or suggestive description for this badge design. The field accepts 1 to
32 characters.
During installation of Badge Designer, four standard badge designs are included, in
the Designs folder of Secure Perfect:
•
Landscape
Portrait
No Design
Wanted Poster
•
•
•
Do one of the following:
•
•
•
Select from the list of existing standard design records.
Select and edit a standard design by renaming and saving.
Create a new design.
When you add a design, enter a desciption and click Save to enable the Edit
Badge Design button on this form.
Facility
this operator. If you do not select a facility, Ignore Facilities will be assigned for you.
Badge Design Creation Overview
The Badge Design application has an extensive Help system to assist in designing your badge layout,
import graphics, link designs to badgeholder information, and add barcodes or encode magnetic stripes.
This topic is an abridged summary of the badge design process.
To create your own simple badge design:
1. Select Badge Design from the Secure Perfect Personnel menu.
2. The Badge Design Form, Design tab displays.
3. Click Add and enter a unique Description, then click Save. The Edit Badge Design button is now
enabled.
Click Edit Badge Design to run the Badge Design application.
1. Select New from Imaging File menu.
2. Draw a shape in your design window the size of your badge.
3. For a background color, select Edit, Background, then select a color from Color dialog that
displays.
4. Add one or several bitmaps inside the badge design parameters.
5. Add one or several text boxes.
6. Move or resize the photo and text as desired.
7. Click Save.
Secure Perfect 6.1.1 User Manual
55
Badging Overview
Reference Topic:
Badge Form
A badge identifies a person to SP. This is usually a card with an embedded number that uniquely
identifies the card. However, the badge does not have to be a card; it could be a unique number that is
entered into a keypad reader. The Badge Form is used to define a badge by entering specific
information, such as the badge number and the person to whom this badge is assigned. Click Add to add
a new record or click Search to display a list of previously created badge records to review or modify.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Description:
Enter a unique description of the badge, person name, or badge type. This is a required field and this
record will not save without an entry in this dialog box. If you attempt to save a record without a
description, a dialog box displays, asking if you want to use the badge identification number as the
Description. Click Yes to use the badge identification number or return to the form and enter a
Description of your choice. (If you are entering badge records before person assignment, consider
entering a badge identification number as the Description.) This dialog box accepts up to 32
alphanumeric characters.
If this is a converted database from an earlier version of Secure Perfect that allowed blank
Description fields, the badge identification number now displays in the Description field of those records.
Facility:
The facility assignment is a read-only field. Facilities are assigned by the operator when creating a
Person record.
Image Capture Overview
Your photographs and signatures can be created by digital cameras, video cameras, and signature
pads. Support for certain Imaging features and functions may be product specific and not necessarily
supported by all compatible peripherals.
Selecting an Input Device
Follow the instructions provided by the device manufacturer for installing an input device. Imaging can
use any device that has a TWAIN, WINTAB, or Video for Windows (VFW) driver installed.
To select an input device:
1. Go to the Personnel menu and select Person. The Person Form displays.
2. Select the Photo tab, then click Search to display a current list of records.
3. Select one of the records in the records list, then click Capture Image/Signature. The Secure
Perfect Image Capture Application screen displays.
4. Using the mouse, point to the photo area and right-click. A context menu displays.
5. Select Input Device from the context menu. A Select Profile window displays, listing the available
input devices on your computer. By default, the input device loads from a file.
Secure Perfect 6.1.1 User Manual
56
6. Select the input device you will be using and click OK. The next time you capture a photo, the
program will use the input device you selected.
7. Repeat these steps to set up an input device for signature pads. The program will recognize a
separate input device for photos and signatures.
To select a record and capture a NEW image for the selected record:
1. Select Person from the Personnel menu.
2. Select the Photo tab on the Person Form.
3. Select ONE of the records in the Record List.
4. Click Capture Image/Signature to capture a new image. Based on the input device you previously
selected, the proper interface window will come up for adjusting, capturing, and loading a new
image.
5. Adjust, then save the adjusted settings.
6. Click Capture Photo to capture the new image. Once the photo is taken, the Image Enhancement
dialog box will display.
7. The dialog box that displays allows you to crop and enhance the newly captured image. You will
notice that a highlighting box with eight sizing handles is placed directly over the center of the
Original Image.
8. Place your mouse pointer over the image. The pointer will change from a single arrow to a four-
headed arrow. This allows you to move the cropping area across the newly acquired image.
9. At this point, you can either capture a different portion of the image "as is," or adjust the highlighting
box to capture some or all of the image.
Refer to the Image Capture Application Help system for additional specific details of this application.
To crop an image:
1. Place your mouse pointer within the highlighting box’s cropping area.
2. Press and hold down your left mouse button, and drag (move) the cropping area to the desired
location on the image. Release the left mouse button when you are satisfied with the new location
of the highlighting box.
3. Click OK. The photo can be placed on either the front or the back of your badge design. To print
the photo, your badge design must include photo image keylines. When you print the badge from
the Secure Perfect application, the keylines are replaced by the image.
To resize the crop box:
1. Place your mouse pointer directly over one of the highlighting box handles. The pointer changes
from a four-headed arrow to a two-headed arrow. This allows you to resize the cropping area.
2. Press and hold down your left mouse button, and drag (move) the handle toward the center of the
cropping area. The size of this highlighting box is fixed to the aspect ratio of the image type: 4 x 5
for photos; 5 x 1 for signatures.
3. When the cropping area is sized to your satisfaction, move the highlighting box so that it covers the
portion of the image that you want to capture.
4. Click OK. The Secure Perfect Image Capture Application screen displays with the selected image
in place. To print the photo, your badge design must include photo image keylines. When you print
the badge from the Secure Perfect application, the keylines are replaced by the image. The photo
can be placed on either the front or the back of your badge design.
5. Click OK. The selected image will be moved to the Photo tab of the Person Form.
6. Click Save. The image capture is saved to the database.
Displaying Existing Images
During normal operations, images are not downloaded from the server. In order to view an existing image
for a badge record, the image(s) must be loaded to the computer. On the Person Form, select the Photo
tab, then click Search, and highlight a record from the record list. Click Capture Image/Signature button
to enable the Secure Perfect Image Capture Application screen. Move the mouse pointer to the existing
image and right-click. A shortcut menu for the image will appear. The available image options on that
menu are discussed in the paragraphs that follow.
Secure Perfect 6.1.1 User Manual
57
Capture
Based on the input device you previously selected, the appropriate interface window will come up for
adjusting, capturing and loading a new image.
Enhance and Crop
These options allow you to individually crop or enhance the current image. You can adjust the existing
image without having to recapture the image.
Compare (and Restore)
When a stored image is downloaded and a new image is captured, the Compare option will be enabled
on the shortcut menu to compare the newly captured or edited image to the original image. Choosing
Restore will undo any changes made to the original image.
Clear
When you select the Clear option from the shortcut menu, the image will be cleared and the image file
will be deleted. (The image cannot be recovered.)
Enhancement Shortcut Menu:
There are four submenus for the Enhancement shortcut menu option.
Adjust by Example
When you select this option, a dialog box will display. You can adjust the brightness, contrast, focus,
exposure, and red, green, and blue colors.
Special Effect by Example
This dialog box allows you to add special effects to any image. The applicable effects are Mosaic,
Impressionist, Watercolor, Emboss, and Posterize.
Remove Red Eye
This dialog box allows you to remove the red eye effect of any person in an image.
Vignette
The Vignette dialog box allows you to configure a vignette effect to any image.
Manipulation Shortcut Menu:
Mirroring
Flip Vertically: Flip an image from top to bottom.
Flip Horizontally: Flip an image from left to right.
Invert (negative)
Select this option to invert an image (create a color negative).
Convert to 8-bit grayscale
Select this option to convert an image to an 8-bit 256-grayscale image. Once this election is selected,
there is no undo. You will have to reload your image.
Save Image
Changes to an existing image or newly captured image are saved to the host when you click Save.
Export To File
When you select this option, a Save As window will display. Navigate to the Secure Perfect Images folder
that contains previously captured photo images. You may select a filename, image format, bit depth, and
JPEG compression factor. When you click Save, the contents of the image control are saved using the
selected settings. If you want, you can replace an existing image.
Select Input Device
This option allows you to select an input device on the Select Profile dialog box, from a list of Capture
Profiles. You may also set and apply automatic properties for the image you are about to capture.
Secure Perfect 6.1.1 User Manual
58
Select Image Type
This dialog box enables you to configure image types in the EPISUITE SDK configuration database. You
can use this dialog box to edit, create, or remove image types. To modify an image type, highlight the
image type name in the list and click Edit to open the Image Type Manager dialog box. Click Add to
create a new image type, or click Remove to delete the highlighted image type.
Revert Changes
When you make any change to the image, the Revert Changes option will be enabled. Otherwise, the
option is dimmed and you will not be able to select it. Selecting this option will reload the original image.
Secure Perfect 6.1.1 User Manual
59
Administration Menu Options
Alarm Instruction Form
Reference Topics:
Alarm instructions are directions on how to react to alarms. Use this form to create messages that will
display on the Alarm Monitor Form whenever the associated alarm occurs.
ADDING OR MODIFYING A NEW RECORD:
Click Add to add a new record OR Search and view or change an existing record.
Facility: A facility can be assigned to your new Alarm Instruction record from the Facility drop-down list.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Alarm Notifier Form
Reference Topics:
Keep in mind that you can use an SMTP Server such as Lotus Notes or SendMail, or even online mail
services such as Yahoo, to send e-mail. Contact your local network administrator to get the SMTP server
name to be used. E-mail sent by Secure Perfect will be sent through this SMTP Server. If you receive an
error message or have a problem with your configuration, contact your local network administrator.
The Alarm Notifier form allows you to:
•
•
•
Assign those alarms and reset conditions that will trigger an e-mail message.
Assign people who will receive that e-mail notification of the alarm/reset condition.
Format the style and content of the e-mail message.
Click Add to add a new record or Search to display or change an existing record.
Description
Enter a unique or suggestive description for this alarm notification.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
For a shortcut menu to related forms, move the mouse pointer below any tab and click the right
mouse button.
Secure Perfect 6.1.1 User Manual
60
Alarm Response Form
Related Topic:
A response describes a reaction to an alarm. The Alarm Response Form allows you to create a list of
frequently used, predefined responses to an alarm, and reduces the need to type an entry. The response
entries that you create will display as selections on the Alarm Monitor Form.
Click Search to view or edit existing response records or click Add to begin a new response record.
A facility can be assigned for the alarm from the drop-down list of available facilities for assignment by
this operator.
Alarm Routing and Bumping Form
Reference Topics:
This form allows you to configure the routing of alarms to one or more Client Groups by time schedule or
at all times. Bumping is a term used to describe forwarding the alarms to an additional location.
• You must have Client Groups configured beforehand.
• You can bump an alarm to one or more Client Groups following a time lapse of an unacknowledged
and unpurged alarm to the Client Groups selected for routing.
• Alarm bumping information is displayed on the Alarm Monitor form in the alarm state column.
You may want to review this Sample Scenario before you begin. This is a routing and bumping schedule
for a business in two buildings (administration building and a factory, working three shifts).
Time
Schedules
Alarms
Route to:
Alarms
Bump to:
Alarms
Bump
After
Group Descriptions:
Client Work Station (WS) #s
8am to 5pm
Group 1
Group 2
Group 2
Group 4
Group 5
Group 6
10 min
5 min
1 min
Group 1
Group 2
WS#1: Front Door - Admin Bldg
WS#3: Front Door - Factory
5pm to Midnight
Midnight to 8am
WS#4: Back Door - Admin Bldg
WS#5: Back Door - Factory
Group 3
Group 4
N/A
WS#2 (Supervisor’s desk -
Admin Bldg, 8am to 5pm)
Group 5
Group 6
WS#6 (Supervisor’s desk -
Factory, 5pm to Midnight)
WS#5 (Supervisor’s desk -
Factory, Midnight to 8am)
Example: An alarm comes in at 8:30am that is configured to be routed to Group 1. The alarm is not
purged or acknowledged; therefore, it is bumped to Group 4 at 8:40am. The transaction is written to
Alarm History.
Secure Perfect 6.1.1 User Manual
61
Complete this form as follows:
Element
Search
Add
Description
Display or change an existing record.
Configure a new alarm routing and/or bumping record. Default values display for
you.
Delete
Delete a selected record from the list in the windowpane on the right that is no
longer required or applicable.
Description
Facility
Enter a unique or suggestive description for this record. The field accepts 1 to 64
characters.
assignment by this operator. If you do not select a facility, Ignore Facilities will be
assigned for you.
API Connections Form
Reference Topics:
This option is purchased individually and licensed with your Secure Perfect system. For complete
details, contact your GE Security Sales Representative.
The number of API records that you can configure is limited to the number of API connections for which
you are licensed. This form allows you to define an interface license for external application integration,
by assigning a description of the API (Application Program Interface) service that has been configured to
communicate with Secure Perfect.
Once configured, real-time event processing and remote command and control functionality extended by
way of the API includes the following:
•
•
•
•
•
•
•
•
Bi-directional alarm event processing for monitoring and acknowledgement
Receiving Secure Perfect access control badge events
Receiving digital input events
Receiving intrusion zone events
Control of alarm point monitoring On/Off
Control of digital input points Enable/Disable
Control of digital output points Open/Close
Control of intrusion zones Arm/Disarm.
An API can be installed on any computer in your Secure Perfect system; however, do not attempt to
install on a domain controller. The installation will not complete properly. Review the system configuration
with your IT Department for alternative reconfiguration options.
Description: Enter the title of the external API. This should be a unique identifier to the product.
Secure Perfect 6.1.1 User Manual
62
Badge Format Form
Reference Topic:
Administration Menu
If you experience difficulty with this form, contact GE Customer Support for assistance.
This form allows an operator to do the following:
• Import or export custom badge records in a Wiegand or magnetic stripe format, into the micros on
your Secure Perfect system.
• Identify the pattern of data bits (mask) of the badge numbers that you will importing or export to your
Secure Perfect system.
• Store standard custom badge format in the Secure Perfect database.
• Interpret data from badges presented at a Wiegand or magnetic stripe reader.
Element
Search
Add
Description
Display or change an existing record.
Configure a new Badge Format record. Default values display for you.
Delete
Delete a selected Badge Format record from the list in the windowpane on the
right, that is no longer required or applicable.
Description
Enter a unique or suggestive description for this badge format. The field accepts 1
to 64 characters.
Example: 33 Bit Indala
Facility
assignment by this operator. If you do not select a facility, Ignore Facilities will be
assigned for you.
Badge Format Tab
Configure the specific mask of this custom badge format. You cannot save this
record until you have completed the entries on this tab.
Camera Preset Form
Reference Topic:
After setup and programming of your DVR devices to meet your monitoring requirements, you will need
to parallel the settings and positions in the Secure Perfect configurations. This form allows you to edit or
enter a description and number for a camera preset. Presets must be defined before you can assign
them to a camera on the Presets tab of the Camera Form.
This option is available for PTZ cameras only.
Description
In this field, enter or edit the description for the selected preset. This should be a unique name describing
or numbering a preset camera position.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
Secure Perfect 6.1.1 User Manual
63
CCTV Alarm Form
Reference Topic:
This form is used for serial interfaces that are interfaced to Secure Perfect. Following installation of
hardware and the CCTV interface software, you must create CCTV alarm records. This form is used to
set up CCTV alarms.
To locate and view existing records, click Search. When a list of records displays, you can edit an
existing record OR click Add to add a new record.
Description: Enter a description of this CCTV interface.
Facility: A facility option can be designated for the CCTV Alarm record from the Facility drop-down list.
Client Form
Reference Topics:
Use this form to add a client to the Secure Perfect network or assign backup clients.
Only systems licensed for Client Redundancy will have the ability to select backup clients.
Element
Search
Add
Description
Click to display and view or edit an existing client record.
Click to add a new record. Note that default values display where appropriate.
Select a Client Name from the right windowpane and click to delete the client record .
Delete
Description*
Enter or edit a unique description for the client you are adding. If you do not enter a
description, this field automatically populates with the PC Name selected on the
Client tab.
Global Edition Client Descriptions: We recommend that your client description
include a meaningful name of the Global or Regional Database Server computer.
When the description displays on the Client Monitor Form, the Global and Regional
Server will be easily identifiable.
Example Description: bcttestpc(client to bcteeserver)
where bcttestpcis the name of the client computer and bcteeserveris the
name of the Regional Database Server for this client.
A facility option can be designated for your new client record from the Facility drop-
down list.
You must restart the Secure Perfect client program for changes to the Auto logoff selection to take
effect.
Secure Perfect 6.1.1 User Manual
64
Client Group Form
Reference Topic:
This form allows you to assign Secure Perfect client computers into logical groups. Members of a Client
Group cannot have conflicting Mode Schedules. A comment box is available for entry to describe the
reason for this group or configuration.
Client groups can be assigned to specific alarm routing and bumping configurations. You may want to
Element
Search
Add
Description
Display or change an existing record.
Configure a new record. Default values display for you.
Delete
Delete a selected record that is no longer required or applicable, from the list in the
windowpane on the right.
Descriptions
Facility
Enter a unique description that identifies this Client Group.
by this operator. If you do not select a facility, Ignore Facilities will be assigned for
you.
Save
You cannot save this record until at least one client is assigned to this group on the
Client Group tab.
Diagnostic Setting Form
Reference Topic:
Use this form to select items to monitor using the DiagView program.
Use this form with care. The more items you turn on for monitoring, the more your system
performance is affected. This is even more important when monitoring port, communications, or micro
items.
Click Search to display a list of components that you can monitor.
Description: Select a component from the list box in the right windowpane. The selected component
displays in the Description field as a read-only entry.
Secure Perfect 6.1.1 User Manual
65
Event Schedule Form
Reference Topic:
An event schedules when an action occurs, such as resetting an anti-passback status, dialing a micro, or
changing a physical reader type. There is no end time associated with an event. Events are comprised of
one or more times on one or more days of the week and modes. Events differ from time schedules in that
events define when an action occurs and time schedules define an interval of time over which an action
occurs. Note that an event can schedule an action multiple times, even within the same day. Once an
event is defined, it may be applied anywhere events are used.
Deleting an event schedule does not affect the current state of any devices currently under the effect
of the deleted event schedule. An event will remain active until another event occurs to change it.
This form is used to create event schedules. Events define the day(s) of the week and time(s) an action
will start. Click Search to display a list of previously created event schedules or Add to add a new event.
Description
Enter a meaningful and unique 32-digit or less alphanumeric description for this event.
Event Tagging Overview
Reference Topic:
When a digital video camera is activated and associated with a reader event or alarm event, the
recording for that activity is tagged. During this tagging process, the camera remains actively recording
and then archives the recording to disk.
Once recorded, the recording can be retrieved by a search option based on the event tag. If the Event
Trigger that activated the tagging was defined as Tag as event instead of Tag only, the DVR would have
changed recording rate to a special event-recording rate for a period of time, as predefined during the
DVR setup and configuration.
When tagged events are identified by a search, retrieved, and viewed, the video playback begins at the
start of the event and continues playing until you elect to discontinue the playback.
Event triggers must be created on the Event Trigger Form, to define the logical rules that will initiate
event-driven video response.
Secure Perfect 6.1.1 User Manual
66
Event Trigger Form Completion
Reference Topics:
The Event Trigger Form opens with the Preset/Camera tab displayed. An event consists of a camera and
either readers, alarms, or zone activity. A trigger causes an event or program routine to be executed,
depending on what options you set on the tabs of this form. Intrusion Zone activities can also trigger an
event.
Example: A camera begins recording in response to an invalid badge transaction. An alarm is recorded
in response to the badge transaction.
Element
Search
Add
Description
Click to display or change an existing record.
Click to add a new record.
Delete
Select and then click to remove an Event Trigger record.
Description
Enter text up to 64 alphanumeric characters in length. The description should convey
specific information relating to a physical location, camera, reader, or state, such as.
Front Door Inv Badge Camera 1 Reader 1
You can assign a reader alarm or camera alarm or both and this can be reflected in
the description of the Trigger.
Save
Following the completion of applicable options for this record, click to save this
record. The selection results display in the columns of the form window on the right.
Facility Form
Reference Topic:
Use this form to define facilities. Your database can be partitioned and related records can be grouped.
These groupings are called facilities. If facilities will be used, you must create Facility definitions in the
Secure Perfect system.
A facility option can be designated on MOST forms throughout the system and any number of
facilities can be defined.
Usually, the system administrator is assigned to all facilities. Operators can be assigned to one or more
facilities and can choose which facilities to be active at any given time. All records have the default Ignore
Facilities, which means the records are not under facility protection; therefore, those records are visible to
all operators.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Secure Perfect 6.1.1 User Manual
67
Floor Form
Reference Topic:
Use this form to associate a description to a floor number.
Click Add to add a new record OR Search and view or change an existing record.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Guard Tour Form
Reference Topics:
Administration Menu
This form is unavailable if you are not licensed for Guard Tour.
A Guard Tour is an inspection of your facility premises, made by a security officer at random intervals.
The officer stops at pre-determined tour points along the way, where a badge must be presented to a
reader or hit a DI point, so that the Secure Perfect system can track the tour progress. Each time the
officer presents a badge to a reader, a tour point is ‘hit.’ The following statements are true of Guard Tour
features:
•
•
•
•
•
Tour Point Form must be configured before a Guard Tour record is configured.
A Guard Tour must be configured before a physical tour can begin.
Tour points can be both readers and DIs.
The same badge must complete the entire tour. A badge can only be assigned to one tour at
a time.
•
•
•
The badge read does not grant access or cause an invalid alarm.
Double-hit points by the tour badge along the tour result in invalid tour transactions.
A tour begins when the Start Point is ‘hit’ or manually started by the operator at a Secure
Perfect computer.
•
A tour ends when all points assigned to the tour are ‘hit,’ or at the expiration of the time
assigned for the duration of the tour. Also, a tour can be ended manually, by the operator at a
Secure Perfect computer.
•
•
•
•
An alarm is generated if a tour is not completed within the assigned maximum tour time.
Badge transactions are stored in badge history and available to generate reports.
DI tour points are assigned to only one tour.
Badges must be assigned to a tour in order to be a tour badge.
Requirements are indicated by an asterisk.
Element
Search
Add
Description
Display or change an existing record.
Configure a new Guard Tour record. Default values display for you.
Delete
Delete a selected Guard Tour record from the list in the windowpane on the right,
that is no longer required or applicable. The associated alarm record for this Guard
Tour is simultaneously deleted.
Secure Perfect 6.1.1 User Manual
68
Description*
Facility
Enter a unique or suggestive description for this tour. The field accepts 1 to 64
characters.
by this operator. If you do not select a facility, Ignore Facilities will be assigned for
you.
Guard Tour Tab*
Configure the specifics of this tour. You cannot save this record until you have
completed the Tour tab.
For a shortcut menu to related forms, move the mouse pointer below any tab and click the right
mouse button.
Intrusion Zone Form Completion
Reference Topics:
Administration Menu
This option opens the Intrusion Zone Form that allows you to create or edit an Intrusion Zone record, then
assign related devices, based on the current operators’ facilities and permissions. If you are modifying an
existing zone configuration, it is recommended that you verify the state of the zone by obtaining a current
status.
For a shortcut menu to related forms, move the mouse pointer below any of the tabs and click the
right mouse button.
Description
Enter a unique description for the Intrusion Zone in this field.
In the process of saving a modified configuration, a dialog box will display: Please note, if zone is
currently armed, this update will disarm and rearm with your new configuration. Do you want to
continue? If you select Yes, the new configuration will save to the database. If you select No, your
changes will not be saved.
Facility
A facility option can be assigned for this intrusion zone record from the drop-down list of available
facilities for this operator.
Secure Perfect 6.1.1 User Manual
69
LogFile Form
Reference Topics:
The LogFile Form allows you to select a computer in your Secure Perfect network, set up a new logfile
(establish an identity for the file), and designate a path and directory in which to place your LogFile. All
log files should be saved in the Secure Perfect/Logsfolder; it will be easier to locate for backups
and upgrades. It is a shared folder, which means other clients can gain access to the log files.
Each client computer will have a set of diagnostic objects that represent what can be monitored on that
machine. Diagnostic objects can be controlled remotely (turned on or off). All diagnostic objects can write
messages to a common default logfile or any diagnostic object can write to a separate log file created
and defined by the user.
Before any logfile can be deleted from Secure Perfect, you must re-assign diagnostic objects to another
logfile.
Mode Schedule Form
Reference Topic:
Mode schedules define the date and time a mode goes into effect. The purpose of a mode is to allow the
micros to operate differently than predefined for Normal mode (Monday through Sunday, which is the
default mode of the Secure Perfect system). Operating modes are an administrative decision, as each
facility has unique requirements. For each mode, Secure Perfect micros will control its devices such as
readers and doors in a predefined way.
You may have a schedule configured, but never see a schedule change if you do not have the
schedule associated with an Alarm Routing and Bumping configuration.
Description: Click Search to edit an existing mode schedule or click New to add a new mode schedule.
• The Host PC and micros may be in different modes at the same time.
• Modes are not partitioned by facilities. If you need to use facilities in your system, create a mode
schedule for each facility. Use the facility description as a prefix on the Mode Schedule Form, in the
Description to indicate to which facility this mode will apply. For example: BocaHQ 8 to 5would
indicate a facility-specific mode, where BocaHQrefers to a geographic location.
• There are four possible modes. Normal is day-of-the-week dependent and it is the default mode for
the Secure Perfect system. The remaining three are not day-of-the-week dependent. Both schedules
and events can be defined in terms of modes. Sunday through Saturday configurations are only in
effect in Normalmode. Then, you could define Mode 1 as Half-Day Holiday, and Mode 2 as
Full-Day Holiday. Mode 3 might be Return to Normal.
Like events, there is no end time associated with a mode. The mode will remain active until changed
by another mode schedule.
Secure Perfect 6.1.1 User Manual
70
Operator Form
Reference Topics:
An operator is an individual who can access and control the Secure Perfect software.
To locate and view existing operator records, click Search. A list of operator records will display. You can
either click Add to add new operators OR search and view or change the existing list of operators on the
Secure Perfect system.
Once a facility is assigned to an operator, it will appear in the Facility field after a successful login by that
operator. Operators are associated with permissions that define the actions operators can perform within
SP. Use this form to configure operator records.
Facility
A facility can be assigned from the drop-down list of available facilities for assignment by this operator.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Override Form
Reference Topic:
Use this form to manually enter an In or Out status for badge transactions that you want to enter into the
history. This information can be used by those who create reports to track, view, and verify employee
transactions, pair In and Out transactions, or review total transactions.
Parameters Form
Reference Topics:
Complete the tabs of the Parameter Form to assign global settings used throughout the Secure Perfect
system. You will want to configure the global system parameters before you begin loading your database
by creating records and assigning permissions.
Secure Perfect 6.1.1 User Manual
71
Permission Form
Reference Topic:
The forms in Secure Perfect will display an icon in the left corner indicating the permissions assigned
to this operator. The form icons correspond to the icons and permissions assigned here.
Use the Permission Form to create permission records.
assigned to operators and define what operators can do within SP.
To locate and view existing permission records, click Search. A list of records will display. You can either
click Add to add a new permission OR search and view or change an existing permission.
Description: Enter a description for the permission.
Secure Perfect comes with a System Administrator permission that allows full action on all forms. You
can create more restrictive permissions and apply the System Administrator permission ONLY to those
operators fully trained in SP.
Secure Perfect 6.1.1 User Manual
72
Region Form
Reference Topics:
This form displays if you are licensed for Global Edition software. Refer to the Secure Perfect Installation
Guide for complete details of the Global Edition features. When a Server computer is added to a Secure
Perfect Global Edition system, Region Form records are also created. You cannot delete a Region Form
record.
The Region Form allows you to assign or edit the frequency of synchronization intervals for your Global
Edition database replication. Global Edition systems can also be configured for database redundancy, at
the Regional level. A Regional Database Server can be configured to have backup Servers in the event
of a failure at the default Regional Server. Additionally, APB options are available for configuration in the
selected Region.
REMINDER: A subscription is a request for a copy of data or database objects to be replicated. It
defines what publication will be received, where, and when. The time that it takes to complete this
process of replication and synchronization is dependent on the amount of data needed to be
synchronized.
Description
Click Search to display a list of Database Servers in your Secure Perfect system. Select one of the
Database Servers from the list box in the right windowpane. The selected server name now displays in
the Description field.
Secure Perfect 6.1.1 User Manual
73
SP Auto Update Configuration Form
Administration Menu
Use this form to configure your Secure Perfect network computer for automatic notification and
installation of the latest Quick Fixes and Service Packs. This feature must be coordinated with your IT
Department. They may have certain procedures, restrictions, or security policies in place.
Settings:
HTTP Server Path: This is the Server to which you need to connect in order to search for available
updates. This field may look something like the following: http://ge-interlogix.com
HTTP Server User Name: Enter the User Name used to reach the HTTP Server, if required.
HTTP Server Password: Enter the password used to reach the HTTP Server, if required.
Repeat HTTP Server Password: Enter the password used to reach the HTTP Server, a second time as
a security check.
Secure Perfect supports Basic Authenication only and not Integrated Windows Authenication.
Product Update Available:
Notify Clients Immediatlely that Product Update is Available: Select this check box to automatically
notify client computers that a product update is available.
Update Message Text: In this box, enter a message that will display in a popup, notifying client
computers that a product update is available.
OK: Click this button when configuration is complete. The entries on this window are saved.
Cancel: Click this button to terminate and close this window. The entries will not be saved.
Secure Perfect 6.1.1 User Manual
74
Time Schedule Form
Reference Topic:
Administration Menu
Time schedules define the day(s) of the week and time(s) an action will start AND end.
This form is used to create time schedules. A time schedule determines when an action will occur, such
as turning on alarm monitoring. Time schedules are comprised of one or more time intervals (start and
stop times) on one or more days of the week and modes. Time schedules differ from events in that time
schedules define an interval of time over which an action occurs while events schedule when an action
occurs. Note that a time schedule can define an action multiple times, even within the same day. Once a
time schedule is defined, it can be applied anywhere time schedules are used.
Deleting a time schedule does not affect the current state of any devices currently under the effect of
the deleted schedule. If you delete a schedule while it is currently active, this schedule will never end.
Time schedules are not partitioned by facilities. If you need to use facilities in your system, create an
event for each facility. Use the facility description as a prefix on the Time Schedule Form, Description to
indicate to which facility this event will apply.
Example: BocaHQ Normal Workweekwould indicate a facility-specific time schedule, where BocaHQ
refers to a geographic location. For example, you can create a time schedule that is active Monday
through Friday 8:00 A.M. to 5:00 P.M. This particular time schedule (perhaps called Normal Workweek)
can be applied to the Access Right for Permanent Employees and you may want to turn off alarm
monitoring during those hours.
The maximum number of supported time schedules for any one micro is 1,023. Click Search to display a
list of previously created time schedules or Add to add a new schedule.
Description
Enter a meaningful and unique 32-digit or less alphanumeric description for this schedule.
Secure Perfect 6.1.1 User Manual
75
Tour Point Form
Reference Topic:
Administration Menu
This form is unavailable if you are not licensed for Guard Tour.
A Guard Tour is an inspection of your facility premises, made by a security officer at random intervals.
The officer stops at pre-determined tour points along the way, where a badge must be presented to a
reader or DI point so that the Secure Perfect system can track the badge progress. Each time the officer
presents a badge to a reader, a tour point is ‘hit.’
•
•
•
•
•
•
•
•
•
•
Tour points can be any readers or DIs that are not on a dialup micro.
DIs must be configured as a DI type of Guard Tour.
DI points can only be assigned to one Guard Tour.
Reader tour points can be assigned to any tours and any number of tours.
The badge read does not grant access or cause an invalid alarm.
Double-hit points along the tour result in invalid tour transactions.
Badge transactions are stored in badge history and available to generate reports.
A badge must be assigned to the tour.
Additional statements relating to Guard Tours are listed in the Guard Tours topic of this Help file.
Requirements are indicated by an asterisk.
Element
Search
Description
Click to display or change an existing Guard Tour point record. If this is a Secure
Perfect Global Edition, points that display are limited to the active Region. You
cannot edit a Guard Tour Point if it is assigned to a Guard Tour.
Add
Click to configure a new Tour Point record.
Delete
Click to delete a selected Tour Point record from the list in the windowpane on the
right, that is no longer required and is not assigned to an existing Guard Tour. If this
is a Secure Perfect Global Edition, points that display are limited to the active Region.
Description*
Facility
Enter a unique or suggestive description for this tour point. The field accepts 1 to 64
characters.
this operator. If you do not select a facility, Ignore Facilities will be assigned for you.
Tour Point Tab*
Configure a reader or digital input. You cannot save this record until you have
completed the Tour Point tab.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Secure Perfect 6.1.1 User Manual
76
Reporting Capabilities
Overview - Reports
Reference Topics:
Secure Perfect provides extensive reporting capabilities based on your system configuration. All reports
are selections on the Secure Perfect Reports drop-down menu.
Reports are filtered so that supplied information pertains only to the selected facilities of the current
operator.
A list of standard reports is provided below. Seven are history reports. In addition, Secure Perfect
has the ability to access reports created by using a third-party report generator. The following is a
brief description of each report:
persons in the system.
alarm instructions, events, event triggers, parameters, operators, permissions, responses,
schedules, clients, e-mail notification, and intrusion zones.
alarms, cameras, and digital video recorders.
6. Floor Access: Provides a list of floors defined in the system and the access granted to each one.
7. Reader Access: Provides a list of persons who have access to the specified reader(s); that is, who
has access where.
8. Roll Call: Provides a list of the last access granted to any or all persons in the system; that is, who
last went where based on individual badge activity.
facilities.
14. Operator History: Generates reports on operator actions relating to operations on Secure Perfect
forms.
15. Guard Tour History: Generates sets of Guard Tour activities containing start points, hits, invalid
points, pauses, resumes, tour end points, and tour time exceeded.
16. External Reports: The External Reports option opens the Launch External Reports window,
allowing you to access an executable application or report that was not created within SP. For
example, you may want to access a report created by a third party report generator such as Crystal
Reports or Microsoft Access 2002. Within SP, you can navigate to the application or folder, select
the file, and click to Open, once the report has been created and saved in a folder. This is a view
only function; you cannot launch Access or edit entries.
Secure Perfect 6.1.1 User Manual
77
Reports
Administration Report
Reference Topics:
Generates reports about the administration and organization of your Secure Perfect system.
Templates: The Templates button is for saving a template or making it a default.
Alarm History Report Form
Reference Topics:
This form generates reports based on alarm transactions.
Templates: Click to save a template or make the displaying template the default.
Badge History Report Form
Reference Topics:
Generates reports based on badge transactions.
Templates: Click to save a template or make it the default.
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect 6.1.1 User Manual
78
Badge Report Form
Reference Topics:
This report provides information in areas you select on all or a subset of badges in the system.
Templates: The Templates button is for saving a template or making it the default.
Device Report Form
Reference Topics:
This form generates reports about the devices in the system. Device Reports cover alarms, alarm groups,
digital inputs, digital outputs, digital output groups, elevators, cameras, digital video recorders, micros,
and readers.
Templates: This button is for saving a template or making it a default.
DI History Report Form
Reference Topics:
Generates reports on digital input history transactions.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make it the default.
Secure Perfect 6.1.1 User Manual
79
Floor Access Report Form
Reference Topics:
This report lists the people who have access to floors.
Template: Displays the name of the currently loaded template, if there is one.
Templates: Click to save a template or make the displaying template the default.
Guard Tour History Report Form
Reference Topics:
Generates reports that include such information as start points, hits, invalid points, pauses, resumes, and
tour end points.
Templates: Click to save a template or make it the default.
Operator History Report Form
Reference Topics:
Generates reports on operator actions.
Templates: Click to save a template or make it the default.
Secure Perfect 6.1.1 User Manual
80
Person Report
Reference Topics:
This report provides personal information, such as address, department, badge, access rights, and user
fields on all or a subset of persons in the system.
Click the Show me icon to view a step-by-step animated demo.
Templates: The Templates button is for saving a template or making it the default.
Reader Access Report Form
Reference Topics:
This report provides a list of persons who have access to the specified reader(s); that is, who has access
where.
Templates: Click to save a template or make the displaying template the default.
Roll Call Report Form
Reference Topics:
This report provides a list of the last access granted to any or all persons in the system and each of their
badges; that is, who last went where.
Templates: This button is for saving a template or making it the default.
Secure Perfect 6.1.1 User Manual
81
Schedule Report Form
Reference Topics:
This report lists the schedules and events assigned for each micro.
Templates: Click to save a template or make it the default.
Time and Attendance History Report Form
Reference Topics:
Generates reports on time and attendance transactions.
Templates: Click to save a template or make it the default.
Zone History Report Form
Template: Displays the name of the currently loaded templete, if there is one.
Templates: Click to save a template or make it the default.
Reference Topics:
General Tab allows you to set parameters of the form and the method to use for grouping and presenting
the information.
Database Tab allows you to select the history file you want to report on. You can select the default listed
on the tab or select the archived history file.
Generates reports on intrusion zone transactions.
Secure Perfect 6.1.1 User Manual
82
Troubleshooting and Help
Customer Support
If you require assistance, first contact your local Business Partner.
To contact GE Security, use the following numbers and addresses:
Telephone
FAX
1 888 GE SECURITY (437-3287)
561 998 6244
Web Site
Training
www.ge-security.comSupport
Documentation
Check the Web site periodically for timely information on all GE Security products.
Help Menu Selections
The following selections display in the Help drop-down menu:
Overview - Diagnostics
Reference Topic:
Diagnostics
Secure Perfect provides an extensive and convenient diagnostic utility to turn the monitoring of Secure
Perfect system components on and off. To display debug messages in the Diagnostics Log within SP, the
diagnostics for that component you want to monitor must be turned on. Each client computer will have a
set of diagnostic objects that represent what can be monitored on that computer.
For each client, Secure Perfect creates a default logfile (others can be created) for each day of the week
such as SPEEFriday.spl. This file is overwritten each week, thus creating a new log for that day.
During normal operation of SP, informational as well as debug messages are written to the daily log file.
Under abnormal conditions, the log file may also contain warning and/or fatal messages indicating failure
conditions.
Additionally, for each client, there is a log located in the WINNT\system32folder. Under normal system
operation, this log will be empty. It will be used to log messages if the server and the database cannot be
reached.
DiagView is a separate program within Secure Perfect. To access DiagView, select Diagnostic Viewer
from the Administration menu. It operates in "real time." That is, every time Secure Perfect writes an entry
to the log file, DiagView automatically displays the latest message. By default, DiagView displays only the
latest 1000 messages. The number of displayed messages can be changed on the DiagView,
Preferences form.
All log files should be saved in the Secure Perfect/Logsfolder; it will be easier to locate for backups
and upgrades. It is a shared folder, which means other clients can gain access to the log files.
Secure Perfect 6.1.1 User Manual
83
Remote Diagnostics
If you purchased your computer from GE Security, the program pcANYWHERE was included. If you are
experiencing problems, this program allows your GE Security Business Partner or Support Center
personnel to dial into your Secure Perfect computer and observe the situation, thus providing a quicker
response and resolution time.
The LogFile Form allows you to select your computer, set up a new logfile (establish an identity for the
file), and designate a path and directory in which to place your LogFile.
Troubleshooting
While Secure Perfect was created to be as user-friendly as possible, this topic is created to assist you
with answers to frequently asked questions. Click to display the linked topic.
Software:
and sometimes information from the previous record. How do I get rid of the text <deleted>?
Our site uses SP in two languages. Sometimes, when we log in, the Help files are not in the correct
Setup:
decide whether certain items (ports, lines, micro, or forms) will be sent to the logfile. Select Diagnostic
extensive diagnostic utility, Diagview. DiagView allows you to view the diagnostic log file, apply filters to
view information, and search for a specific log entry. Diagview has its own Help system for additional
information.
Secure Perfect 6.1.1 User Manual
84
Index of 'Show me' Demo Files
Index of 'Show Me' Demo Files
This is a comprehensive list of all demonstration files displayed throughout this Help system. The demo
files are in English only. Click the Show me icon to view a step-by-step animated demo. There is a
short pause as the demo begins.
Demo Title
Alarm Monitor
Backing Up a Secure Perfect Professional/eZ System
Backing Up a Secure Perfect Enterprise Edition System
Badge Assignment
DVR to Online
Intrusion Zone Arm/Disarm
Mass Updates
Manual Control: Unlock a Door
Online Help Contents
Online Help Index
Online Help Search
Person Record Creation
Report Export
Report Generation: History Report
Report Generation: Person Report
Report Template
Restoring Secure Perfect on an eZ/ Professional System
Secure Perfect 6.1.1 User Manual
85
Restoring Secure Perfect on an Enterprise Edition System
Video – Recording and Playing Back
Video Save
Video Search – General Event Tab
Video Search – General Playback Tab
Video Search – Motion Tab
Secure Perfect 6.1.1 User Manual
86
Reference Topics (Elements, Descriptions)
A
About Secure Perfect
Help Menu
Selection of this option opens a screen displaying the Secure Perfect software version, service pack
number, copyright information, licensing information, and contact information.
A sample window for a Secure Perfect system might display as follows:
Access Right
Personnel Menu
The Access Right option displays the Access Right Form that allows you to assign when (using a time
schedule or allowing access at all times) and where (using readers) access is given, that is then assigned
to a person.
Secure Perfect 6.1.1 User Manual
87
Access Rights Assignment
Select from the Available list those access rights you want to assign to this person. The access rights
that display in this list are those that were previously set up on the Access Rights Form. Only access
rights in the operators’ facilities are available for assignment by this operator.
•
•
Select, then click the right arrow to assign an available access right.
Select, then click the left arrow to unassign an access right.
Access Rights Tab
Access Right Form
Use this tab to create and define access right records.
•
•
Assigned readers: This windowpane lists all readers currently assigned to this access right.
readers available for assignment by this operator. If no readers are listed, check that the
readers have been marked Active on the Readers tab of the Reader Form.
Access control:
•
•
Allow access at all times: Select this option to allow access all the time, in all modes.
Allow access by schedule: Select this option to assign a time schedule to this access right.
The time schedule governs when the access right grants access to the assigned readers.
Time schedule: If you selected Allow access by schedule, this field is now available to select
a time schedule from the drop-down list of previously created time schedules.
•
If you do not have valid access to a reader that belongs to an Intrusion Zone due to a schedule in that
access right, you will not be able to arm/disarm a zone.
Access Rights Tab
Person Form
Use this tab to assign access rights to this person.
Assigned access rights
This windowpane lists any currently assigned access rights.
Assign
Click to display the Access Rights Assignment dialog box, enabling you to select the access rights you
want to assign or unassign for this badgeholder.
Activity Monitor
Operations Menu
The Activity Monitor option opens the Activity Monitor Form that allows you to monitor badge and
intrusion zone transactions. The shortcut key combination for Activity Monitor Form is CTRL+A.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual
88
Activity Monitor Form Shortcut Menu
Options of the shortcut menu are as follows:
Resume: Starts the scrolling of badge transactions. This option will be active only if you previously
selected Pause. All badge transactions that occurred while the Pause option was on will be displayed
once you select Resume.
Pause: Suspends scrolling of badge transactions on the Activity Monitor.
Clear: Clears all badge transactions from the Activity Monitor.
Swipe and Show Readers: Select to display an Edit Readers List assignment form. Select those
readers you want monitored in the Swipe and Show window. If readers have not been selected, the
Swipe and Show program will not start.
Launch Swipe and Show: Starts the Swipe and Show program. Only one instance of Swipe and Show
is available for display on a computer at one time. If Imaging is not licensed for the system, this option is
not available.
Badge: Displays the Badge Form, making available the selected badge record.
View Live Video: Accesses live video from the camera(s) associated with the reader’s badge transaction
as defined by its event trigger. In order to view live video, the DVR must be online (if it is a duplex
recorder, the recorder must also be in record mode). The following windows open:
•
The Digital Video Viewer. (Refer to Digital Video Viewer Help for information about the Digital
Video Viewer.)
•
Video window(s) displaying the current live view of the camera(s) associated with the badge
transaction. Each window displays a dialog box containing the current date and time.
View Recorded Video: Accesses previously recorded video from the camera(s) associated with the
reader’s badge transaction as defined by its event trigger. In order to view recorded video, the DVR must
be online and available. The DVR cannot be serving another request for playback of any recorded video
event. The following windows open:
•
The Digital Video Viewer. (Refer to Digital Video Viewer Help for information about the Digital
Video Viewer.)
•
Video window(s) displaying the recorded video associated with the badge transaction. Each
window displays a dialog box containing the current date and time.
View Single Recorded Frame: Select to display the first frame of the event recording as a still photo.
Quick Launch: Accesses live and recorded video from camera(s) associated with the reader’s badge
transaction as defined by its event trigger.
A message dialog will display if video is not available because associated cameras are not assigned
to the current active facility.
Secure Perfect 6.1.1 User Manual
89
Activity Monitor Form Toolbar
Reference Topic:
The Activity Monitor Form toolbar consists of the following options:
Click
To
Pause or suspend the scrolling of badge transactions.
be available if the system is not licensed for Imaging or
readers have not been selected.
Add Map
An Add Map dialog box displays when you click Add Record on the Secure Perfect toolbar while the
Alarm Graphics Editor window is displayed, allowing you to navigate to a file source for an existing map.
Description
Enter a description of the type of map. Example: Overview of Main Building.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
File
Enter the full pathname of the file or click Browse to navigate, locate, and select the file. Secure Perfect
supports map files in the Windows MetaFile format (.wmf or .emf).
Add New Icon to Database
Alarm Graphics Viewer Form
Click to import your own icon files to the list of available icons used in the previous three fields to
represent a specific alarm state. Icon files must be .ico format.
Secure Perfect 6.1.1 User Manual
90
Adding Sound to an Alarm
If you would like to hear a sound from the Secure Perfect computer when an alarm occurs, follow the
steps below:
You MUST have a sound card in your computer!
1. Click Start, Settings, then Control Panel.
2. From the Control Panel window, double-click the Sounds and Multimedia icon.
3. In Sound Events, scroll to Secure Perfect.
4. Select the alarm to which you want to assign sound; then select the sound you want for that alarm.
5. Click OK to save the change and exit the window or Apply to save that change and add more sounds.
6. Start SP; select Administration, then Parameters.
7. On the Settings tab of the Parameters Form, verify that the Console alarm sound field is set for the
results you anticipate (either Continuous or Short).
Additional Filters Tab
Person Report
This tab displays ONLY if you have selected User Data in the field Report Type on the General Tab of the
Person Report. Use this tab to add user fields as an additional filter for the report.
•
User Fields: This window lists all the user fields, the user field value you want to use as a
filter, and whether the user field should print. (You can print the user field on the report by
selecting the field Print selected user field or deselect this field so the user field will not print.)
Modify Value: To change the value of a user field, select the user field you want and enter a
new value in this field.
User fields printed on report: If this field is enabled, then the currently selected user field will
print on the report.
Clear All/Set All: Click Clear All so that none of the User Fields are set to print. Click Set All
to set all of the User Fields to print.
•
•
•
•
Print selected user field: Enable this field to set the selected User Field to print or disable this
field so that the selected User Field does not print.
Additional Filters Tab - Badge History Report Form
Use this tab to select additional, specific criteria by which this report will be generated.
•
•
•
•
Micro: Select the micro you want to use to generate report information. If you want to use all
micros, select <ALL>.
Reader: Select the reader you want to use to generate report information. If you want to use
all readers, select <ALL>.
Department: Select the department you want to use to generate report information. If you
want to use all departments, select <ALL>.
Activity: Select the badge activity you want to use to filter report information, such as Duress
Invalid, Duress Valid, Duress Valid No Passage, Duress Valid Open, Guard Tour Activity,
Invalid, Invalid APB In, Invalid APB Out, Invalid Floor, Invalid PIN, Invalid T&A In, Invalid T&A
Out, Invalid Timed APB, Lost, Max Invalid PIN, Overdue, Override, Unknown, Valid, Valid No
Passage, and Valid Open. If you want to use all activities, select <ALL>.
Logical Reader Type: Select the logical reader type that you want to use to limit the report,
such as APB In, APB In or Out, APB Out, Elevator, In Required, Normal, T&A In, T&A In and
Out, T&A In or Out, or T&A Out. If you want to use all the logical reader types, select <ALL>.
Floor Description: Select the range of floor descriptions you want to display on the report. If
you want to list all floor descriptions, leave these fields blank.
•
•
Secure Perfect 6.1.1 User Manual
91
Additional Filters Tab - Zone History Report
Use this tab to select additional, specific source criteria by which this report will be generated.
•
•
•
•
Activity Type: Select the type of activity to use in generating this report. If you want to use all
intrusions zone activity type messages, select <ALL>.
Locaton : Select the source of the zone activity as a Badge, Digital Input, Manual, Micro, or
<ALL>.
Device Description: Enter the range of device descriptions on which you want to report.
Leave blank for all descriptions.
Micro Description: Enter the range of micro descriptions you want to use to generate report
information. If you want to use all micros, select <ALL>.
Address Fields Tab
Parameters Form
Use this tab to modify the labels of the address fields. These labels are used on the Person Form.
Address 1/Address 2/Address 3/Address 4/Address 5
Displays the current label. To edit or create a new label, select and enter text over the existing text. The
address field label can be up to 32 alphanumeric characters in length.
Click Save before you exit this form.
Administration
Reports Menu
The Administration option opens the Administration Report Form that allows you to create a report on
the administrative aspects of your Secure Perfect system, such as alarm instructions, events, host
parameters, operators, permissions, responses, schedules, archives, client, and floors.
Secure Perfect 6.1.1 User Manual
92
Alarm
Device Menu
The Alarm option displays the Alarm Form that allows you to modify records that are automatically
generated when you define a micro. It also displays alarms created from Digital Inputs.
Alarm Assignment
This window displays a list of alarms in the Secure Perfect system for the facilities available for
assignment by this operator. All alarms display. If this is a Global Edition system, alarms are not filtered
by Region.
•
•
Select, then click the right arrow to assign an available alarm.
Select, then click the left arrow to unassign an alarm.
Click OK to display results in the Assigned Alarms windowpane.
Alarm Bumping Client Group Assignment Dialog Box
This dialog box allows you to select and assign Client Groups for this bumping record. Only Client
Groups in the operator’s facilities are available for assignment by this operator.
•
•
Select, and then click the right arrow to assign an available Client Group.
Select, and then click the left arrow to unassign a Client Group.
Click OK to close this dialog box and display the results in the Bumping, Client Groups windowpane.
Alarm/Digital Input Tab
Manual Control
Manually monitor alarms and DIs (digital Input points) depending on the current operator’s facilities and
There may be schedules in effect that will override manually controlled changes if schedule override
is selected; otherwise, the manual control selection is truly indefinitely.
Select type
Select one of the alarm/DI types from the drop-down list:
•
•
•
Alarms
Alarm Groups
Digital Input
Nothing will display in the list box until you choose a micro option.
Select micro
Select a micro option.
•
•
All displays all the selected type of devices in the current operator’s facilities for all micros.
By Micro displays all the selected type of devices in the current operator’s facilities for a specific micro.
Columns in Windowpane
•
•
Description: Description of the Alarm/DI in the database.
Micro: Micro on which the Alarm/DI is located.
Secure Perfect 6.1.1 User Manual
94
Set state to:
The names of the buttons change depending on the DI type (Alarm or Other) selected.
If an Alarm or Alarm Group is selected, click . . .
•
•
•
•
Monitor On: To monitor the selected alarms or alarm groups. Setting Monitor On will display the
alarms on the Alarm Monitor Form.
Monitor Off: To immediately discontinue monitoring the selected alarms or alarm groups. Setting
Monitor Off will not display alarms on the Alarm Monitor Form.
Indefinite: To make the change permanent. This selection does not allow it to be overridden by a
schedule (can be monitor ON or OFF).
Sched. Override: To change the state of the monitoring by a schedule override. For example, use
Sched. Override to monitor an alarm until a schedule overrides it. If you don’t want the schedule to
stop the monitoring, click Indefinite.
If a DI is selected, click . . .
•
•
Enable: To enable the selected DI on the micro so a state change will be reported.
Disable: To immediately disable the selected DI on the micro so its state changes will not be reported
to the host or trip a Digital Output.
•
•
Indefinite: To Enable or Disable permanently.
Sched. Override: Use this option to change operation state of a DI if you want a schedule to override
its setting. For example, use Sched. Override to control operation of the DI until a schedule takes
over. If you don’t want a schedule to control activation of a DI, use the On Indefinite selection.
Purpose
Enter an explanation for monitoring an alarm or enabling/disabling DI points. This field accepts 255
alphanumeric characters. These comments are written to the operator history field and display on the
Operator History Report, Purpose Field.
Alarm Graphics Editor
Operations Menu
The Alarm Graphics Editor option opens the Alarm Graphics Editor that allows you to add icons on
graphical map views to point out the location and type of incoming alarms. You cannot create a map
using SP; create it using the program of your choice and save it in .WMF or .EMF format.
Alarm Graphics Viewer
Operations Menu
The Alarm Graphics Viewer option opens the Alarm Graphics Viewer that allows you to view the maps
of your facility that were created. These maps point out the location and type of incoming alarms. The
shortcut key combination for Alarm Graphics Viewer is CTRL+V.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual
95
Alarm Graphics Viewer Shortcut Menu
Operator permissions for the Alarm Graphics Viewer must be assigned to ‘Update’ in order to view
and select right-click menu options. Points, alarms, DIs, and DOs do not display if not in the operator’s
facility. For shortcut menu functionality, move your mouse pointer to an assigned point and click the right
mouse button. The shortcut menu that displays with a right-click mouse button depends on the Point
Type assigned.
Element
Description
•
Alarm Monitor Form
Displays the Alarm Monitor form. This is the right-click menu
option when mouse pointer is not on an assigned map point.
Alarm Point Right-Click
Menu Options:
•
•
Alarm Monitor Form
Monitor On Indefinite
Displays the Alarm Monitor form.
Activates the assigned alarm. The alarm will remain active
until you manually turn it off.
•
•
Monitor Off Indefinite
Immediately deactivates the alarm.
Monitor On Schedule Override
Immediately activates this alarm and the schedule overrides
any active setting.
•
Monitor Off Schedule Override
Immediately deactivates this alarm and the schedule overrides
any active setting.
Digit Input Point Right-Click
Menu Options:
•
•
•
•
Enable On Indefinite
Enables this DI and will remain enabled until you change the
state manually.
Enable Off Indefinite
Disables this DI and this DI will remain Off until you change
the state manually.
Enable On Schedule Override
Enable Off Schedule Override
Immediately activates this digital input and a schedule can
override any active setting for this digital input.
Immediately deactivates the digital input and a schedule can
override any active setting for this digital input.
Digit Output Point Right-Click
Menu Options:
•
•
•
•
Unlock Reader/On for Duration
Unlock Reader Indefinitely/On
Lock Reader/Off
Immediately unlocks the reader or turns on the DO and
remains unlocked for the specified ‘On Time.’
Immediately unlocks the reader or turns on the DO associated
with this reader and remains unlocked indefinately.
Immediately locks the reader or turns off the DO associated
with this reader.
Unlock Reader Schedule Override
Immediately unlocks the reader or turns on the DO associated
with this reader and the schedule overrides any active setting.
Alarm Group
Device Menu
The Alarm Group option opens the Alarm Group Form that allows you to assign alarms into groups or
sets for scheduling purposes. Example: To apply a schedule to a series of alarms, apply the schedule to
a group that contains the specific alarms.
Secure Perfect 6.1.1 User Manual
96
Alarm History
Reports Menu
The Alarm History option opens the Alarm History Report Form that allows you to create a report based
on the history of alarm activity.
Alarm Instruction Assignment
This window displays when you click Edit, allowing you to modify the list of alarm instructions assigned to
this alarm. Only alarm instructions in the operators’ facilities are available for assignment by this operator.
Select, and then click the right arrow to assign an available instruction. A maximum of six alarm
instructions can be assigned.
Select, and then click the left arrow to unassign an instruction.
Click OK to display results in the Instruction windowpane of the Alarm Form.
Alarm Instruction Tab
Use this tab to create instructions on how to react to alarms. The instructions should belong to the same
facility as the alarm with which they will be associated.
•
Number: Assign a number to the instruction records. The range for alarm instructions is 0 to
254 for a total of 255 instructions.
•
Instructions: Enter the text you want to display when the associated alarm occurs. The
instruction can be 0 to 64 alphanumeric characters in length.
Alarm Monitor
Operations Menu
The Alarm Monitor option opens the Alarm Monitor Form that allows you to monitor alarm activity. The
shortcut key combination for Alarm Monitor Form is CTRL+M.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual
97
Alarm Monitor Form Shortcut Menu
Reference Topic:
Select
To
Show Inactive
Alarms
Display alarms in an inactive state and removed from view. These
alarms were previously acknowledged or purged from the Alarm
Monitor. This is a toggle election and is a way to display previous
alarm activity without running a report.
Alarm
Opens the Alarm Form, allowing you to modify or view that
particular alarm record.
Alarm Graphics
Viewer
Opens the Alarm Graphics Viewer Form, allowing you to view the
alarm graphics map to which the alarm belongs.
Alarm Graphics
Editor
Opens the Alarm Graphics Editor Form, allowing you to create or
edit a graphical view of alarm states for the alarms you select.
View Live Video
(If a camera icon is not displayed to the left of the alarm description,
this option is not available.) If an alarm transaction is displayed with
a camera icon to the left of the alarm description, right-click to view
live video from the camera(s) associated with the alarm’s
information.
In order to view live video, the DVR must be online (if it is a
duplex recorder, the recorder must also be in record mode).
The following windows open: 1) Digital Video Viewer. Refer to
Digital Video Viewer Help for information about the Digital Video
Viewer. 2) Video window(s) displaying the current live view of the
camera(s) associated with the alarm transaction. Each window
displays a dialog box containing the current date and time.
View Recorded
Video
(If a camera icon is not displayed to the left of the alarm description,
this option is not available.) If an alarm transaction is displayed with
a camera icon to the left of the alarm description, select to view live
video from the camera(s) associated with the alarm’s transaction as
for window management information.
In order to view recorded video, the DVR must be online and
available, and not serving another request for playback of recorded
video based on this event.
The following windows open: 1) Digital Video Viewer window. Refer
to Digital Video Viewer Help for information about the Digital Video
Viewer. 2) Video window(s) displaying the current live view of the
camera(s) associated with the alarm transaction. Each window
displays a dialog box containing the current date and time.
View Single
Recorded Frame
Select to display the first frame of the event recording as a still
photo.
Secure Perfect 6.1.1 User Manual
98
Quick Launch
Select to automatically access live and recorded video from the
camera(s) associated with the alarm’s transaction as defined by its
management information.
In order to view live and recorded video, the DVR must be
online and available, and not serving another request for playback
of recorded video based on this event.
The following windows open: 1) Digital Video Viewer; 2) Video
window(s) displaying the current live view of the camera(s)
associated with the alarm transaction. Each window displays a
dialog box containing the current date and time. For additional
information, click Help on the Digital Video Viewer window.
Alarm Monitor Form Toolbar
Reference Topic:
Click
To
Monitor.
Alarm Notifier
Administration Menu
The Alarm Notifier option opens the Alarm Notifier form, allowing you to accomplish the following:
•
•
•
Assign the alarms/resets that will trigger an e-mail message.
Assign people who will receive e-mail notification of the alarm condition.
Format the e-mail message.
Alarm Response Tab
Reference Topic:
Alarm Response Form
Use this tab to enter a predefined alarm response. This multi-line dialog box accepts 64 alphanumeric
characters. The responses you create and save will display as selections on the Alarm Monitor Form.
Alarm Routing and Bumping
Administration Menu Item
The Alarm Routing and Bumping option opens the Alarm Routing and Bumping form, allowing you to
do the following:
• Route alarms to one or more Client Groups by time schedule or at all times.
• Bump alarms to one or more Client Groups following a time lapse of an unacknowledged or
unpurged alarm to the Client Groups selected for bumping.
Secure Perfect 6.1.1 User Manual
99
Alarm Routing Client Group Assignment Dialog Box
This dialog box allows you to select and assign Client Groups for this routing record. Only Client Groups
in the operator’s facilities are available for assignment by this operator.
•
•
Select, and then click the right arrow to assign an available Client Group.
Select, and then click the left arrow to unassign a Client Group.
Click OK to close this dialog box and display the results in the Routing, Client Groups windowpane.
Alarm Selection Tab
Alarm Notifier Form
The Alarm Selection tab allows you to assign alarms in this operators’ facility that will trigger an e-mail
message.
Assigned Alarms:
This windowpane displays any previously assigned alarms.
Assign Alarms
Click Assign Alarms to display the Alarm Assignment dialog box that allows you to select specific alarms
that will trigger e-mail notifications. Click OK and the selected alarms will display in the Assigned Alarms
windowpane.
Transaction Type
Select one or both transaction types that will trigger an e-mail alarm notification.
•
•
Alarm: E-mail notification is sent at onset of the alarm.
Reset: E-mail notification is sent when an alarm is reset.
By default, no type is selected when you create a new Alarm Notifier record. A transaction type must be
selected in order to save this record.
Alarm Sense Time
This form allows you to add or edit the link between an event and an alarm sense time. The event
determines when and to what value the sense times for all alarms in the group are changed.
•
Event: Select an event from the drop-down list. If there are no events listed, you will need to
configure events using the Event Schedule Form.
•
New time: Select or enter a sense time. The value is in seconds and indicates the delay
before triggering an associated digital output or sending in a Secure Perfect alarm if the DI
type is Alarm. This number tells the system how many seconds to wait after sensing the input
has changed to Active State. Enter 00to immediately send the transaction to the host,
notifying the host of a state change. Increase the Sense Time entry if using noisy or
chattering contacts.
Example: This value could indicate the delay time, in seconds, that elapses between the time a door
contact is broken and the time the output and alarms are triggered. If door contact is re-established
before the sense time elapses, the alarm would not come in to Secure Perfect and the output would not
activate.
Secure Perfect 6.1.1 User Manual
100
Alarm Tab
Alarm Form
The Alarm Tab configures the alarm.
Group: Displays the alarm group to which this alarm was assigned. The default is alarm group 0. You
can change to any other alarm group available on that micro, displayed on the drop-down list.
Owner Type: This is a read-only field and displays the object to which the alarm belongs or refers.
•
•
•
•
•
API: Alarm is bi-directional and owned by the external interface.
Board: Alarm is owned by the microcontroller.
CCTV Interface: Alarm is owned by an interface.
Client: Alarm is owned by a Regional Database client.
Digital Input: Alarm is owned by the digital input, such as a motion sensor. (The 11th DI on a
Micro/PX-2000 or M/PXN-2000 is owned by the micro; it is a low-battery alarm from the
micro.)
•
•
•
•
•
•
•
Failover: Alarm is owned by the host client.
Guard Tour: Alarm is owned by a reader or digital input.
Kalatel Camera: Alarm is owned by a Kalatel camera.
Kalatel DVMR: Alarm is owned by a Kalatel DVR.
Micro: Alarm is owned by a micro.
Reader: Alarm is owned by a reader.
Region Failover: Alarm is owned by the host Regional Database Server.
Settings:
•
Monitor (Alarm, Short, Cut, Reset): If selected, this alarm, when triggered, will display all
alarm conditions available to this alarm on the Alarm Monitor Form. You have the option to
schedule alarm monitoring on the Schedule Tab of this form. If this option is NOT selected
but a schedule is in place, the schedule will monitor alarms only for the time that monitoring
is on. (Although the option to monitor is displayed for the 11th DI on a Micro/PX-2000 (low-
battery alarm), an alarm is not generated for Cut and Short.)
ꢀ
ꢀ
ꢀ
•
An operator can see alarms on the Alarm Monitor Form only for facilities that are currently
active and assigned to the current operator.
The option to monitor an alarm must be selected on the Alarm Form in order for a specific
alarm to display on the Alarm Monitor Form.
Alarms do not display on the Alarm Monitor Form if the selection to monitor an alarm is
removed, even though Alarm Routing and Bumping may be configured.
Always monitor (Short, Cut, Reset): If selected, this alarm will always display Cut, Short, and
Reset conditions of alarms on the Alarm Monitor Form. Select this option if a schedule
prevents monitoring an alarm/reset condition during certain periods of the day but you still
want Short, Cut, and Reset to be monitored and displayed. (Although the option to monitor is
displayed for the 11th DI on a Micro/PX-2000 (low-battery alarm), an alarm is not generated
for Cut and Short.)
•
•
•
Micro dial host: If selected, an alarm occurring on a dial-up micro, or micros downstream
from a dial-up micro, will cause the micro to dial the host in order to report the alarm.
Operator acknowledge: If selected, the operator must acknowledge the alarm on the Alarm
Monitor Form before the alarm can be cleared.
Priority: Select a number from 0 to 9 by clicking on the up and down arrow buttons to the
right of the field. This number indicates the priority of this alarm and tells the system (host) in
which order it should alert the operator should multiple alarms occur at the same time. The
lower the number, the higher the priority; therefore, 0 has the highest priority and 9 the
lowest.
Route alarms to history: If selected, alarm activity is written to the alarm history.
Print alarms: If selected, the alarm history transaction is printed on a selected system parallel/serial
printer when the alarm changes state between alarm and reset. Alarm transactions will print only if the
transaction is routed to the printer and the alarm transaction printer is selected. The selection of the alarm
transaction printer is done on the Client tab of the Client form.
If you modified this record, save before you exit the form.
Secure Perfect 6.1.1 User Manual
101
Alarms Tab - Alarm Routing and Bumping Form
Element
Alarms:
Description
This windowpane displays the names of Alarms assigned to
this Routing and Bumping record.
Assign Alarms:
you to assign Secure Perfect alarms to this Routing and
Bumping record.
Alarms Tab
Reference Topic:
Event Trigger Form
This tab allows you to select alarm(s) and alarm transaction type(s) that will become the source for this
Event Trigger.
Element
Description
Transactions
Select one or both options as types of alarm transactions
to trigger an event. The alarm must be set for monitoring.
Alarm: An event is triggered as a result of an alarm.
Reset: An event is triggered as a result of an alarm reset.
Select one of the Tag Selection options:
Tag Selection
None: No tag is sent to the DVR for marking recorded
video or manipulating record rate.
Tag only: A tag is sent to the DVR for marking recorded
video at the camera(s) current record rate.
Tag as event: A tag is sent to the DVR for marking
recorded video and for changing the camera(s) record rate
to its event record rate settings.
Assign Alarms
Auto Pop-up
you to select and assign/unassign an alarm record for this
Event Trigger record. You can also unassign an alarm for
an Event Trigger.
Select this checkbox to enable an automatic live video
pop-up window when an alarm occurs associated with this
alarm trigger. Additionally, the Enable Alarm Video Popup
must be enabled on the Operations menu. If this operators’
Permission for Digital Video Viewer is not made available,
this option will not activate even though selected here.
Secure Perfect 6.1.1 User Manual
102
Antipassback
Set the antipassback status to neutral for all badges in this micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Antipassback Definitions
Antipassback (APB) is an access control feature designed and configured to reduce the chance of users
‘passing back’ their credential to another person attempting to gain access. When readers are designated
as entry (IN) or exit (OUT), the system is able to record whether a user in inside or outside at any time by
noting the last place their credential was used. If the last time it was used was at an IN reader, then the
system knows that they are inside. If the last time it was used was at an OUT reader, then the system
knows that they are outside.
•
•
Active APB does not let a person re-enter unless they first exit. The user is unable to ‘pass back’ their
credential to allow a friend to gain entry.
Passive APB records the status but does not enforce the status. The system knows where a person is
but does not stop them from entering twice. This type of system is often applied with time and
attendance.
•
•
Tailgating refers to a user following another user through a door without presenting a credential. They
follow closely enough so they can get through the door or gate before it closes. Only the first user is
recorded as IN or OUT.
Timed APB refers to a system where users are ‘forgiven’ after a certain length of time, configured in
minutes. After the configured time is expired, the user status is set to ‘neutral’ and the system allows
them to re-enter. This eliminates the need for an OUT reader and prevents a badge holder from re-
entering for that time period.
•
•
Global APB tracks the user throughout the entire Secure Perfect network and across all micros. No
matter where a user is, their APB status is recorded.
Regional APB (Secure Perfect Global Edition Systems) tracks the user within a Region. The user is
active in that Region only and inactive in all other Regions.
Secure Perfect 6.1.1 User Manual
103
APB Region Configuration Tab - Region Form
Use this tab to identify APB IN and APB OUT readers, and configure the APB behavior across Regions.
APB Entering Region: This listbox displays those readers that have been selected as APB IN readers
for the selected Region.
readers are displayed for selection.
APB Exiting Region: This listbox displays those readers that have been selected as APB OUT readers
for the selected Region.
OUT readers are displayed for selection.
It may not be required or significant for the micros in a Region to report status to another Region. Select
from one of the following notification options:
1. Retain APB Status Across Regions: This is the default of three status options. If selected, the APB
status is recognized across all Regions in the Secure Perfect Global system. A badge can be
presented at an APB IN reader in one Region and at an APB OUT reader in a second Region. (Enable
Global APB must be selected on the Parameter Form.)
2. Invalidate Badge Across Regions: If selected, this option disables the badge in all other regions
when a person enters the selected Region by presenting the badge at an APB IN reader. The Activity
Monitor displays ‘Invalid APB IN’ or ‘Invalid APB OUT’ if you attempt to enter in or out of any other
Region. When a person exits the selected Region and the badge is presented at an APB OUT reader,
the badge becomes enabled in all other Regions. (Enable Global APB must be selected on the
Parameter Form.)
Example: Employees badging IN at a Miami office are tracked and not allowed to badge IN to another
location until they have presented their badge at an APB OUT reader in Miami.
3. Ignore APB Status Across Regions: If selected, the APB status is local to the selected Region and
status is retained within the Region. Regions are independent of each other and the status is not
recognzed by another Region.
API Connections
Reference Topic:
Administration Menu
This option opens the API Connections form that allows you to define an interface license for external
application integration by assigning a description of the API (Application Program Interface), and then
assigning an application login, password, and host computer.
This option is unavailable if you are not licensed for an API connection.
Secure Perfect 6.1.1 User Manual
104
Appending Archive Databases
If you have a backup of a SecurePerfectArchive3.x or later database, the data can be restored
using the SP Maintenance Utility. Backup and Restore functions are detailed in the Secure Perfect
Installation Guide.
The SP Maintenance Utility will also append badge history, alarm history, operator history, and where
appropriate, Digital Input history, Zone history, and DVR history data to the current
SecurePerfectArchivedatabase. Current SecurePerfectArchivedata will not be affected.
In order to use the Append utility, you must meet the following criteria:
•
Backup SecurePerfectArchivefiles must be restored to a local or mapped network
directory folder.
•
•
•
Free disk space that equals at least three times the size of your database backup file.
The ‘sa’ password.
Sufficient time and patience to complete the procedure.
To append data:
1. Open the SP Maintenance Utility and select Append from the menu bar.
2. Navigate to the Drive on the local computer where the backup file is located.
3. Select the Folder in which the backup file is located.
4. Select SecurePerfectArchive from the Backup Source File list.
5. Drag and drop the backup SecurePerfectArchive file to the Secure Perfect Archive Databases
Only: dialog box.
6. Enter the ‘sa’ password.
7. Click Append.
8. The Append process can take a considerable amount of time, depending on the size of the backup.
During the Append process, the application looks like it is not responding. This is normal.
9. When you have finished using the data, we recommend that you delete the appended data using
the Secure Perfect Parameter Form, Clear Archive tab. This will keep the current
SecurePerfectArchive file from becoming too large in size.
Archiving
Reference Topic:
An archive is a history of transactions. The archive is created automatically by Secure Perfect, based on
the time interval that you selected on the Parameters Form (Daily, Weekly, or Monthly). When you select
Weekly, you must also select a day of the week.)
If you select:
•
•
Daily: The archive is appended every day beginning at 11:59:58 P.M.
Weekly: The archive is appended every week on the day that you select, beginning at
11:59:58 P.M. (You must select a day of the week.) Any change in the scheduling occurs
immediately. For example, if archiving is taking place on Tuesdays and the schedule is
revised to archive on Wednesday, the archiving will occur one day later, on Wednesday.
Monthly: The archive is appended on the last day of the month beginning at 11:59:58 P.M.
•
Agent services are running. Archiving process takes place independently of Secure Perfect. As long as
the SQL Server Agent services are running, the archive process will occur.
Determine the status of the SQL Server Agent service by navigating to Settings, Control Panel, then
Component Services through Windows Explorer. Check the Status of SQLAgent$SPSQL.
Archiving is performed on the database Server computer only.
Archiving creates a copy of the latest history transactions and then removes all the data from the history
Secure Perfect 6.1.1 User Manual
105
database. The data will be appended to the archive database until you decide the archive database has
grown too large.
The factors in determining whether the archive database is too large can be:
•
•
•
•
The size of your hard drive.
The performance you receive when running history reports.
The length of time you need to keep data.
Other factors specifically related to your installation.
To remove data from the archive database:
1. BACK UP YOUR SECURE PERFECT ARCHIVE DATABASE! You will have to back up the Secure
Perfect Archive database using utilities provided by SQL Server 2000 or by using the Secure
Perfect Maintenance Utility. After you perform the backup, label and store the media in a safe
place.
If you do not back up the SecurePerfectArchive, you will lose all the data stored in it.
2. Select the Administration menu, then Parameters.The Parameter Form opens with the Settings
tab displayed.
3. Select the Clear Archive tab. The Earliest Date in Archive DB and Latest Date in Archive DB
fields will indicate dates once you have clicked the Show Date button. If you do not have any
records in your archive database, the two date fields will state No Record.
4. Choose the Start Date of the data that you want to remove from your archive database by
selecting the month, then the day to begin your archive.
5. Choose the End Date of the data that you want to remove from your archive database by selecting
the month, then the day to end your archive.
6. Click Delete.
7. Click OK.
The deletion of an archive database is taking place in the background. Progress is indicated on
the status bar in the lower right side of the screen. The process may take hours to complete. The
length of time is dependent on the size of the archive database and the hardware components of
your computer.
8. Upon completion, a message displays: The records from the Archive database has been
successfully deleted! Click OK.
Arm/Disarm an Intrusion Zone
Arm/Disarm an Intrusion Zone Using Access Rights
Any card and keypad reader or keypad within a defined zone can be used to arm and disarm the zone
with a valid access right for the reader and an Intrusion Zone assigned.
Click the Show me icon to view a step-by-step animated demo.
Arm = * 1 # followed by a valid card read.
•
If all alarm points are reset (not in an active state of alarm) and all doors closed, then all
readers are placed offline (doors locked) and alarm points are monitored on. The
corresponding Digital Output is fired as selected on the Intrusion Zone Form.
When the zone is successfully armed, all readers in the zone provide visual indication that
the zone is armed.
•
We recommend using CASI brand readers, configured to display the PIN light ON or
flashing, depending on the selected reader model. A Zone armed transaction is generated
and displays on the Activity Monitor Form.
•
•
When a zone is not successfully armed due to an invalid zone configuration on the Access
Right Form, an Arm/Disarm Failed, Invalid Access Right transaction is generated.
If any alarm points are set (in an active state of alarm) or a door is open, the zone does not
become armed. An Arm/disarm Failed Zone not secure transaction is generated and
displayed on the Activity Monitor Form.
Secure Perfect 6.1.1 User Manual
106
Disarm = * 0 # followed by a valid card read.
•
All alarm points in the zone are monitored off and readers in the zone are placed online for
normal operation.
We recommend using CASI brand readers, configured to display the PIN light switching
from ON or flashing to OFF, depending on the selected reader model. A Zone disarmed
transaction is generated and displays on the Activity Monitor Form.
•
•
When a zone is not successfully disarmed due to an invalid badge, an Arm/disarm Failed,
Invalid Access Right transaction is generated.
When a zone is disarmed, all normal access control rules apply for gaining access.
Arm/Disarm an Intrusion Zone Using Arm/Disarm Intrusion DI
All of the same rules apply as if arming or disarming using an access right.
•
When the zone is successfully armed, all readers in the zone should provide visual indication
that the zone is armed and a Zone Armed transaction is generated on the Activity Monitor
Form.
•
•
When a zone is not successfully armed, an Arm/disarm Failed transaction is generated.
When a zone is disarmed, all normal access control rules apply for gaining access and a
Zone Disarmed transaction is generated.
Arrange Icons
Windows Menu
This option allows you to control multiple windows or forms. If you have several forms in progress, you
can temporarily minimize a form from view. Select this option to arrange the minimized form icons across
the bottom of your Secure Perfect display screen.
Assign Micro Phone Numbers Dialog Box
This dialog box allows you to select a micro from the Dial-Up Micro drop-down list and assign telephone
numbers used by this micro to reach the selected backup client.
•
Click to display a list of only Dial-Up and Network + Dial-Up micros for the client record
displayed.
•
When you select a micro from the drop-down list, the Phone numbers to reach backup client
xxxxxx fields become available for entry (where xxxxxx = name of selected client in the
Backup Clients list box ).
•
•
When you enter a number in the first field, the Save button becomes available.
All Number fields must contain a telephone number of up to 20 digits. If there is only one
telephone number for this micro to reach the backup client, repeat this number in all four
fields. (If you click Save after completing the first Number field, the system will automatically
complete all Number fields with a duplicate number.)
•
Click Save to save the list of telephone numbers. The micro will dial the number in Number 1:
and then try the others in numerical order until connection it made.
Click Close to exit the dialog box.
Repeat the process for each micro in the Dial-up Micro drop-down list.
Click Save to save this client record.
•
•
•
Secure Perfect 6.1.1 User Manual
107
Auto Shutdown of Client Services
Services will automatically shut down when a client closes the Secure Perfect application and meets ALL
of the following criteria:
1. Does not host any micros or DVRs.
2. Does not have any API connections.
3. Is not a Thin Client.
4. Is not a backup client or have any backup clients of its own.
5. Is not a CCTV client.
6. Is not hosting a Guard Tour.
7. Client form Enable Auto Shutdown is selected.
The shutting down of a particular client computer designates that license capacity unused. Now, that
license is available for another computer that can now be designated a Secure Perfect client.
Auto Update
Administration Menu
The Auto Update option opens the SP Auto Update Configuration Form that allows you to configure your
Secure Perfect network computer for automatic notification and installation of the latest Quick Fixes and
Service Packs.
Secure Perfect 6.1.1 User Manual
108
B
Backing Up Data
Reference Topics:
A backup is a copy of selected data. Since Secure Perfect does not contain a backup option, you can use
any method you like to back up the data. Because the Server computer contains the database, there is
no need to back up your Secure Perfect folder on your client computers.
You should keep two sets of backups, of the following Server computer files:
Secure Perfect Data: The data includes the following:
•
•
•
•
Database: Contains configuration data such as badges and micros.
History: Contains current history including badge transactions and operator history.
Archive: Contains the latest copy of Secure Perfect history data.
Images: Backup needed if you have Imaging installed. Contains the picture files of badge
holders.
•
•
Signatures: Backup needed if you have Imaging installed. Contains the signature files of
badge holders.
Graphics: Backup needed if you are using Alarm Graphics. Contains the alarm graphics
maps.
The SP Server program MUST NOT BE RUNNING when you attempt a backup of images,
signatures, or graphics!
You should back up this data more often since it changes so frequently. While your internal policies may
dictate your backup requirements, we recommend that you create a backup at least every week.
Entire Secure Perfect Installation
•
The entire Secure Perfect folder should be backed up when you first set up the system and
have confirmed that it is working, and any time you upgrade. It is very important that you also
back up the registry settings. In most backup programs, you will be prompted to back up
these settings.
•
ALWAYS MAINTAIN A CURRENT BACKUP. Should you have any problems with your
system, you can always restore your backup.
SP Enterprise Edition Systems use SQL Server utilities to back up the Secure Perfect database,
Secure Perfect History, and Secure Perfect Archive.
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect Professional Edition Systems use the Secure Perfect Maintenance Utility to back up
the Secure Perfect database, Secure Perfect History, and Secure Perfect Archive information (tables and
queries).
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect 6.1.1 User Manual
109
Backup Clients Assignment Dialog Box
This dialog box allows you to select and assign backup clients associated with the selected client. This
list includes only clients available for assignment by the current operator and defined as a client that does
not exceed the limit of micros and DVRs allowed. When you select a client from the list, you will note that
the client statement defines the total combined number of DVRs and micros of the default client and
backup client. (The total number of micros cannot exceed 64. The total number of DVRs cannot exceed
16.)
• Select, and then click the right arrow to assign an available client.
• Select, and then click the left arrow to unassign a client.
Click OK to display results in the Backup Clients list box.
Backup Clients Tab
Reference Topic:
Client Form
This tab displays ONLY at client computers that are licensed for Client Redundancy. Use this tab to
configure your backup clients that would take over the devices in case of a failure at the default client
computer.
Backup Clients:
This list box displays those clients you have assigned to take over control of any nondirect micros and
DVRs in the event of a failure at the default client computer. The order in which the client names display,
determines which client is next in line to take over. The timing of the takeover is a variable. Backup
clients must be online (Secure Perfect services are running). In the event of a failover, the client entry
includes the client computer name, and then the total combined number of DVRs and micros of the
default client and backup client.
•
•
•
Move Up: Select and click to move this client up the list.
Move Down: Select and click to move this client down the list.
found on your Secure Perfect system. Those computers selected and assigned when you
close the dialog box, will display in the Backup Clients list box.
Database Connection Heartbeat
The Secure Perfect system validates communication with backup clients by pinging (sending continuous
broadcast messages). If there is a communication failure between the default client and the backup
client, the backup client looks for a Heartbeat (time stamp in the database) as an indication that the
default client is online and connected. a) If a Heartbeat exists, the default client is "alive" and the backup
client will not initiate takeover of the devices from the default client. b) If a Heartbeat does NOT exist, the
backup client initiates takeover of devices from the default client. The backup client will use the following
values:
•
Heartbeat (seconds): Select a computer from the Backup Clients list box and assign an
interval of seconds (the range is 10 to 180) between Heartbeat checks. The default number
is 60 seconds. This number can be reset at any time.
•
Heartbeat Retries: Select the number of times (the range is 1 to 3) this backup client checks
for a Heartbeat stamp in the database, before initiating takeover of devices from the default
client. The default number of retries is 2.
Assign Micro Phone #s
This button is only available after completing the following:
•
•
Backup clients have been assigned.
The currently displayed client is host to Dial-up and/or Network + Dial-up micros.
Secure Perfect 6.1.1 User Manual
110
In the event of a system failure, the micros associated with the failed client must have available telephone
Redundancy
Display Redundancy Notification:
By default, this check box is checked. If licensed for Client Redundancy, this check box must be selected
to generate a notification message, that will display at all clients (based on facilities available to the
current operator), when:
•
•
•
A client failure occurs.
A device takeover succeeded.
A device takeover did not succeed. [Select Details button for explanation.]
(If the first-in-line backup client is not available, a second backup client will take over control
of devices and a notification message displays, updating you.)
Recovery of the default client and transfer of devices failed. [Select Details button for
explanation.]
•
•
Recovery succeeded.
If you clear this check box, you will not receive a notification message; however, indication of a take over
displays on the Client Monitor Form.
Perform Backup on Normal Shutdown: This check box is unchecked or clear by default. Select this
check box to trigger the takeover, by a specified backup client, of devices associated with a client during
a normal shut down.
If your system is not licensed and you are operating in demo mode, this option is not available for
selection.
Backup Region Assignment Dialog Box
A list displays, of available backup Regional Database Server computers.
•
Select one or more computer names from the available list and then click the right arrow to
assign.
•
Select one or more computer names from the assigned list and then click the left arrow to
unassign.
Click OK to accept the selections and close this window.
Secure Perfect 6.1.1 User Manual
111
Backup Regions Tab - Region Form
Reference Topic:
Global Editions systems can be configured for database redundancy, at the Regional level. A Regional
Database Server can assign another for backup in the event of a failure at the default Regional Database
Server.
Regional database redundancy and fileserver redundancy operate independently. One or the other, or
both can fail at the same time, whether they reside on the same server computer or are configured to
reside on separate computers. Secure Perfect initiates three tries to fail over to another fileserver. This
process is taking place in the background. After three tries with no success, an SPFileServer interface
attempts to locate an available fileserver. If all attempts fail, the interface generates an alarm.
If you select a failover Regional Server and want your clients to failover to the backup Server, you
Element
Description
Backup Regions
This list box displays those Regional Database Server
computers that you have assigned to take over control in
the event of a failure at the default Regional Database
Server. The order in which the computer names display,
determines which Server is next in line to take over.
Move Up
Move Down
Assign
Select and click to move this Regional Server up the list.
Select and click to move this Regional Server down the list.
Click to display a Backup Region Assignment dialog box,
listing available Regional Database Servers found on your
Secure Perfect Global Edition system. Those computers
selected and assigned when you close the dialog box, will
display in the Backup Regions list.
Badge
Personnel Menu
The Badge option opens the Badge Form that allows you to define a badge in the system. The badge
can then be linked to a person record in the system. More than one badge can be assigned to a person.
Badge
Reports Menu
The Badge option opens the Badge Report Form that allows you to create a report on the badges in your
Secure Perfect system.
Secure Perfect 6.1.1 User Manual
112
Badge Alias
Reference Topic:
Personnel Menu
The Badge Alias option displays the Badge Alias Form that allows you to assign an alias number to the
physically encoded badge number (available only if an alias was assigned during installation).
Badge Alias Tab
Badge Alias Form
Use this tab to assign alias numbers to badge encoded numbers.
Encoded Number
Displays the badge’s encoded number.
Badge Alias
If you selected Manual aliasing during installation, enter the new number for the badge.
If you selected Automatic aliasing during installation, the number will be entered for you.
Find Badge
Click to display a Find Badge dialog box, select a reader, and present a badge at that reader. The record
is displayed that is associated with the badge presented.
Click Save.
• Alias badge numbers saved to the system are automatically preceded with a ‘1-‘
• If this is a Global Edition system, the badge alias number is preceded by the Region ID number that
uniquely identifies the Region. Therefore, the same alias number can be assigned across regions,
because the number is uniquely identified by the Region ID.
Badge Assignment Dialog Box
This window displays when you click Assign Tour Badges, enabling you to select and assign tour badges
to a tour.
•
Multiple badges can be assigned to a guard tour, but if a badge is assigned to a tour, the
same badge cannot be assigned to any other tours.
•
•
The same badge must be used to complete the entire tour.
When a badge is assigned to a guard tour, the badge is downloaded to all micros that have
reader type tour points for that guard tour.
•
•
If any reader is assigned as a tour point, at least one badge must be assigned to the tour.
If all tour points are DIs, you do not need to assign a badge to the tour.
Click OK to display the results in the Tour Badges windowpane.
Secure Perfect 6.1.1 User Manual
113
Badge Definition Tab
Badge Form
Use this tab to define a badge.
Element
Description
Assigned to
Select the name of the person to whom this badge is assigned. If this
badge is not yet assigned, select <UNASSIGNED>.
Refresh: Click to update the person list with the most up-to-date
information.
Click the Show me icon to view a
step-by-step animated demo.
Number
This number must be unique to Secure Perfect. It may be already
encoded into the card (if you are using a card) or you can assign a
number in this dialog box no more than 20 digits. This number will be
entered into a keypad reader when there is no card.
If you are using badge aliasing: The alias displays here as a read-only
number and cannot be changed. An alias number is assigned on the
reader.
Status
Only badges with the status of Active will be granted access through
readers.
•
Active: The badge has been assigned to a person and may gain
access. An Active badge can be re-assigned as a Guard Tour
badge.
•
Guard Tour: The badge has been assigned to a person and will be
used as a guard tour badge. A Guard Tour badge can be re-
assigned as an Active badge.
•
•
•
•
Issuable: The badge has not yet been assigned to a person.
Lost: The badge has been reported as lost.
Remake: This badge has been damaged.
Suspended: This badge was assigned to a person who no longer
works at the facility.
PIN Number
If this badge will be used with a badge-and-keypad reader, enter a
personal identification number here. This number will have to be entered
at the keypad in order to gain access with this badge.
This number must be four digits.
•
Select this option to enforce ‘Extend Unlock Time’ for this badge
record. If you assigned this badge to a person from the ‘Assigned to’
drop-down list, this person is now allowed extra time to gain access
to an entry or exit point in the Secure Perfect system. Time
limitations are configured on the Door Functions tab of the Reader
Follow Extend
Unlock Time
•
If this badge is being assigned to a person whose existing record
indicates that Extend Unlock Time is enforced, this checkbox will
display as already selected.
Example: An extended time limit beyond normal can be configured for
an employee who enters a motorized door by wheelchair.
Manual Control:
Reset APB and
T&A Status
Resets the APB or T&A status of the current badge to neutral.
Dates
Issue: The date the badge was assigned and issued to a person.
Secure Perfect 6.1.1 User Manual
114
Expiration: The first date on which the badge will no longer grant
access. A blank value means the badge never expires.
Return: The date the badge was returned.
Last Valid Access
Date: Date the last valid access was granted to the badge, as stored in
the Secure Perfect database.
Time: Time the last valid access was granted to the badge, as stored in
the Secure Perfect database.
Reader: Reader at which the last valid access was granted to the
badge, as stored in the Secure Perfect database.
Find Badge
badge at that reader. The record displays that is associated with the
badge presented.
Badge Design
Personnel Menu
The Badge Design option opens the Badge Design Form that allows you to create or format what will
print on your badge.
Badge Format
Administration Menu
The Badge Format option opens the Badge Format form that allows an operator to design, import, or
export custom badge formats into the micro. Custom magnetic stripe or Wiegand formats can be loaded
to your Secure Perfect system.
Badge Formats in 40-Bit and 55-Bit Wiegand Protocol
4002 - 40-Bit Wiegand Format
The 40 bits of transmission consist of two parity bits and 38 code bits. The first bit transmitted is the first
parity bit, P1; it is even parity calculated over the first 20 bits. The last bit transmitted is the second parity
bit, P2; it is odd parity calculated over the total 40 bits.
Code format:
F = Facility – 0 Digits
B = Badge Number (99.999.999.999 possible) 12 digits
This format was created to enable identical badge identification numbers to be produced in either
S-F/2F or Wiegand mode. These numbers are derived from the 40-bit binary code in the proximity
chip. The badge number is comprised of the 38 least significant bits. The most significant bit is set at
0.
5502 - 55-Bit Wiegand Format
The 55 bits of transmission consist of two parity bits and 53 code bits. The first bit transmitted is the first
parity bit, P1; it is even parity calculated over the first 27 bits. The last bit transmitted is the second parity
bit, P2; it is odd parity calculated over the total 55 bits.
Code format:
F = Facility – 0 digits
B = Badge Number – 16 digits
P = Parity Bit
Secure Perfect 6.1.1 User Manual
115
Badge Format Tab
Reference Topics:
Badge Format Form
This tab allows you to identify the pattern of the data bits (mask) combination, in the badge numbers that
you will import or export to your micro and store in the Secure Perfect database.
Element
Description
Format Type
Select from two data masks.
•
Magnetic Stripe: The number is a mask embedded into a magnetic tape
strip and usually adhered to badges or credit cards.
•
Wiegand: A pulse-generating mask sensed by a pickup coil (the reader).
This is a complex system to manufacture and virtually impossible to
duplicate making it one of the most secure access control technologies.
The number is a mask of a digital 0 or 1.
Position
Indicates the location or position of the bit where your mouse pointer is
presently positioned, in the mask combination.
•
Magnetic Stripe:
N = Badge or facility/site bit
B = Start character (With few exceptions, the start character is ‘B’ the
majority of the time.)
Badge data layout
(B,F,P,0,1)
0 to 9, A, C, D, E. = Constant characters
= Space
•
Wiegand: The following characters are acceptable. Also refer to the
Legend group box:
B = Badge identification (BID) bit
F = Facility/site code bit
P = Parity bit (an extra bit added for error detection or integrity testing)
0 or 1 = Constant characters
E = Parity layout - Even
O = Parity layout - Odd
= Space
The following settings apply to Wiegand Format ONLY:
Parity layout 1 (E, O):
Parity layout 2 (E, O):
Parity layout 3 (E, O):
Parity layout 4 (E, O):
Indicates the first parity bit in the data mask. The entry must be an even (0) or
odd (a) parity bit.
Indicates the second parity bit in the data mask. The entry must be an even
(0) or odd (1) parity bit.
Indicates the third parity bit in the data mask. The entry must be an even (0)
or odd (1) parity bit.
Indicates the fourth parity bit in the data mask. The entry must be an even (0)
or odd (1) parity bit.
Number of facility
characters:
The number of facility code bits in the data mask.
Numbers of badge
characters:
The number of badge number (BID) bits in the data mask.
Secure Perfect 6.1.1 User Manual
116
The following applies to all formats:
Import format from file
This selection is enabled when you click New to add a new record. Click to
navigate to a network drive, CD, diskette, or a local drive of your computer
and import a Wiegand or magnetic stripe file.
(Example Wiegand File Name: *.wgd)
Export format to file
Comments:
Click to navigate to a network drive, CD, diskette, or local drive of your
computer and export a Wiegand or magnetric stripe file.
Enter text as an explanation or details of this procedure. The field accepts
256 characters.
Badge History
Reports Menu
The Badge History option opens the Badge History Report Form that allows you to create a report
based on the history of badge transactions in the system.
Secure Perfect 6.1.1 User Manual
117
C
Calendar Dialog
Select the day, month, and year of badge issue, return, or expiration. Click OK to accept the selected
date and close the form. Click Cancel to close the Calendar form without making any changes. Click
None to clear the date currently in the field.
Camera
Device Menu
The Camera option displays the Camera Form that allows you to edit the parameters of the selected
camera record. Camera records are automatically created when a DVR is defined.
Camera Preset
Administration Menu
The Camera Preset option opens the Camera Preset Form that allows you to label a preset camera
position and assign a number to that preset.
Camera Preset Assignment Dialog
A list of available camera presets displays. These presets were previously defined on the Camera Preset
Form.
•
•
Select one or more presets from the available list and then click the right arrow to assign.
Select one or more presets from the assigned list and then click the left arrow to unassign.
Click OK to accept the selections and close this window.
Can I Customize the Toolbar?
No. The toolbar cannot be customized.
Cascade
Window Menu
The Cascade option allows you to control multiple windows or forms. If you have several forms open but
not visible, select this option for a cascading view of your forms with the active form taking precedence on
the display screen.
Secure Perfect 6.1.1 User Manual
118
CCTV Alarm
Administration Menu
The CCTV Alarm options opens the CCTV Alarm Form that allows you to link CCTV alarms to Secure
Perfect alarms so that Secure Perfect alarms trigger CCTV events and display on the Secure Perfect
Alarm Monitor Form.
This form is NOT used in the Kalatel Integrated Digital Video option. It is only applicable in the serial
CCTV interface.
CCTV Alarm Assignment
This dialog box allows you to select and assign CCTV alarms to Secure Perfect alarms. Only CCTV
alarms in the operator’s facilities are available for assignment by this operator.
•
•
Select, and then click the right arrow to assign an available alarm.
Select, and then click the left arrow to unassign an alarm.
CCTV Tab
Alarm Form
Select this tab to assign CCTV alarms to Secure Perfect alarms. The windowpane displays the CCTV
alarms already assigned to this alarm.
items from the list.
CCTV Tab
CCTV Alarm Form
Use this tab to set up a CCTV alarm.
CCTV Interface: Select the Interface from the drop-down list. If there is no interface listed, then it has not
been installed.
CCTV Alarm: Select the alarm number from the drop-down list. When you assign a number, an enable
and disable message is automatically generated.
•
Enable Message: An enable message is automatically generated when you select a number
in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm
number will overwrite the changes to this message.
•
Disable Message: A disable message is automatically generated when you select a number
in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm
number will overwrite the changes to this message.
Reset CCTV Alarm:
•
When the Secure Perfect alarm is cleared from the Alarm Monitor: Select this option if you
want the CCTV alarm to reset when the alarm is cleared from the Secure Perfect Alarm
Monitor.
•
When the Secure Perfect alarm Resets: Select this option if you want the CCTV alarm to
reset when the alarm is reset in SP.
Change Password
Operations Menu
password.
Secure Perfect 6.1.1 User Manual
119
Change State
If the micro is currently online, this will change the state to offline. If the micro is offline, this will change
the state to online.
Each time a micro is set to online, the database must be downloaded to the micro. If a new micro
database is required, click Download Database as well as Download Badges for the selected micro.
Download Database:
Download Badges:
Check for Update
Reference Topic:
File Menu
This item is enabled when the Enable Auto Update option is selected on the SP Auto Update
Configuration Form of the Administration menu.
Each time you log in, your Secure Perfect system checks for updates. Also, at any time, you may select
this item to begin a search of the configured Web site for updates to the Secure Perfect system. This
process searches for new upgrades, compares the version, and if the patch or update needs to be
applied, a dialog box displays a message.
•
•
•
Click OK to close the dialog box and begin the update process.
Click Cancel to close the dialog box and process the upgrade at another time.
If the Web site cannot be reached, a message informs you that communication failed. Recheck your
update configuration settings and try again.
•
If no new updates are available for your system, a message displays informing you that your system is
up to date.
Clear Archive Tab
Reference Topic:
Parameters Form
Earliest Date in Current Archive DB: If you have an archive database, this date displays when you click
Show Date.
Latest Date in Current Archive DB: If you have an archive database, this date displays when you click
Show Date.
Show Date: If you have an archive database, click Show Date.
•
•
The Earliest Date in Current Archive DB and Latest Date in Current Archive DB will display.
If you do not have an archive database, the two date fields will state No Record.
Secure Perfect 6.1.1 User Manual
120
Archive Clean Period:
•
•
•
Start Date: Select the Start Date of the data that you want to remove from your database by
selecting the month, then the day to begin your archive.
End Date: Select the End Date of the data that you want to remove from your database by
selecting the month, then the day to end your archive.
Delete: Press after selecting Start Date and End Date to remove from your database.
The deletion of an archive database takes place in the background. Progress is indicated on the
status bar. This may take hours to complete and is dependent on the size of the Archive database and
the hardware components of your computer.
Clear Button
This option clears all badge transactions from the Activity Monitor Form.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
Clear Search
Search Menu
The Clear Search option clears all data in the current form. Use this option when the form has data and
you want to begin a new search. The option does not conduct a search nor does it affect any data in the
database. It only clears data from the form in preparation for a search or to cancel a change to a record.
The Clear Search option is available only when a form that contains records is open.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Client
Administration Menu
The Client option opens the Client Form that allows you to merge a client computer to your Secure
Perfect system.
Client Assignment Dialog Box
This dialog box allows you to select and assign Secure Perfect client computers to a Client Group. Only
clients in the operator’s facilities are available for assignment by this operator.
•
•
Select, and then click the right arrow to assign an available client.
Select, and then click the left arrow to unassign a client.
Click OK to close this dialog box and display the results in the Clients windowpane.
Client Group
Administration Menu Item
The Client Group option opens the Client Group form, allowing you to assign Secure Perfect client
computers into logical groups. A comment box is available for entry to describe the configuration. Later,
client groups can be assigned to specific alarm routing and bumping configurations.
Secure Perfect 6.1.1 User Manual
121
Client Group Tab - Client Group Form
On this tab, you must assign at least one Secure Perfect client computer in order to save this Client
Group record.
Element
Clients:
Description
This windowpane displays the names of client computers
that are assigned to this Client Group.
Assign Clients
Comments
you to assign Secure Perfect clients to this Client Group.
Use this field to describe the reason for creating this group or
special considerations for this configuration. This field
accepts 256 characters.
Client Monitor
Operations Menu
The Client Monitor option opens the Client Monitor Form that allows you to obtain client information
such as client type, Imaging status, and connection status. The shortcut key combination for the Client
Monitor Form is CTRL+C.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual
122
Client Monitor Form Shortcut Menu
Reference Topics:
Element
Description
Disconnect
Launch
To launch and enable a CCTV interface (other than integrated CCTV).
To display the Client Form, to add a client to the Secure Perfect network.
Client Form
Recover
and is now able to host its original devices. When the default client is running,
a manual intervention is required to bring all its devices back to itself.
This option is enabled and available ONLY on the shortcut menu of the
default host that is now ready to be recovered.
- A notification message informs you of a successful recovery. Control of
devices is returned to the default host.
- A notification message informs you of an unsuccessful recovery. Verify
communication with the default host and retry the recovery.
To initiate recovery of a Regional Database Server host that failed, was taken
Recover Region
This option is enabled and available ONLY on the shortcut menu of the
default host that is now ready to be recovered.
- A notification message informs you of an unsuccessful recovery.
To display the Manual Control form, for this operator to manually perform
operations on the system.
Manual Control Form
Client Monitor Form Toolbar
Reference Topics:
Client Monitor Form Shortcut Menu
Click
To
Disconnect the selected client.
Enable a CCTV interface (other than integrated
CCTV).
Secure Perfect 6.1.1 User Manual
123
Client Redundancy Overview
The Secure Perfect software system is responsible for processing alarm and badge transactions from
devices like micros and DVRs. The software is responsible for writing these transactions to the database.
A device such as a micro or DVR is hosted by a single Secure Perfect client. The client could potentially
be responsible for hundreds of devices and can be a single point of failure. Although devices like the
micro are designed to run without the host software running for days, eventually memory is going to be
filled up at the micro end. The redundancy feature in SP 6.0 is designed to address this condition. Clients
can be configured to be backed up by other clients so that, in case of the default hosting client (called the
primary client) being disabled, one of the backup clients takes over all its devices. This is designed to
work automatically without any operator intervention so the system continues to work efficiently. One of
the backup clients performs the role of the default client until the default client is back up and running.
The devices that can be taken over at present are all DVRs, network micros, dialup micros, and network
+ dial up micros. Direct micros cannot be hosted by any other than the default client computer.
The table below will assist you to find the areas in this Help system, relating to the redundancy feature.
Reference Topics:
Configuring Client Redundancy:
Am I Licensed for Client Redundancy?
How do I configure backup clients for redundancy?
What micros are supported?
Backup Clients Tab
What are the limits on micros and DVRs?
What is not permitted?
Backup Clients Tab
When a Failover Occurs:
Backup Clients Tab, Display Redundancy
Messages Displayed
Notification
Client Monitoring
How long should I wait when a failover occurs?
Heartbeat
What alarms display on the Alarm Monitor?
What is the behavior on the Digital Video Viewer
and Network List?
Recovery:
Recovery Notification
Messages
Notification
Client Monitoring
How do I recover?
Notification
What happens when a default client is back up?
What is the timing on the recovery?
Secure Perfect 6.1.1 User Manual
124
Client Tab
Client Form
Element
Description
•
When creating a new client record, click Browse to display a Select Client
window, listing all computers found on your network by PC name. (Secure
Perfect uses PC names only.) To add a client, select the computer name from
the list and click OK. You can add as many clients as you want but you are
limited to the number of licensed clients connected to the network at one time.
The number of client licenses presently active and connected to the Secure
By default, when an existing client record displays, PC Name is read-only and
not available for edit
PC Name
•
•
Client computers to which devices are associated, cannot be deleted. The
devices must be removed or assigned to another client before this client can
be deleted.
•
Client computers assigned as backup clients cannot be deleted. You must first
un-assign this client from the Backup Clients list on the Backup Clients tab,
and then delete.
OS Type
Region
When adding a Secure Perfect client to your system, accept the default OS Type
as Windows. When conducting a search, select either Windows or CCTV from
the drop-down list.
This field is available only when you first open the Client form, and BEFORE you
initiate a Search. To locate a particular Server or client, you are able to select a
Server name from the Region drop-down list. The field default displays the
Database Server computer name. The clients associated with the selected
Region display in the right windowpane. (If you click Search immediately after
you open the Client form, this field displays the default Server name and is
unavailable for selection.)
•
Disabled: Select if you want to disable Imaging in order to enable another
client computer.
Imaging Status
•
Enabled: Select to enable Imaging here but you are limited to the number of
licensed Imaging stations enabled at one time. The number of Imaging
licenses presently active can be found on the Client Monitor form.
Thin Client
Status
A Secure Perfect client computer can also be a thin client. A thin client has
Terminal Services and/or Citrix Server software installed. If the Secure Perfect
client has Thin Client Status of Enabled, other computers can connect to the
Terminal or Citrix Server on the Secure Perfect client and run Secure Perfect.
•
•
Disabled: Select if you want to disable the thin client option.
Enabled: Select to enable the thin client option at this Secure Perfect client.
The number of thin clients you can enable is controlled by the number of thin
client licenses you have. Refer to the Client Monitor form, which displays the
number of thin client licenses presently available and in use.
Auto Logoff
Select the number of minutes the system will wait since the last action was taken
before logging off the current operator. To turn off the auto logoff feature and
remain permanently logged in, enter 0(zero). The default setting is 20 minutes.
You must restart the Secure Perfect client program for changes to the Auto
Logoff selection to take effect.
Display Alarm
Notification
Enable this field if you want an alarm dialog box to display whenever an alarm
occurs, based on facilities available to the current operator.
Secure Perfect 6.1.1 User Manual
125
Client Region
Failover
This checkbox displays only on a Global Editions system.
This checkbox is applicable to Secure Perfect Global Edition systems. When
displayed, the default state of this checkbox is selected and grayed out. If a
database failure occurs at the default Regional Database Server, this client would
automatically fail over to a configured backup Regional Database Server.
Click the checkbox to clear and disable the automatic failover option. You might
choose to clear this checkbox to prevent nonessential client failover.
Enable Auto
Shutdown
Secure Perfect services will automatically shut down when a client closes the
•
Interval: This is the interval of time a broadcast message will be sent,
indicating a client is online. (Default is 40,000. This field will not accept an
entry less than 5,000 msec.)
Ping Time
(msec)
•
Timeout: The amount of time that will elapse between broadcast message and
response before the system considers a client offline. The client status will
display on the Client Monitor form. (Default is 120,000. This field will not
accept an entry less than three times the Interval amount specified.)
ACTIVITY PRINTING
CAUTION: Windows 2003 or Win/XP Professional Operating Systems: If the printer you have
selected is hosted by a computer running a Windows 2003 or Win/XP Professional operating system,
you must add permissions to share this printer to the Secure Perfect network. At the host computer,
navigate to your printer property settings. On the Security tab, add ANONYMOUS LOGON or
NETWORK to the Security permissions.
Printers can be connected to the Server or any client computers. The defaults of the activity printer
selections are cleared on any newly configured system. Any system with a newly converted database
will require reconfiguration of these activity printer selections at each client workstation.
Alarm and
Guard Tour DI
Activity Printing
You must enable, select a printer, and route alarms to a printer in order for
alarm activity to print.
•
•
Enable: Select this check box to print alarm activity. If you select to enable
alarm activity printing, you must select a printer in order to save this record.
Printer: Displays the currently selected printer to which alarm activity will
print. This may be the same or a different printer than that used for badge
transactions.
•
Select Printer: Click this button to select a printer to which alarm activity will
print.
Print Alarms At Host must be selected on the Alarm Form in order for alarm
activity to print.
Badge and Zone
Activity Printing
You must enable, select a printer, and route badge activity to a printer in order
to print badge transactions.
•
•
•
Enable: Select this check box to print badge activity. If you select to enable
badge and zone activity printing, you must select a printer in order to save
this record.
Printer: Displays the currently selected printer to which badge transactions
will print. This may be the same or a different printer than that used for alarm
activity.
Select Printer: Click to select a printer to which badge transactions will print.
1) Printer options must be selected on the Reader Form in order for badge
transactions to print. 2) All zone activity transactions print and do not follow
routing or schedules assigned to a reader.
Secure Perfect 6.1.1 User Manual
126
Comments Tab
Micro Form
This tab and windowpane are provided to enter information about this micro, such as location data.
Communication Settings Tab
Reference Topic:
Parameters Form
Use this tab to select the modems that will be used for dial-up micros.
Installed Modems: Displays all modems currently installed on the PC. To designate a modem for use
with a dial-up micro, enable it by clicking in the box to the left of the modem name so that a check
displays. If you have a modem installed for support use, DO NOT SELECT THAT MODEM.
Disconnect After Idle: Select the number of minutes you want the system to wait before disconnecting
from the micro when the connection is idle (there is no history or database information being exchanged).
If you select 0, the connection will remain active indefinitely and the host will never drop communication
with the micros.
Network Port Range:
•
If you communicate with your micros over a local intranet, this does not apply. Ignore these
remarks.
•
If you must cross a firewall to communicate with your micros, you will need to read the
following:
Low end:/High end: You will be required to open up a range of ports sufficient to support the number of
micros with which you must communicate outside a firewall. The first ten port addresses are reserved for
client-to-client communication. Anything beyond the first ten port addresses can be used for micro
communication.
Example Addresses:
Default Low end:
Default High end:
6700
6709
(These are the 10 internal port addresses reserved for client-to-client communication.)
Change High end: to: 6710
= Assign address to 1 micro outside the firewall.
= Assign addresses to 2 micros outside the firewall.
= Assign addresses to 3 micros outside the firewall.
6711
6712
Communications Settings Tab
Digital Video Recorder Form
Use this tab to assign or edit a TCP/IP address, PTZ control, event tagging, and clock time
synchronization.
TCP/IP Address
PTZ Control
Select TCP/IP or None. The default is None. TCP/IP is to be selected if cameras with PTZ capability are
configured on this DVR and require control from SP. None is to be selected if all cameras on this DVR
are either fixed or if no control of PTZ cameras is desired.
Secure Perfect 6.1.1 User Manual
127
Event Tagging
Select TCP/IP or None. The default is None. Select TCP/IP if event triggers are required to tag recorded
video upon activity from defined readers and alarms. Select None if no tagging of recorded video is
required for event triggers and only access to live video is desired upon activity from defined readers and
alarms.
Time Sync Interval
The DVR date and time clock can be syncronized by its host computer to ensure that access control,
alarm, and video events across the entire system are time stamped in sync. When DVRs on a centralized
system reside in different time zones, the DVRs should be hosted by computers in their same time zone.
The Secure Perfect hosting computers will synchronize their DVR clocks at the interval selected as well
as immediately manage any system date and time changes including daylight savings time. Select one:
•
•
•
•
•
•
None (default)
1 Hour
4 Hours
8 Hours
12 Hours
24 Hours
If DVRs are required to be synchronized with the Secure Perfect system date and time clock, 12 Hours is
a recommended setting for most systems.
Conditions of Mass Update
The time to process a mass update depends on your system performance, number, and type of
updates. Specifically, the badge learn and alarm processing functions may be influenced. We
recommend that you schedule mass update processing during off-peak hours for your company.
•
GE Security has set 200 as the default maximum number of records that can process
updates at one time. However, this number is configurable. Call GE Security Customer
Support for assistance if you want to reconfigure the default.
ONLY those fields or dialog boxes that are available for mass update changes are enabled in
Mass Update mode.
•
•
Navigating from any form to another form in Mass Update mode will take that form out of
Mass Update mode.
Person Form:
The following fields are available for mass update: Facility, Personnel Type, Department, and
Access Rights.
•
Badge Form:
•
•
•
•
•
•
The following fields are available for mass update: Assign To, Status, Dates – Issue, Dates –
Expiration, and Dates – Return.
When changing an assigned badge to unassigned, the status automatically changes to
Issuable.
When changing status to Issuable, a message displays a Yes or No option. If Yes, the status
automatically changes to Issuable and selected badges are unassigned.
When changing an unassigned badge (status is Issuable) to an assigned person, the status
changes to Active.
Records selected for mass update with a status changing to anything other than Issuable will
cause a check for badge assignment.
If any badge in the mass update selection is not currently assigned, these badge records
become unavailable and a message displays indicating they are unavailable.
Secure Perfect 6.1.1 User Manual
128
Create Default Template
File Menu
Select this option to create a default Report template. This option is available only when a Report Form is
displaying.
If a specific date is part of this template, whenever this report is run, it will use that date; therefore, it is
important to update the calendar criteria as needed.
Creating a Dial-Up Micro Record
Reference Topic:
Set up your modem(s) through the Server or client computer’s operating system. Refer to the
documentation you received with your modem.
1. Select the Administration menu, then select Parameters.
2. Select the Communication Settings tab, and enable the modem(s) that will be used for micros. You
will need to stop the SP Server computer and then restart it.
3. Once you restart Secure Perfect and log in, select the Device menu, then Micro.
4. On the Micro Definition tab, default values will be filled in for the following fields: Head of line and
Badge Loading.
ꢀ
ꢀ
ꢀ
Enter the address of the micro.
Enter the type of micro.
If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,
select No and select the head of line micro. If this is a downstream micro that you are adding,
the micro directly upstream (towards the host) from it will need to be reset in order for it to
recognize the micro you are adding.
Example:
If your line of micros looks like this:
Host – Micro 1 – Micro 2
And you want to add Micro 3 to the end of the line so that it now looked like this:
Host – Micro 1 – Micro 2 – Micro 3
Then you would need to reset Micro 2 in order for Micro 3 to be recognized.
For Connection type, select Dial-up.
Select a Badge Loading method.
ꢀ
ꢀ
5. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,
and four-4) are used. If you want to change the passwords, you may do so at any time.
6. On the Time Zone tab, verify and adjust time zone settings as necessary.
7. On the Comments tab, you may enter any information you want or leave this tab blank.
8. On the Events tab, you may want to schedule when APB and T&A are reset and when the host
dials the micro. If you select an event for the Dial field (host dials the micro), you must stop and
restart the SP Server before the host will recognize the event settings.
9. Select the Status tab to view information about the micro such as the firmware version. You can
request the latest information by clicking Refresh.
10. On the Settings to Reach Host tab:
ꢀ
ꢀ
ꢀ
ꢀ
Enter the telephone number(s) that the micro will dial to reach the host.
Enter the interval at which the micro will automatically dial the host.
Enter the number of times the micro will try the same number.
Enter the number of intervals that the micro will wait before trying a telephone number again.
11. On the Settings to Reach Micro tab:
ꢀ
ꢀ
ꢀ
ꢀ
Enter the telephone number(s) that the host will dial to reach the micro.
Enter the interval at which the host will automatically dial the micro.
Enter the number of times the host will try the same number.
Enter the number of intervals that the host will wait before trying a telephone number again.
Secure Perfect 6.1.1 User Manual
129
12. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the
desired board in the Boards and drag to the Configuration column. To delete a board from the
Configuration column, select then right-click and select Delete.
13. Click Save to save the record. If there is any required information missing, a message will display
listing those items that are incorrect or missing. Do not forget to save the record again once you fix
those items.
14. When the micro record is created, the records for the associated readers, alarms, alarm groups,
digital outputs, and digital output groups are also created with default data based on the boards you
added on the Micro Configuration tab.
15. Use the Micro Utilities Form to set the micro online.
Creating a Direct-Connect Micro Record
Reference Topic:
1. On the Micro Definition tab of the Micro Form, default values will be filled in for Head of line and
Badge Loading. Complete the following:
ꢀ
ꢀ
ꢀ
Enter the address of the micro.
Enter the type of micro.
If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,
select No and select the head of line micro. If this is a downstream micro that you are adding,
the micro directly upstream (towards the host) from it will need to be reset in order for it to
recognize the micro you are adding.
Example:
If your line of micros looks like this:
Host – Micro 1 – Micro 2
And you want to add Micro 3 to the end of the line so that it now looked like this:
Host – Micro 1 – Micro 2 – Micro 3
Then you would need to reset Micro 2 in order for Micro 3 to be recognized.
For connection type, select Direct.
Set Host keep alive time interval.
Enter the PC name of the host computer or navigate and select.
Select a method.
ꢀ
ꢀ
ꢀ
ꢀ
2. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,
and four-4) are used. If you want to change the passwords, you can do so at any time.
3. On the Time Zone tab, a default time zone is filled in. Verify and adjust time zone settings as
necessary.
4. On the Comments tab, enter any information you want or leave blank.
5. On the Events tab, you may want to schedule when APB and T&A are reset.
6. Select the Status tab to view information about the micro such as the firmware version. You can
request the latest information by clicking Refresh.
7. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the
board you want and drag to the Configuration column.
8. To delete, select a board from the Configuration column, right-click and select Delete.
9. Click Save. If there is any required information missing, a window will display listing those items
that are incorrect or missing. Don’t forget to save the record again once you fix those items.
10. When the micro record is created, the records for the associated readers, alarms, alarm groups,
digital outputs, and digital output groups are also created with default data based on the boards you
added on the Micro Configuration tab.
11. Use the Micro Utility Form to set the micro online.
Secure Perfect 6.1.1 User Manual
130
D
Database Tab - Reports
Alarm History, Badge History, Zone History, DI History, Time and Attendance, or Operator History
Reports
Use this tab to select the history database to use for this report. The file name displayed on the tab is the
currently selected archive database.
•
•
Select archive database: Click to select the archive history database.
Use default: Click to use the current history database.
Database Utilites
The Integrity utility runs automatically, following a database creation or conversion and upgrade from a
previous version of Secure Perfect. No user interaction is required.
The utility can be run manually if you want to check your database integrity. The system compares and
validates the integrity of your database schema. If selected, the system will automatically correct missing
or incorrect schema properties such as columns, keys, constraints, indexes, triggers, and tables. The
executable file is installed with Secure Perfect and resides in the Secure Perfectprogram folder.
1. Locate and double-click the DatabaseIntegrity.exefile to manually run the utility.
2. Enter the Server Name or click the browse button and navigate to the appropriate Server Name.
3. Enter the SQL system administrator ‘sa’ Database Password or accept the encrypted database
password of the default Server.
4. Click Connect to locate and connect to the Secure Perfect databases. The remaining selections are
now enabled. Accept the default options or review and disable selections.
5. Select one of two options:
ꢀ
Verify that Check Database Integrity is selected.
OPTIONAL: Select the Autocorrect checkbox. This feature runs only once and
corrects obvious schema in the database. Results display in a report.
Autocorrect is not available on a Global Edition system.
Select which databases to check.
Select Start to begin. Wait as the Database Integrity tool compares and validates the
integrity of your database. Messages generate to an IntegrityCheck.htmlfile in
your Secure Perfect application Logs folder.
ꢀ
OR
Select Unlock Database Mutex to unlock the shared resource. Select Unlock to
unlock the database mutex for SPSQL.
6. Click OK when the Application Success window displays.
Secure Perfect 6.1.1 User Manual
131
7. Click View Integrity Report to review the messages generated to an IntegrityCheck.html file in your
Secure Perfect application Logs folder. Review the file to determine if database errors were detected.
OR
Click Close to close the window and exit.
The Replication tab is applicable to systems that have Secure Perfect Global Edition installed. We
recommend that you call GE Security Customer Support for assistance in setting the parameters for the
Global Edition database replication.
Date Range Tab - Reports
Roll Call, Alarm History, Badge History, Zone History, DI History, Time and Attendance History, or
Operator History Reports
Use this tab to select a date and time range on which to base this report.
•
Daily time range: Will report on transactions that occurred between the start and stop time
each day in the date range. For example, you select a start time of 8:00 a.m., a stop time of
5:00 p.m., a start day of April 1 and a stop day of April 5. You will receive a report of badge
transactions occurring between 8:00 a.m. through 5:00 p.m. each day of the day range.
Continuous time span: Continuous will report on transactions that occurred between the start
time on the start day to the stop time on the stop day. For example, you select a start time of
8:00 a.m., a stop time of 5:00 p.m., a start day of April 1 and a stop day of April 5. You will
receive a report of alarm transactions occurring between 8:00 a.m. on April 1 through 5:00
p.m. on April 5.
•
•
Start Date: Select the start date range by clicking the desired day on the calendar. To move
ahead or back by a month, click the arrows on either side of the name of the month. To move
ahead or back by a year, click the arrows on either side of the year.
•
•
Start Time: Accept the default start time as displayed or enter a start time.
Stop Date: Enter an end date range by clicking the desired day on the calendar. To move
ahead or back by a month, click the arrows on either side of the name of the month. To move
ahead or back by a year, click the arrows on either side of the year.
•
Stop Time: Accept the default stop time as displayed or enter a stop time.
Definition Tab - Alarm Routing and Bumping Form
This tab allows you to configure the routing of alarms to selected Client Groups according to a schedule
or at all times. Additionally, you can select Client Groups and set a time to bump the alarm to an
additional location.
•
You can configure both Routing and Bumping, only a Routing record, or only a Bumping
record.
•
Client Groups can be part of any Region in a Secure Perfect Global Edition system.
Element
Description
ROUTING:
Client Groups
This windowpane displays the names of Client Groups
assigned to this Routing record.
Assign Client Groups
Click to display an Alarm Routing Client Group Assignment
dialog box that allows you to assign Secure Perfect Client
Groups to this Routing record.
Select one of the following options:
•
Always
Select this option if you always want this Client Group to
receive alarms.
•
Time Schedule
Select this option to enable the Time Schedule drop-down list
and then select a Time Schedule from the list.
Secure Perfect 6.1.1 User Manual
132
BUMPING:
Client Groups
This windowpane displays the names of Client Groups
assigned to this Bumping record. Typically, the Client Groups
displayed here are different than those assigned to Routing.
Assign Client Groups
Click to display an Alarm Bumping Client Group Assignment
dialog box that allows you to assign Secure Perfect Client
Groups to the Bumping record.
Time To Bump:
•
Minutes
•
Select the number of minutes to wait before bumping this
alarm notification to an additional location, if the alarm is not
acknowledged or purged at the Routing work station. The
Alarm Monitor form will indicate that this alarm is bumped.
The minimum setting is one minute. The default and
maximum is 30 minutes.
•
•
Seconds
•
•
Select the number of seconds to wait before bumping this
alarm notification to an additional location. The default is
zero.
Use this field to describe the reason for creating this record
or special considerations for this configuration. This field
accepts 256 characters. It is not necessary to complete an
entry in this field.
Comments
Definition Tab - API Connections Form
Enter information that defines an interface license for external application integration to Secure Perfect.
Application Login: Enter the login used by the external application to connect and access the API. Each
login must be unique.
Password: We recommend a noncryptic password. The password must be greater than four
alphanumeric or wildcard characters, with no spaces. The password is NOT case sensitive.
Confirm Password: Enter the password a second time.
PC Name: From the drop-down list, select the Secure Perfect computer that will host the external
application.
Definition Tab - Camera Form
type configurable for Fixed or PTZ. The camera can be enabled or disabled for viewing and managing
from within SP. Use this form to edit the parameters of the selected camera record.
Address
This is a read-only field. The address of the camera is automatically assigned. The address is a 2-digit
number that corresponds to the camera channel on the back of the DVR.
DVMR
This is a read-only field. This field displays the corresponding DVR with which this camera is associated.
Camera Type
Select a type of camera behavior as Fixed or PTZ from the drop-down list.
Enable Camera
By default, this checkbox is selected. The camera can be enabled or disabled for viewing and managing
from within Secure Perfect and setting accessibility from the Digital Video Viewer. Disabled cameras will
not display on the Digital Video Viewer.
Secure Perfect 6.1.1 User Manual
133
Definition Tab - Camera Preset Form
Preset
In this text field, enter a number within the range of 1 to 32. This number will only reference the preset
number programmed and stored in a camera with PTZ capability. Click Save. This preset is now
available for assignment, to a specific camera.
Definition Tab - Digital Video Recorder Form
Use this tab to assign or edit a bus address, type, host computer, or poll time.
Field
Description
DVR
Address
associated with this DVR (from 1 to 255). This field will not be
available to edit existing records. This number is used in Secure
Perfect software to uniquely identify the DVR and its related
records.
DVR Type
Select a DVR type from the drop-down list. Secure Perfect currently
supports: 4, 10, and 16-camera channel multiplexer/recorder
models from Kalatel. This field will not be available for edit on
existing records. When you click Save, the number of camera
records will be created equivalent to the type of DVR you selected.
Bus
Address
The bus address is a 2-digit field in the range of 1 to 32. The bus
address refers to the physical DVR device address on the RS-485
bus and must be entered when multiple DVRs exist on a single bus
and/or for controlling camera(s) with PTZ capability.
Host
Select a Default Hostname from the drop-down list that will host
Computer
the defined DVR and act as its communications server.
If the Default Hostname computer is in a failover condition, you
cannot re-assign this DVR to any other Host computer except the
Active Client that is presently hosting this device.
• Enter Poll Interval as the length of time in seconds that will
elapse prior to a staus request being sent to the DVR for
verification of communications and processing of error and/or
alarm messages since the last poll.
Poll Time
(seconds)
• Enter Timeout as a length of time to wait for a response after a
request prior to retrying (if no response has been returned).
• Enter Retry Interval as the length of time to wait between
retries.
• Enter Retry Count as the number of retries to attempt before
qualifying a communications failure.
Delete Record
File Menu Item
The Delete Record option deletes the current record from the database. BE CAREFUL when selecting
this option, as deleted records cannot be recovered! The Delete Record option is available only when a
form is open, contains records, and you have been given all permissions.
Some forms such as the Reader Form do not have a delete option.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual
134
Delete Template
File Menu
Select this option to delete the current Report template. This option is available only when a Report Form
is displaying with a loaded template.
<deleted> Displays After I Delete All the Records
To correct this, click Clear, and then click Add.
Department
Personnel Menu
The Department option opens the Department form that allows you to create departments that can then
be assigned to person records.
Department Tab
Department Form
Click Search to display or modify a list of existing departments. Click Add to create additional department
records of your own, based on your company.
DES/DES III Data Encryption Standards
Data Encryption is additional security assigned to protect the Host-to-micro exchange of information. The
data messages are encrypted.
Methods of Encryption
•
DES: This option uses a single pass of authentication and 16 unique hex characters are
required.
•
DES III: This method of encryption uses a three-pass authentication process. Starting at the
left, the first pass authenticates 16 hex characters. The second pass authenticates 16 hex
characters. The third pass authenticates all 48 hex characters.
Secure Perfect 6.1.1 User Manual
135
Design Tab
Badge Design Form
Use this tab to create a new badge design record. If you are editing an existing design, these options are
not available.
Select one of the following:
•
•
Select Default Layout: Select a badge default layout as Portrait or Landscape.
Select Import Layout: Select Import Layout to make available the option to Browse to the Secure
Perfect designs folder and import an existing design. If you have already chosen a default layout,
this option is unavailable.
•
Click Save to enable the Edit Badge Design button.
Edit Badge Design: Click to open the badge designer program that allows you to draw the graphics that
comprise the badge design. If you had a previous version of badge designer that created files with a
.gdrextension, you will be prompted to save the file as a .dgnwhen you edit a badge design for the
first time. Access the extensive Online Help system from the Badge Designer toolbar. Additionally, refer
provided on your documentation CD.
•
•
Each workstation where badge design or badge printing is to be performed must have its own
license. Refer to your Secure Perfect Installation Guide for additional details.
Device Configuration
Reports Menu
The Device Configuration option opens the Device Report Form that allows you to create a report on
devices such as micros, readers, alarms, alarm groups, digital outputs, digital output groups, digital
inputs, DVRs, cameras, and elevators.
Device Menu Selections
The following selections display in the Device drop-down menu:
Secure Perfect 6.1.1 User Manual
136
Diagnostic Setting
Administration Menu
The Diagnostic Setting option opens the Diagnostic Setting Form that allows you to select items for
which diagnostic information will be recorded in the diagnostics log, as created on the LogFile Form. This
is a good place to start troubleshooting.
Diagnostic Viewer
Administration Menu
The Diagnostic Viewer option opens the DiagView program. The items you selected on the Diagnostic
Setting Form determine the debug messages displayed by the DiagView program.
The DiagView program has its own Help system for additional details.
Diagnostic Viewer
When you select Diagnostic Viewer on the Administration menu, the DiagView program opens. The
activities of your selected component are displayed. (Those items with the COM # and Line # as part of
the component name have the highest effect on system performance and hard drive usage.)
The DiagView Help system provides additional details of the program.
Dial-Up/Hangup
If the dial-up micro is currently connected, this option will disconnect from the micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Secure Perfect 6.1.1 User Manual
137
Dial-Up Troubleshooting
Reference Topic:
Your DiagView program logfile will indicate modem status by displaying one of two possible messages:
Message 1: The following modem is not functioning properly: <modem name>.
Message 2: The following modem is functioning properly: <modem name>.
Where <modem name>is the name of the modem, such as Hayes Accura 33.6.
Message 1 will display on the logfile every 90 seconds following a period when the modem is NOT
operating, until the modem is available and operational again. Verify the following:
•
Selected modem on Parameters Form is identical to the modem you want to use. (If the
modem you want to use is not on the list of available modems, you may have to reinstall the
driver for the modem or select another modem.)
•
•
•
•
Modem is turned on.
Comm port connection is complete.
Connection is plugged in properly.
Modem settings are correct. (Maximum speed value of 9600 applies to MOST modems. If
you are having problems using this setting, refer to your modem manual for more
information.)
Message 2 will display ONE time only, and that is when your modem returns to operational after a period
when the modem was NOT operational.
The Micro Utility Form will indicate that the micro dedicated to a modem is in an error state.
Secure Perfect 6.1.1 User Manual
138
DI Board Records Creation
When you add a 20 DI board, twenty (20) digital input records are created.
Example: 0001-1-01 DI
This digital input is on micro 1, board 1, point 1. To change this description, enter text over the existing
text and save the record. It is recommended that you keep the mmmm-b-ppprefix in each digital input
displayed to aid in locating the alarm points on the physical hardware. This field accepts a maximum of
64 characters.
Micro/PX-2000 ONLY: When you create and save a Micro/PX-2000 record, Secure Perfect creates
To configure the 11th DI to function as a low-battery alarm:
1. Open the Digital Input form from the Devices menu and click Search to display a list of digital
inputs.
2. Select the DI labeled XXXX-X-11
where 11is the 11th DI point of the Micro/PX-2000 micro board.
3. Select Alarm, from the drop-down list of available DI types.
4. Click Save.
5. Open the Alarm Form from the Devices menu and click Search to display a list of alarms belonging
to the micros.
6. Select the DI labeled XXXX-X-11
where 11is the 11th DI point of the Micro/PX-2000 micro board.
7. Extend the Description entry by entering text indicating low battery.
The entry may look similar to 0002-2-11 Low Battery.
8. On the Alarm tab of the Alarm Form, select Monitor from the Settings options.
9. Click Save.
Digital Input
Device Menu
The Digital Input option opens the Digital Input form that allows you to modify the records that are
automatically generated when you define a micro. Example: Configure physical sensing devices such as
door sensors or motion sensors.
Digital Input Status
Operations Menu
The Digital Input Status option opens the Digital Input Status form that provides the status of the
selected digital input according to the information in the micro’s database.
Secure Perfect 6.1.1 User Manual
139
Digital Input Tab
Reference Topic:
Digital Input Form
Use this tab to configure the selected digital input.
Element
Micro
Description
Displays the micro description to which this digital input is associated. This is a read-
only field and unavailable for modification.
Board
Number
Type
Displays the micro board number where this digital input is located. This is a read-only
field and unavailable for modification.
Displays the number of the digital input. This is a read-only field and unavailable for
modification.
Select the type of DI that you are configuring. If you select another Type, click Search to
update the list box display of associated triggers.
•
•
•
•
Alarm means that this digital input is being used to trigger an alarm.
Elevator means this digital input is being used for elevator control.
Inactive means this digital input is not being used at this time.
Digital Output means this digital input is being used to trigger a digital output and no
alarm is generated.
•
•
Intrusion means this digital input will arm/disarm an intrusion zone.
Guard Tour means this digital input is a point along a pre-determined inspection
tour of your premises by a security officer.
Digital input Type of Intrusion can only be made if the previous type was Inactive,
meaning no other access control digital input was active. (For example, you cannot
assign Intrusion type to a DI that was previously set as an Alarm; the DI type must first
be Inactive.) Be aware that selection of this type overrides any access control. You
cannot assign any access control digital outputs, digital output groups, schedules, or
events for this record.
Active State
The active state of a selected digital input can be either Closed or Open.
A third option, Both, displays as grayed out and unavailable for selection unless the
DI Type is Guard Tour. During a Guard Tour, a single-state trigger (one-time "hit") will
trigger a DO in both states (Closed OR Open).
Enabled
If you selected Digital Output as the Type (defined above), enable this field to fire DOs.
For all other type Digital Inputs, this is a read-only field, enabled, and unavailable for
modification.
Sense time
Digital Output
Device Menu
The Digital Output option opens the Digital Output Form that allows you to modify the records that are
automatically generated when you define a micro. You can configure, schedule, and control the state and
times of digital outputs.
Secure Perfect 6.1.1 User Manual
140
Digital Output Assignment
This dialog box allows you to select and assign digital outputs you want associated with the selected
record. Only digital outputs in the operators’ facilities are available for assignment by this operator.
•
•
Select, and then click the right arrow to assign an available digital output.
Select, and then click the left arrow to unassign a digital output.
Click OK to display results in the Digital Outputs windowpane.
Digital Output Group
Device Menu
The Digital Output Group option opens the Digital Output Group Form that allows you to assign digital
outputs into groups or sets for scheduling purposes. Example: To apply a schedule to a series of digital
outputs, apply the schedule to a group that contains the specific digital outputs.
Digital Output Group Assignment
This dialog box displays when you click Assign DO Groups, allowing you to select and assign DO groups
you want associated with the selected record. Only DO groups in the operators’ facilities are available for
assignment by this operator.
Select, and then click the right arrow to assign an available DO group.
Select, and then click the left arrow to unassign a DO group.
Click OK to display results in the Outputs Groups windowpane.
Digital Output Groups Tab
Access Right Form
This tab allows you to assign groups of digital outputs to access rights.
Assigned digital output groups: This windowpane displays a list of assigned output groups for the
current access right.
selected access right. Only DO Groups that are related to the same micro as the readers selected in the
Access Right tab will be available for assignment. If no digital output groups display, verify that digital
Digital Output Status
Operations Menu
The Digital Output Status option opens the Digital Output Status Form that displays the current status,
as found in the micro, for each DO (output) in the system.
Secure Perfect 6.1.1 User Manual
141
Digital Output Tab
Digital Input Form
This tab is available only if you have selected Digital Output in the Type field on the Digital Input Tab. Use
this tab to link digital outputs to a digital input. When this digital input is activated, the digital output is also
triggered.
Output A (Primary/Local: A primary input assignment is not required. The default is None. Click the
drop-down list to select an available DO to assign as the primary. If you select an output, this output must
belong to the local micro. If the micro is offline or unable to communicate with the host at the time of an
alarm, only the Primary/Local DO is triggered.
If the ON time on the Digital Output Form is set to 00, this DO will remain active until the digital input is
reset.
Output B:
Click the drop-down list to select an available DO. The digital outputs in this list can be on a local micro or
other micros. Output B will be activated only if the host is online and able to communicate with other
micros.
Digital Output Tab
Digital Output Form
Use this tab to schedule when the digital outputs in the group are in the active state and for the specified
length of time.
Micro
This is a read-only field. Displays the description of the micro on which this digital output is located.
Board
This is a read-only field. When the records are created, the default value is in the format: mmmm-b Board
Typewhere mmmmrepresents the micro number to which this reader is associated, brepresents the
board number, and Board Typeis the type of reader board, such as 16DO.
Example: 0001-1 16DOwould be the digital output on micro one, 16DO board one.
Number
This is a read-only field. Displays the number of the digital output.
Active state
On/Off: Defines whether the digital output will be turned On or Off when the digital output is activated.
Contact your installer on how the digital output was wired. This determines the active state of the digital
output.
On time: Specifies the length of time the digital output will remain in the active state before going
inactive. This time may be overridden by the manual control buttons. If you enter 0 and this is:
•
•
Output A, then the digital output will reset when the alarm resets.
Output B, then the digital output will remain on until it is manually turned off or scheduled off.
When a micro is reset or the database is reloaded, all schedules from midnight to present time will run
EXCEPT for schedules that have a DO On time NOT equal to zero and were set to occur prior to the
current time. For example, you have created a schedule to occur at 8:00 am to turn a digital output into
the active state for 1 minute. At 10:00 am, the database for the micro is downloaded. During the
download process all schedules from Midnight to the current time (10:00 am) are re-run. Your schedule
for the DO will not run since it started and ended before the current time of 10:00 am.
Secure Perfect 6.1.1 User Manual
142
Digital Outputs Tab
Alarm Form
Use this tab to link digital outputs to an alarm. When this alarm is triggered, the linked digital output is
also triggered.
Output A (Primary/Local): A primary output assignment is not required. The default is None. Click the
drop-down list to select an available DO to assign as the primary. If you select an output, this output must
belong to the local micro. Because Output A is only on the local micro, it will communicate even when
offline. If the micro is offline or unable to communicate with the host at the time of an alarm, only the
Primary/Local DO is triggered.
If the ON time on the Digital Output Form is set to 00, this DO will remain active until the alarm is reset.
Example: A motion detector (digital input) senses movement in a restricted area and triggers a bell
(digital output). An alarm is generated.
Output B:
Click the drop-down list to select an available DO. The digital outputs in this list can be on a local micro or
other micros. Output B will be activated only if the host is online and able to communicate with other
micros. It will not communicate if offline.
Digital Video Recorder
Device Menu
The Digital Video Recorder option opens the Digital Video Recorder form that allows you to define,
configure, and request status of your DVR.
Digital Video Viewer
Operations Menu
The Digital Video Viewer menu item on the Operations menu opens a video command and control
application that allows you to monitor digital video multiplexers/recorders and their associated cameras,
control live video, as well as search and play back recorded video events.
The Digital Video Viewer application can also be accessed from the Secure Perfect toolbar by clicking
this icon:
Digital Video Viewer has its own Help system that details the features of the application.
DI History
Reports Menu
The DI History option opens the DI History Report Form that allows you to create a report based on the
history of digital input transactions in the system.
Disconnect Client
Select this icon to disconnect the selected client. This option also displays on the shortcut menu for this
form. The shortcut menu displays when you click the right mouse button.
Secure Perfect 6.1.1 User Manual
143
DO Board Records Creation
When you add a 16 DO board, sixteen (16) digital output records are created.
Example: 0001-1-01 DO
This digital output is on micro 1, board 1, point 1. To change this description, type over the existing text
and save the record. It is recommended that you keep the mmm-b-ppprefix in each digital output
description displayed to aid in locating the alarm points on the physical hardware. This field accepts a
maximum of 32 characters.
DO Groups Tab
Alarm Form
Use this tab to link digital output groups to an alarm. When this alarm is triggered, the linked digital output
groups are also triggered. The digital outputs will remain active until the alarm is reset, regardless of any
specified on-time setting for the DOs, unless it is the primary/local group.
•
•
•
If it is the primary/local group, the DOs will follow their specified ON-time setting.
If there is a reader in the primary/local group, the reader will follow the alarm state.
If the DOs in the primary/local group are set to 0for the ON time, that will force the DO to
follow the state of the alarm or input.
Be aware that Invalid Badge alarms and Lost Badge alarms do not reset. If you assign a DO Group to
either of these alarms, the alarm will go inactive or turn off when acknowledging or purging.
Output Groups: This windowpane displays assigned digital output groups. The digital output groups can
be on a local or other micro.
select and assign alarm DO groups that you want associated with this alarm record.
Primary/Local Output Group: The first local output group in the list of assigned output groups will
automatically display as the primary. You can select another output group as primary from the output
groups displayed in the windowpane. If the selection is not on a local micro, the assignment arrow button
is dimmed and unavailable for assignment as a primary output group. If the micro is offline or unable to
communicate with the host at the time of an alarm, only the Primary/Local DO group is triggered.
DO Groups Tab
Digital Input Form
Use this tab to link digital output groups to a Digital Input. When this Digital Input is triggered, the linked
digital output groups are also triggered. The digital outputs will remain active until the alarm is reset,
regardless of any specified on-time setting for the DOs, unless it is the primary/local group.
•
•
•
If it is the primary/local group, the DOs will follow their specified ON-time setting.
If there is a reader in the primary/local group, the reader will follow the Digital Input state.
If the DOs in the primary/local group are set to 0for the ON time, that will force the DO to
follow the state of the alarm or input.
Be aware that Invalid Badge alarms and Lost Badge alarms do not reset. If you assign a DO Group to
either of these alarms, the alarm will go inactive or turn off when acknowledging or purging.
Output Groups: This windowpane displays assigned digital output groups. The digital output groups can
be on a local or other micro.
select and assign alarm DO groups that you want associated with this DI record.
Primary/Local Output Group: The first local output group in the list of assigned output groups will
automatically display as the primary. You can select another output group as primary from the output
groups displayed in the windowpane. If the selection is not on a local micro, the assignment arrow button
is dimmed and unavailable for assignment as a primary output group. If the micro is offline or unable to
communicate with the host at the time of an alarm, only the Primary/Local DO group is triggered.
Secure Perfect 6.1.1 User Manual
144
Door Functions Tab
Reader Form
Use this tab to define the door settings associated with the selected reader.
Element
Description
Time
• Maximum unlock: The time interval in minutes and seconds that a door remains unlocked after
the reader reads a valid badge. This is the amount of time that a user has to open a door
based on a valid input.
1) Enter a number between 0 (minimum) and 60 (maximum) minutes.
2) Enter a number between 0 (minimum) and 59 (maximum) seconds.
Example: A facilities employee may be required to move equipment or furniture in and out of
rooms. The assignment requires a block of time beyond the normal unlock time as configured
and sufficient time to empty or fill rooms through which access is gained by a reader and valid
facility badge.
• Alarm sense: The time interval in minutes and seconds that a door can remain open (with a
valid badge read or an exit request). This time must always be greater than the maximum
unlock time.
1) Enter a number between 0 (minimum) and 62 minutes.
2) Enter a number between 0 (minimum) and 59 (maximum) seconds.
The Alarm sense time for the Reader and the DI Sense Time on the DI form are added
together to determine the total time that a door can remain open before the system triggers a
Door Held Open alarm.
• Extended unlock: The extended time interval in minutes and seconds that a door remains
unlocked after the reader reads a valid badge.
1) Enter a number between 0 (minimum) and 60 (maximum) minutes.
2) Enter a number between 0 (minimum) and 59 (maximum) seconds.
Example: If the door is used by handicapped persons or the reader is mounted at a distance
from the door, a longer unlock time may be required. If a 0 is entered in this field, the current
state of the reader is changed (or toggled) to its opposite state. The standard situation is the
first badge read causes the door to unlock and the next badge read toggles the door locked.
This time interval is also used if you selected Duration in the Lock On field below.
• Extended Alarm sense: This time interval is calcuated automatically and is a read-only entry.
The following illustrates time interval relationships:
The time intervals follow this formula:
extended alarm sense = alarm sense + extended unlock – maximum unlock
Door Lock
On
Once the door is unlocked, this field allows you to specify when the door should relock.
• Close: With this option, when the door is closed, the door lock will lock immediately regardless
of the Maximum Unlock Time (Maximum unlock field above) and the Alarm Sense Time
(Alarm sense field above) is reset to zero.
• Open: With this option, when the door is opened, the Maximum Unlock Time (Maximum
unlock field above) is set to zero and the door lock will lock. When the door is closed at any
time during this process, the Alarm Sense Time (Alarm sense field above) is reset to zero.
• Duration: With this option, after the Maximum Unlock Time (Maximum unlock field above)
expires, the door will lock when closed and the Alarm Sense Time is reset to zero. During the
Maximum Unlock Time, the state of the door does not affect the Maximum Unlock Time or the
Alarm Sense Time.
Secure Perfect 6.1.1 User Manual
145
• Open: Enable if the Exit Request button is wired as open for an exit request.
• Closed: Enable if the Exit Request button is wired as closed for an exit request.
• Unlocks door: Select this checkbox if you want the door to unlock when an exit request button
is pushed.
Request to
exit (REX)
• Follows extended unlock: Select this checkbox if you want this REX to follow the time limits as
configured for ‘Extended unlock.’
Extended
Auxilary
Digital
Select an output from the drop-down list of available Digital Output points. This output follows
the Extended unlock time configurations and must be on the same micro as this reader.
Output
Link to this
reader
Use this field to link this reader to another reader on the same micro. Select a reader from the
drop-down list.
Download Badges
Downloading includes the badge database records for that micro. This option forces a badge download
even if the micro is not configured for forced badge downloading. The badge download will not
automatically take place when the micro is placed online. You must initiate the download to send all
necessary badges to the selected micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Download Database
You may select more than one micro for a database download. All downloads happen simultaneously
without affecting the micro’s ability to process badge and alarm transactions.
Downloading a database does not download badges. If a new micro database is required, you must
click the Download Database icon as well as the Download Badges icon for this micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
DVR
Reference Topic:
Digital Video Recorder (DVR): A generic reference to CCTV equipment that can provide digital video
multiplexing and/or recording.
The Digital Video Viewer system program, accessible from the Operations menu, allows you to monitor
and control video for multiple DVRs and their associated cameras. Digital Video Viewer can also be
accessed on the Secure Perfect toolbar by clicking this icon from the toolbar:
On the Digital Video Viewer window, click Help for additional information about the program.
Refer to the User Manual of your DVR for specific installation, configuration, and operation instructions.
DVR Disk is Full
This warning notification may display when the DVR internal disk for storing video is reaching its full
capacity. Refer to the DVR User Manual for specific information on configuring disk management options.
Secure Perfect 6.1.1 User Manual
146
DVR Help
Welcome to Digital Video Viewer Help!
The Digital Video Viewer program allows you to monitor digital video multiplexers/recorders and their
associated cameras; control live video; and search and playback recorded video events. Operators must
Related Topics:
DVR Help - Boxes and Properties
60D File Extension
This is a Kalatel-specific file extension and is the default format.
Advantages:
1.
2.
The camera number and time labels are included with the images.
A 60D file is unalterable video and can be used for police work. If the file was recorded while
playing recorded video, chain of custody is preserved. Chain of custody is the process of tracking
and validating a video back to its source.
Admissible chain of custody files MUST be recorded by a Kalatel DVR, THEN saved as a
.60D file.
3.
You can play back 60D video in Secure Perfect and Wavereader.
AVI File Extension
AVI (Audio Video Interleave) is the most common compression technique used to encode audiovisual
information for personal computers.
1.
2.
Video recorded in AVI format does not have a date and time label.
You cannot play back an AVI file through the Secure Perfect application. You must use an
external application such as Windows Media Player.
3.
AVI files are not acceptable in a court of law.
Microsoft developed the AVI format. It is a common format on computers, and comes with the Windows
operating system as part of the "Video for Windows (VfW)" distribution. The format is interleaved such
that video and audio data are stored consecutively in an AVI file (that is, a segment of video data is
immediately followed by a segment of audio data). AVI is highly dependent on the type of hardware used
in the playback of images.
•
•
A 386-based machine can only play back small, 160 by 120 pixel, 256 color images.
A 486 machine can handle images up to 320 by 240 pixel (a quarter of a low-resolution
screen).
•
Using a Pentium chip with an accelerator graphics cards it is now possible to provide full
screen (640 by 480 pixel) low resolution moving images.
DVR Help - Call Preset Button
Right-click a preset icon to display the Call Preset shortcut. Select Call Preset to call the camera to the
preset position and automatically open a live video window of the camera, if not already opened.
Secure Perfect 6.1.1 User Manual
147
DVR Help - Camera Shortcut Menu
Right-click on a selected camera icon to display the camera shortcut button.
•
•
Select View Live to call up a live video window for that camera.
Select Edit to display the Camera Form, and depending on your permissions, view or edit the
camera configuration.
DVR Help - Digital Video Search Icon
Digital Video Viewer Window
Click to launch the Digital Video Search window. Digital Video Search is used to search for recorded
video events triggered by reader and/or alarm transactions. Click this icon to close the Digital Video
Search window.
Digital Video Search has a separate Help system. Refer to Digital Video Search Help for specific details
on how to search for recorded video events. Activate the Help system by clicking Help on the Digital
Video Search window.
DVR Help - Digital Video Viewer Window
The main Digital Video Viewer program window consists of the following:
Digital Video Network List
The Digital Video Network List is an expanding hierarchical display of your digital video network devices
as defined in the system database. These devices include host computers, DVRs, cameras, and presets.
The Digital Video Network List also acts as a system monitor for its devices, providing graphical display
of device conditions and status changes.
Click the Show me icon to view a step-by-step animated demo.
Failed Host Computer
In case of a system failure on a client computer licensed for Client Redundancy, a backup client takes
over the functionality of DVRs and cameras. This scenario will be indicated by the backup computer
name in parentheses following the failed Hostname, such as: BCTBOCA <BCTROME>
where
• BCTBOCAis the failed host computer.
• <BCTROME>is the backup client. DVRs previously associated and displayed under BCTBOCAwill
display under (BCTROME). No DVRs will display under the failed client.
Following recovery, devices again display under the default hostname. The backup client name may
display in the list with no device association.
Play Controls
Shortcut menus for operations of DVR and cameras can be accessed quickly using right-click mouse
button navigation.
Secure Perfect 6.1.1 User Manual
148
Setup Record Video
The selections in this grouping are available only when a video window is open and a video is not
currently recording.
The setup allows you to save a permanent recording of a video segment from live or prerecorded
video, as displayed in the video window. You cannot assign a second setup until the current recording
is finished and a file name is assigned. However, you can open a second video window, configure
setup parameters, and begin recording on the new video window. When you close a video window,
the Setup Record Video options become unavailable and the recording stops.
File Format: Select the format you will use to save this video recording, from the drop-down list. You
will record.
Start Recording: This button becomes available when a video window is opened. Click
to begin
recording. While the recording is in progress, this button label changes to Stop Recording.
Play Recorded: This option is available for 60d files only. When you click
to play previously
recorded video, a window displays, allowing you to navigate to a video file and begin playing the selected
video. While a recording is playing, you can select and play additional recordings.
Create SP AutoPlay CD: This option is available for 60d files only. Click
Digital Video Search Icon
Search Help system for details and options of the Search Window.
Help: Click
to activate the DVR Help system that provides details and options of fields and buttons
on the Digital Video Viewer window.
Status
The text dialog at the bottom of this Digital Video Viewer window displays the current status of the
currently selected device.
Secure Perfect 6.1.1 User Manual
149
DVR Help - DVR Shortcut Menu
Right-click on a selected DVR icon to display the shortcut menu options:
•
Select Online to initiate a connection between the host computer and the DVR. The DVR will be
monitored; event triggers will be processed; and video can be accessed.
Click the Show me icon to view a step-by-step animated demo.
•
Select Offline to disconnect the host computer from the DVR. The DVR will not be monitored;
event triggers will not be processed; and video cannot be accessed.
•
•
Start Recording forces a DVR into record mode if it is presently out of record mode.
Stop Recording forces the DVR out of record mode. Live video cannot be accessed and event
triggers cannot be processed if the DVR is not in record mode.
•
Select Edit to display the Digital Video Recorder Form, and depending on your permissions,
view or edit the DVR configuration.
DVR Help - Moving the Window
Related Topic:
The Digital Video Viewer program window can be independently moved anywhere on the desktop and
the position saved.
•
Move a Window
Left-click the title bar of any window and drag to desired position of your desktop.
Save Position
•
Point and right-click in data box or button panel background to display and select Save Position
shortcut.
When you exit and re-launch the Digital Video Viewer program, the window will display at the saved
position.
Secure Perfect 6.1.1 User Manual
150
DVR Help - Play Controls - Digital Video Viewer
The play controls allow you to control and adjust live video and playback of recorded video. The controls
affect all active video windows on the same DVR. The functions of the buttons are as follows:
Play Forward
Play Reverse
Fast Forward
Fast Rewind
Single Frame Advance
Single Frame Reverse
Stop
Pause
Play Speed adjusts the playback speed of recorded video. The DVR playback speed
can be adjusted by this slide option from minimum to maximum speed. This option is available only when
a search option is selected or playback of recorded video is activated.
Adjust playback of live video from a PTZ camera with the following controls:
Focus: Click to increase the sharpness of the image from the live camera display.
Focus: Click to decrease the sharpness of the image from the live camera display.
Iris: Click to allow more light to fall on the image-sensing device, appearing to increase the light of
the live camera display.
Iris: Click to close down or decrease the light falling on the image-sensing device. Sufficient light is
maintained and controlled for the live camera display.
Secure Perfect 6.1.1 User Manual
151
DVR Help - Recorded File Name
A 60D file name may display similar to the following:
c:\Program Files\GE Interlogix\Secure Perfect\Video\170-01 Camera
12_5_2003_4_04_30.60D
(If this is a custom installation and the file shares were separated from the Secure Perfect Application, the
default video folder resides on the File Server.) If you choose to store the video in another location, click
to browse and navigate to another location. You can assign additional alphanumeric characters to
the video file name to assist in identification. If the Location dialog box has a file name from a previous
recording, you will need to change this file name to avoid overwriting a previous recording. The following
characters are NOT permissible as part of a file name:
/ \ ? * < > | "
DVR Help - SP AutoPlay CD Creator
This window displays a list of previously recorded 60d files, recorded from a DVR. By default, the Video
folder of your Secure Perfect application displays. If video clips are stored in another folder, navigate to
that folder to display the video file names.
If you choose to record a video clip, performance will be compromised. If you have other surveillance
windows open, close them. You may want to continue surveillance at another computer while the video is
recording to CD.
If you have a recordable drive and Roxio Direct CD software:
1. Double-click the file name of the video you are going to record.
2. Verify the path.
3. Verify the naming convention of the video.
4. Verify the recording drive and device.
5. Click
to begin recording. The button displays red while recording. If you want to stop the
recording in progress, click the red button.
6. Follow the directions and prompts as they display in the popup windows.
GE Security uses only Roxio Direct CD software. If you purchased your system from GE Security,
Roxio software was provided for you.
DVR Help - Video Window On-Screen PTZ Control
Camera(s) with pan, tilt, and zoom capability can be manually controlled on screen from within a live
video window by use of the mouse. When placing your mouse pointer within a live video window of a PTZ
camera, the mouse pointer changes to a four-point star.
•
Center the mouse pointer, left-click, and hold for pan and tilt function (the pointer changes to
P/T).
•
•
•
•
•
•
Drag left or right to pan; release the left mouse button to stop.
Drag up or down to tilt; release the left mouse button to stop.
Center the mouse pointer, right-click, and hold for zoom function (the pointer changes to Z).
Drag up or down to zoom; release the right mouse button to stop.
Left-click (the pointer changes to P/T) and drag to the right to pan right.
When using on-screen PTZ control, it is helpful to start from the center position of the live video
window and initiate mouse control commands in short, smooth movements.
Secure Perfect 6.1.1 User Manual
152
DVR Search
Related Topics:
Welcome to DVR Search!
The DVR Search window opens with the SP Events Tab displayed and can be independently moved
anywhere on the desktop. The window can be closed and reopened by clicking the Search icon on the
Digital Video Viewer window.
Move a Window
Left-click the title bar of any window and drag to desired position of your desktop.
Save Position
Point and right-click anywhere on the window and select Save Position shortcut. When you exit and
re-launch the DVR Search program, the window will display at the saved position. Each tab of this
form offers a unique type of search.
DVR Search - Alarms Button
Click Alarms to display an Edit Alarms List form. This form displays a list of available alarms that can be
selected and assigned as search criteria for recorded video event tags.
Select and then close the Edit Alarms List form. The assigned alarms will display in the Event Sources,
Alarm list window.
DVR Search - Cameras Button
Click Cameras to display an Edit Camera List assignment form. Only cameras belonging to DVMRs
associated with facilities available for assignment by this operator, will display. Select those cameras you
want to display in the camera list box.
DVR Search - Clear Button
Click Clear to clear the search criteria and results displayed. The window clears and the form returns to
default state.
While a search is in progress, this button label changes to Stop Search. The search can be terminated by
clicking Stop Search. When the search terminates, the button label again reads Clear.
Secure Perfect 6.1.1 User Manual
153
DVR Search - Event Tag
This dialog box allows you to enter Event Tag text, to contribute to the search of video in the Secure
Perfect database. This dialog box accepts up to 50 alphanumeric characters. A search by Event Tag
does not require a selection of Readers or Alarms.
DVR Search - General DVMR Events
Related Topic:
General Events Tab
Click the Show me icon to view a step-by-step animated demo.
A General Events search allows you to search alarms and events on the hard drive of the DVR.
A database search of General Events is not available without entering a DVR Source.
DVR Source
Select a DVR from the drop-down list. Only DVRs associated with facilities available for assignment by
this operator will display.
Search Range Calendar Entries
Select the check box on the left to make available the calendar entries. The calendar displays with the
current date and time as defaults. Establish the parameters of a video search:
•
•
Click a calendar day to start the search and a day to end the search.
Enter a start time and end time in the list boxes or accept the defaults.
This instruction begins the recall of video recording from the closest point to the time and date selected.
Click Search to display the results of parameters in the search results windowpane or continue to set
additional parameters.
Search Criteria
Cameras: Select the checkbox to enable/disable search criteria by camera. Click Cameras to display an
Edit Camera List assignment form. Select those cameras available for assignment by this operator that
you want to display in the camera windowpane. When the camera assignment form closes, the selected
cameras display in the camera windowpane.
Text: This is the default search criteria type. When Text is selected, the text content box becomes
available and accommodates the entry of a maximum of 50 alphanumeric characters. The asterisk (*) can
be used as a wildcard entry.
Alarm or Event: Change the type to camera Alarm or Event to search for alarms or events.
Search: Click Search to begin the recall of video based on the date/time and/or search criteria.
A search cannot be performed if recorded video is currently playing on the selected DVR.
While the search is in progress:
•
•
Click Stop Search to discontinue the search in progress. If you do not discontinue, the search
will progress until all records matching the search criteria have been found. When a search is
•
A statement displays indicating the number of records found. A flashlight icon indicates a
search is in progress.
•
•
•
Results are displayed in the Search Results windowpane.
Live video will play during a search.
Recorded video on the same DVR cannot play during a search
Secure Perfect 6.1.1 User Manual
154
•
•
A search will terminate if the DVR goes into error.
If the search generates no records, a No Video Found dialog box will display.
Search results can be sorted by clicking the column header in the Search Results windowpane; however,
recorded video cannot be initiated during a sort. Select an entry, right-click, and select Play to begin the
playback of the associated recorded video. Playback of individual recorded video is limited to a single
recall instance per DVR. If you are unable to access a recorded video, a cautionary message will display.
It may be that the recorded video on the same DVR is presently being accessed or the recorded video
event has been overwritten and is no longer present in the DVR.
Click Clear to clear the search results displayed and return the form to default state. The search results
window clears.
DVR Search - General Playback
General Playback Tab
Related Topic:
Parameters set on this form search and retrieve video from the hard drive of the DVR. Playback
parameters selected here continue indefinitely until you choose to discontinue the playback.
Click the Show me icon to view a step-by-step animated demo.
Search on Date and Time
The calendar displays with the current date, and the current time displays in the time list box. Establish
the beginning parameter of a search by date and time. This instruction begins the recall of video
recording from the closest point to the time and date selected.
Search Source
Select a DVMR from the drop-down list. Only DVMRs associated with facilities available for assignment
by this operator will display.
display in the camera windowpane. When the camera assignment form closes, the selected cameras
display in the camera windowpane.
Click Play to begin playing the associated recorded video. Playback of individual recorded video is limited
to a single recall instance per DVR. If you are unable to access a recorded video, a cautionary message
will display. It may be that the recorded video on the same DVR is presently being accessed, or the
recorded video event has been overwritten and is no longer present in the DVR.
Secure Perfect 6.1.1 User Manual
155
DVR Search - Grabbing Motion Video Clips
When grabbing a video image from a selected camera, keep in the mind the following:
1. If a camera is currently recording live video, the motion grid grabs a still image of what is
currently playing on that camera.
2. If a video window is displaying previously recorded video, the motion grid will be populated with
a clip from the recorded video that is presently displaying in the window.
3. If two video windows are in progress from the same camera, one is live video, and the other is
previously recorded video, the grid grabs a still image from the live video.
4. If no video window is currently open, the system starts the selected camera if it is online, opens
a live video window, grabs an image, and displays a frozen image in the grid.
5. If the camera is a PTZ type, the video window opens and the system grabs a still image of
whatever is in focus at that moment.
6. If you want to display video for a specific preset area of a PTZ type camera, it is recommended
that you conduct a preliminary search on the SP Events tab or General Events tab before setting
your parameters on the Motion tab.
DVR Search - Help Button
Click Help to open the Digital Video Search Help system.
DVR Search - Motion
Motion Tab
Reference Topic:
Parameters set on this tab allow you to select a specific area of the image displayed on the grid. The
image was grabbed from live or previously recorded video. A search of the DVR hard drive is generated
based on the selected criteria.
Click the Show me icon to view a step-by-step animated video.
DVR and Camera Source
You must select a DVR and a camera in order for the Search feature to become available.
•
DVR: Select a DVR from the drop-down list of online DVRs. Only online triplex DVRs
associated with facilities available for assignment by this operator will display.
Camera: Select an online camera from the drop-down list of cameras belonging to the
selected DVR. The grid immediately fills with an image grabbed from that camera. The image
may take a moment to freeze. If the camera is not online, the grid remains blank and no
image displays.
•
OPTIONAL: Search Range Calendar Entries
The calendar displays with the current date and time as defaults. The calendar is a way to establish the
parameters of a video search:
•
•
Click a calendar day to start the search and a day to end the search.
Enter a time in the start time and end time list box or accept the defaults.
This instruction begins the recall of video recording from the closest point to the date and time selected.
Secure Perfect 6.1.1 User Manual
156
Grid: When a camera is selected, a snapshot image is grabbed from the live video that is the focus of the
camera or from previously recorded video of that camera. The snapshot image is displayed in the grid.
Verify that the date/time caption at the top of the grid matches your request. By default, the grid displays
with rows of red cells. A portion of the image that is displayed in the grid window can be selected as a
way of narrowing the focus of the search.
Brush Size
The options below define a method of selecting a portion of the grid that will be the focus of the search
criteria. Left-click your mouse pointer within a cell; do not click between cells to select. The grid consists
of red cells that turn green when selected, or toggle from green to red, switching a mode on or off:
•
•
•
•
Single Cell: Select Single Cell, then move your mouse pointer over the grid and left-click a
cell. The single cell turns from red to green and the area within the selected cell is the focus of
the search criteria.
Row: Select Row, then move your mouse over the grid and left-click a cell. The entire row of
cells turns from red to green and the area within the selected cells is the focus of the search
criteria.
Column: Select Column, then move your mouse pointer over the grid and left-click a cell. The
column of cells turns from red to green and the area within the selected cells is the focus of
the search criteria.
3 x 3: Select 3 x 3, then move your mouse pointer over the grid and left-click a cell. The cell,
as well as all cells surrounding the cell, turns from red to green. The selected area is a total of
nine cells that turn from red to green and the area within the selected cells is the focus of the
search criteria.
The selections are toggle selections. That is, one click selects and the second click clears the
selection. If a row of cells is selected followed by a column selection on the same window that
intersects the selected row, the cell at the point of intersection will clear.
: Click to select all cells in the grid. All selected cells display in green.
: Click to clear all selected cells in the grid. All cleared cells display in red.
•
The Search Results windowpane returns a list of recorded video based on the parameters
and criteria specified. The Search Results windowpane is divided into columns labeled :
Sequence, Start Date/Time, End Date/Time, Camera, Type, and Text. Select the desired
Sequence and right-click to play the recorded video event. Playback of individual recorded
video is limited to one recall instance per DVR. If you are unable to access a recorded video
event, a cautionary message will display. It may be that the recorded video on the same DVR
is presently being accessed or the recorded video event has been overwritten and is no
longer present in the DVR.
•
•
DVR Search - Play Button
Click Play Event to begin playing the associated recorded video for a selected entry on the search
results windowpane.
DVR Search - Readers Button
Click Readers to display an Edit Readers List form. This form displays a list of available readers that can
be selected and assigned as search criteria for recorded video event tags.
Select and then close the Edit Readers List form. The assigned readers will display in the Event Sources,
Secure Perfect 6.1.1 User Manual
157
Readers list window.
DVR Search - Search Button
Click Search to begin the search and recall of video on the DVR hard drive for the recorded video tags
that meet the selected and assigned search criteria. The results are displayed in the search results
window.
DVR Search - SP Events
Related Topic:
SP Events Tab
DVR Search opens with the SP Events tab displayed.
Select the check box on the left to make available the Search button. In order to search the database
for existing records, enter an applicable date/time range and/or event source parameters.
Search Range Calendar Entries
The calendar displays with the current date and time as defaults. Establish the parameters of a video
search:
•
•
Click a calendar day to start the search and a day to end the search.
Enter a time in the start time and end time list box or accept the defaults.
This instruction begins the recall of video recording from the closest point to the time and date selected.
Click Search to display the results of parameters in the search results windowpane or continue to set
additional parameters.
Event Sources and Search Results
Narrow your search further by assigning additional parameters. This window displays options to search
for a recorded video sequence OR tagged event.
•
digital inputs from which to search and display recorded data. If the reader or alarm
description has changed, request a search based on the old description.
•
search by Event Tag does not require a selection of Readers or Alarms.
Click Search. Only readers and alarms associated with facilities available for assignment by this operator,
and assigned to event triggers using the Event Trigger Form, will be displayed.
Secure Perfect 6.1.1 User Manual
158
`
The Search Results windowpane returns a list of recorded video event tags based on the parameter
criteria specified. The Search Results windowpane is divided into columns labeled : Sequence, Event
Tag, Camera Number, DVR, Date/Time, and Event Tag. Select the desired event tag and right-click to
display a shortcut menu.
•
•
Select Play Event for playback of individual recorded video events, limited to one recall
instance per DVR.
Select Play Single Recorded Frame to display the first frame of the event recording as a still
photo.
If you are unable to access a recorded video event, a cautionary message will display. It may be
that the recorded video on the same DVR is presently being accessed or the recorded video event
has been overwritten and is no longer present in the DVR.
DVR Search - Stop Search
Click Stop Search to discontinue the search in progress. If you do not discontinue, the search will
progress until all records matching the search criteria have been found.
Secure Perfect 6.1.1 User Manual
159
E
Edit Alarm Group
This dialog box allows you to add or edit the link between an event and an alarm group. The event
determines when the alarm changes to the selected alarm group.
Event: Click the drop-down list to display available events from which to select.
New Group: Click the drop-down list to display available alarm groups from which to select.
Edit Icon
Edit Sense Time
Event: Select an event from the drop-down list. If there are no events listed, you will need to configure
New time: Select or enter a sense time. The value is in seconds and indicates the delay before triggering
an associated digital output or sending in a Secure Perfect alarm if the DI type is Alarm. This number tells
the system how many seconds to wait after sensing the input has changed to Active State. Enter 00to
immediately send the transaction to the host, notifying the host of a state change. Increase the Sense
Time entry if using noisy or chattering contacts.
Example: This value could indicate the delay time, in seconds, that elapses between the time a door
contact is broken and the time the output and alarm are triggered. If door contact is closed before the
sense time elapses, the alarm would not come in to Secure Perfect and the output would not activate.
Elevator
Device Menu
The Elevator option opens the Elevator Form that allows you to configure elevator control records.
Elevator Assignment
This window displays when you click Assign Elevators, enabling you to select and assign an elevator
association for this form. Only elevators in the operators’ facilities are available for assignment by this
operator.
•
•
Select, and then click the right arrow to assign an available elevator.
Select, and then click the left arrow to unassign an elevator.
The elevators that display in this list are those that are configured on the Elevator Form.
Secure Perfect 6.1.1 User Manual
160
Elevator Tab
Elevator Form
Select this tab to create or edit elevator information.
Reader
To tag a reader as an elevator reader, select a reader from the drop-down list of available readers. If no
readers are listed, check that the readers have been marked active on the Reader tab of the Reader
Form.
Floor Tracking
Select one of three options:
•
•
•
No Floor Tracking: Floor(s) selected are not sent to Badge History (not tracked).
Floor Tracking by Input: The floor(s) selected are sent to Badge History.
Floor Tracking by Keypad: Floor selection is made by using the keypad of the reader and
the floor(s) selected are sent to Badge History.
Do not switch between floor tracking and no floor tracking in the same elevator record. If you want to
change an existing record, delete that record and create a new one with the desired floor tracking
method.
Interface
Select one of two options:
•
Trigger All DOs prior to floor selection: All the appropriate floor selection buttons activate.
The user can select one or more floors.
•
Trigger One DO upon floor selection: All the appropriate floor selection buttons activate.
The user can select only one floor.
Event Schedule
Administration Menu
The Event Schedule option opens the Event Schedule Form that allows you to define the time and day
of the week on which a device state will change, such as resetting an anti-passback status for entering
and leaving a building.
Secure Perfect 6.1.1 User Manual
161
Event Schedules Tab
Reference Topics:
Event Schedule Form
Use this tab to create an event. Events are not partitioned by facilities. If you need to use facilities in your
system, create an event for each facility. Use the facility description as a prefix on the Event Schedule
Form, Description to indicate to which facility this event will apply.
Example: BocaHQ Weekend Beginswould indicate a facility-specific event schedule, where BocaHQ
refers to a geographic location. For example, you could create an event beginning each Friday at 6:00
P.M. that resets the APB status and the T&A status, and sets a reader to Badge and Keypad. Employees
coming into the building after 6 P.M. on Friday will be required to present their badge and then key in a
PIN number to enter the building. Remember that an event will stay in effect until another event occurs to
change it. Therefore, in our example, a second event will need to be scheduled to change that reader
back to Normal on Monday morning.
The time 24:00 is the same as 00:00 of the next day. For example, Friday at 24:00 is the same as
Saturday at 00:00.
•
Time chart: Click your mouse pointer on the time and day of the week/mode. This creates a
diamond that indicates that the event will occur at that time and that day of the week/mode.
Note that the current event’s diamond is selected. Time is displayed in half-hour increments
by default. To change the display increment, click and hold the left mouse button on the right
end of the bottom time bar then move the cursor to the left until you are at the desired time
increment. Then, click the desired time. If the point is incorrectly located, you can drag and
drop the point to the exact location you want.
•
•
•
Event: Displays the number of the event. The numbers start with one for the first event and
increment consecutively for each event thereafter.
New: Click to create a new event. The Secure Perfect application does not use these
additional points at this time.
Delete: Click to delete an event. You can delete a schedule that is currently in effect. The
Delete button will remove the most recent point you have created. If you continue to click
Delete, additional calendar points will disappear in the order they were created. Deleting a
schedule does not affect the current state of any devices to which this schedule is
associated. Any devices currently under the effect of the deleted schedule will remain in that
state until changed manually or by another event schedule.
Event details
The controls in this section are not needed in most circumstances. Use details to verify that your
selections match the calendar display.
•
•
Event time: Displays the time at which the event will occur.
Mode/day: Displays the mode or day on which the event will occur.
You will need to assign this event schedule to a device such as a micro (see Micro Form, Events tab)
or a reader (see the Reader Form, Reader Type Events tab).
Event Trigger
Administration Menu
Select Event Trigger to open the Event Trigger Form that allows you to associate cameras, presets,
reader transactions, and alarm transactions for creating event-driven video response. An event consists
of a camera and either readers or alarms.
Secure Perfect 6.1.1 User Manual
162
Events Tab
Alarm Form
Use this tab to assign events for alarm groups and alarm sense times. Events define start time(s) and
day(s) only. There is no end associated with an event. Therefore, that event will stay in effect until
another event changes it or you change it manually.
•
•
Alarm group: This windowpane displays assigned events and their associated alarm groups.
Edit: This button will be available only if you currently have a list of assigned events and
selection of events and associated alarm groups.
•
•
Add: Click ADD to assign events to the specified alarm group. An Edit Alarm Group dialog
box displays enabling you to build a list of events and associated alarm groups.
Remove: Select an entry in the list of displayed events, then click Remove to remove from
the list.
Events Tab
Alarm Group Form
Use this tab to schedule changes to the sense time on all alarms in the group by assigning previously
defined events to alarm groups.
Alarm sense time events
This windowpane displays the currently assigned events and their associated sense time.
•
Edit: Will be available only if there are currently assigned alarm sense time events. This
displays.
•
•
displays.
Remove: Select an alarm sense time event to remove and click.
Events Tab
Digital Input Form
This tab is unavailable for input if the Type of Digital Input is Intrusion.
Use this tab to assign events and an associated sense time to this digital input. Events define start
time(s) and day(s) only. There is no end associated with an event. Therefore, that event will stay in effect
until another event changes it or you change it manually. Click Search to display a list of existing event
records associated with this digital input.
Sense Time
This windowpane displays which events change the sense time. You can also assign events and sense
times to this digital input.
•
Edit: This button will be available only if there are currently assigned sense time events.
Click this button to display the Edit Sense Time dialog box. From here, you can assign an
event and sense time or modify the existing sense time assignment.
Add: To add events to the list, select an event and click. The Edit Sense Time dialog box
displays. Assign an event and sense time.
•
•
Remove: To remove events from the list, select an event and click.
Secure Perfect 6.1.1 User Manual
163
Events Tab - Micro Form
Micro Form
Use this tab to assign events to this micro.
Reset APB Event
Select an event from the drop-down list of available event records that will reset the anti-passback status
for all badges in the micro.
Reset T & A Event
Select an event from the drop-down list of available event records that will reset the T&A status for all
badges in the micro.
Exchange Key Encryption
Exchange encryption protects the Host-to-micro exchange of information. Assigning an exchange key
grants you a privilege of accessing the next level of encryption, the Data Encryption. You have two
options:
•
System: This method of encryption is more convenient but more vulnerable. The key is set at
the factory, system-generated, and exists in the Host software.
•
Custom: Setting up a Custom exchange key is the most secure method of encryption. The
Custom key is user-supplied. The installer can go to each micro and assign the exchange
key. When assigning a Custom exchange key, you must assign a total of 48 unique hex
characters, in three 16-character strings. Do not repeat any characters. This method of
encryption uses a three-pass authentication process. Starting at the left, the first pass
Exit
Expiration Date Filter Tab
Badge Report
Use this tab to generate a report based on the expiration date of the badges.
•
Do not filter badges by expiration date: Select this field if you do not want to use the
expiration date as a method of filtering the report information. This is equivalent to running a
report on badges for all expiration dates.
•
Filter badges using this expiration date range: Select this field if you do want to use the
expiration date as a method of filtering the report information. If this is selected, you must
select a starting and ending date.
•
•
Starting date: Click the start date you want for the starting range of expiration dates.
Ending date: Click the ending date you want for the ending range of expiration dates.
Secure Perfect 6.1.1 User Manual
164
Export
File Menu
This option is available only when a Report Form is displaying. The Export option allows you to select an
export format for your report. There are a variety of formats available including text, Word for Windows,
Lotus, HTML, and Excel. Select an export destination for the report to a disk file, exchange folder, Lotus
Domino, Lotus Domino Mail, or Microsoft Mail (MAPI).
Click the Show me icon to view a step-by-step animated demo.
External Reports
Reports Menu
The External Reports option opens a Launch External Reports dialog that allows you to select an
executable program or report that was not created within SP. For example, you can access reports you
created using a third party report generator such as Crystal Reports or Microsoft Access 2002.
Secure Perfect 6.1.1 User Manual
165
F
Facilities Tab
Operator Form
Use this tab to assign facilities to an operator.
•
•
facilities to this operator.
Facility
Administration Menu
The Facility option opens the Facility Form that allows you to label your facilities, related records, or
groupings of records. If Facilities are going to be used, the Facilities must first be defined in SP, on the
Facility Form.
Secure Perfect 6.1.1 User Manual
166
Facility
Reference Topics:
Definition
The Secure Perfect database can be partitioned and grouped. These groupings are identified as
Facilities. If Facilities are not defined, all operators will be able to access all the Secure Perfect records,
based on the permissions associated with the form.
Reminders:
•
•
Facility partitioning does not involve access rights or who goes where.
The same facility is assigned for all devices associated with the micro when a micro is
created.
•
•
Reports can be generated based on the currently active facility or all facilities assigned to the
current operator.
GLOBAL EDITION SYSTEMS: To view transactions outside of your region, you must have in
your active facility, the client’s facility where the transactions are occurring.
Sequence Guide:
1. If Facilities are going to be used, the Facilities must first be defined in SP, on the Facility Form.
When creating a Facility record, enter a description that uniquely identifies the location or function
of the facility.
2. Permissions are created and defined to determine what form and what fields will be available within
Secure Perfect.
The forms in Secure Perfect will display an icon in the left corner indicating the permissions
assigned to the current operator. The form icons correspond to the icons and permissions assigned
on the Permission Form.
3. Once defined, facilities and permissions are available for assignment to an operator on the
Operator Form.
a) At any given time, the current operator has the ability to select the active facility for that session,
from the list of all facilities that the current operator is allowed to see.
b) When a facility is assigned to an operator, it will display in the Facility drop-down list of Secure
Perfect forms after a successful login by that operator. Depending on assigned permissions, that
operator can now create records and assign facilities from the list that displays in the Facility drop-
down list.
Facility Assignment Dialog Box
•
•
Facilities can be moved to the Assigned list by selecting and clicking the appropriate arrow.
Facilities can be removed from the Assigned list by selecting and clicking the appropriate
arrow.
Facility Tab
Facility Form
Description
Enter a description that uniquely identifies location or function of the facility. Click Save, and then click
Add Record to create additional facility records.
Secure Perfect 6.1.1 User Manual
167
File Menu Selections
The following selections display in the File drop-down menu:
Filters Tab - Alarm History Report Form
Use this tab to select the criteria by which this report will be generated.
•
•
•
Micro: Select the micro you want to use to generate report information. If you want to use all
micros, select <ALL>.
Alarm: Select the alarm you want to use to generate report information. If you want to use all
alarms, select <ALL>.
Priority: Select the alarm priority you want to use to generate report information. If you want
to use all alarm priorities, select <ALL>.
Filters Tab - Badge History Report Form
Use this tab to select the criteria by which this report will be generated.
•
•
•
Badge Number: Select the range of badge numbers you want to display on the report. If you
want to list all badges, leave these fields blank.
Employee Name: Select the range of person last names you want to display on the report. If
you want to list all persons, leave these fields blank.
Employee Number: Select the range of employee numbers you want to display on the report.
If you want to list all numbers, leave these fields blank.
Secure Perfect 6.1.1 User Manual
168
Filters Tab - Badge Report Form
This tab is used only when generating a Badge Report. Use this tab to select the criteria by which this
report will be generated.
•
Badge Number: Select the range of badge numbers you want to display on the report. If you
want to list all badges, leave these fields blank.
•
Badge status: To provide additional filtering, you can also select to list only those badges
assigned a selected status.
Filters Tab - Device Report Form
This tab is used only when generating a Device Report. Filter or select specific information you want to
display on the report.
Device: From the drop-down list, select a device that you want to use to generate report information. If
you want to use all, select <ALL>.
The following exceptions apply:
•
If a Camera or Digital Video Recorder was selected as Report Type on the General tab, the
Device drop-down list fills with DVRs only.
•
If Alarm – API Connections is selected as Report Type on the General tab, the drop-down list
contains only <ALL>.
For all other Report Types, the list fills with micros.
Filters Tab - DI History Report Form
Use this tab to select or limit the criteria by which this report will be generated.
•
•
•
•
•
DI State: Select the state of this DI as Set, Reset, Open, or Short. If you want to use all DI
states, select <ALL>.
Micro: Select the micro you want to use to generate report information. If you want to use all
micros, select <ALL>.
DI Type: Select the DI type as Alarm, Elevator, or Inactive. If you want to use all DI types,
select <ALL>.
DI Description: Enter the range of device descriptions on which you want to report. Leave
blank for all descriptions.
Micro Description: Enter the range of micro descriptions on which you want to report. Leave
blank for all descriptions.
Filters Tab - Operator History Report Form
Use this tab to select the criteria by which this report will be generated.
•
•
Activity Type: Enable the activity types on which you want to run the report.
Login Name: Select the operator you want to use to generate report information. If you want
to use all operators, select <ALL>.
•
Form Name: Select the forms you want to use to generate report information. If you want to
use all forms, select <ALL
Secure Perfect 6.1.1 User Manual
169
Filters Tab - Person Report Form
This tab is used only when generating a Person Report. Use this tab to select the criteria by which this
report will be generated, allowing you to narrow the selection of information displayed on your report.
•
•
•
Employee Last Name: Select the range of person last names you want to display on the
report. If you want to list all persons, leave these fields blank.
Department: To provide additional filtering, you can select to run a report on only those
persons in a selected department.
Personnel Type: To provide additional filtering, you can also select to list only those persons
assigned a selected personnel type.
Filters Tab - Schedule Report Form
This tab is used only when generating a Schedule Report. Filter or select specific informaiton you want
to display on the report.
Micro: From the drop-down list, select the micro you want to use to generate report information. If you
want to use all micros, select <ALL>.
Filters Tab - Time and Attendance History Report Form
Use this tab to select the criteria by which this report will be generated.
•
•
•
•
Employee Last Name: Select the range of person last names you want to display on the
report. If you want to list all persons, leave these fields blank.
Department: To provide additional filtering, you can select to run a report on only those
persons in a selected department.
Personnel Type: To provide additional filtering, you can also select to list only those persons
assigned a selected personnel type.
Round By: Select the criteria by which you want the time of the time and attendance
transaction rounded by: Hour, Half Hour (30-minute increments), Quarter Hour (15-minute
increments) or Minute.
Filters Tab - Zone History Report Form
This tab allows you to limit the person or badgeholder records printed on this report.
•
•
•
Badge Number: Enter the range of badge numbers you want listed on this report. Leave
blank for all badges.
Employee Name: Enter the range of employee last names on which you want to generate a
report. Leave blank for all names.
Employee Number: Enter the range of employee numbers on which you want to report.
Leave blank for all numbers.
Find Badge
Select a reader from the drop-down list of this dialog box, present a badge at that reader, and this form
displays the record that is associated with the badge presented. If a record is not currently in SP, you can
add it. This is a convenient way of finding the badge record for a card without searching all records.
Secure Perfect 6.1.1 User Manual
170
Flash Micro Icon
Click this graphic to download the latest firmware to the selected micro:
Micro(s).
Upgrades: Secure Perfect 6.0 software will communicate with micros flashed with 4.X and later firmware.
All offline badge and alarm transactions will be uploaded to the Server computer after the conversion
process and stored in the appropriate history table. Allow all the offline transactions to be processed
before flashing micros to the 6.0 firmware to minimize data loss. The duration of time to upload is
dependent on the number of transactions stored and the length of time that the Server computer will not
communicate with the micros. This might be a few minutes or serveral hours.
Floor
Administration Menu
The Floor option opens the Floor Form that allows you to create a description for a floor as well as
assign the floor number. This floor record will be used when configuring an elevator.
Floor Access
Reports Menu
The Floor Access option opens the Floor Access Report form that allows you to create a report based
on the floors defined in the system and the access granted to each floor
Floor Assignment
This window displays when you click Assign Floors, enabling you to select and assign a floor
association for this form. Only floors assigned to the selected elevators will be available for assignment.
Only floors in the operators’ facilities are available for assignment by this operator.
•
•
Select, and then click the right arrow to assign an available floor.
Select, and then click the left arrow to unassign a floor.
The floors that display in this list are those that are configured on the Floor Form.
Floor/Digital Output/Digital Input Selection Dialog
Use this dialog box to create or edit a floor-to-digital-output-to-digital-input link.
•
•
•
Floor: Select a floor from the drop-down list of available floors.
Digital Output: Select a digital output from the drop-down list of available DOs.
Digital Input: Select a digital input from the drop-down list of available DIs.
Click OK to accept your selections and close this form.
Secure Perfect 6.1.1 User Manual
171
Floor/Digital Output/Digital Input Tab
Elevator Form
This tab displays ONLY if you select Floor Tracking By Input from the Floor Tracking field on the
Elevator tab.
Select this tab to link a digital output and a digital input to a floor.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) MUST be on the same micro.
Assigned Floor/Digital Output/Digital Input
This windowpane lists the currently assigned floors, digital outputs, and digital inputs.
•
•
•
Edit: To edit a floor/digital output/digital input link, select an entry from list and click this
Add: To add a floor/digital output/digital input link, click this button. The Floor/Digital
Output/Digital Input Selection dialog displays.
Remove: To remove a floor/digital output/digital input, select an entry from the list and click
this button.
Floor/Digital Output Selection Dialog
Use this dialog box to create or edit a floor-to-digital-output link.
•
•
Floor: Select a floor from the drop-down list of available floors.
Digital Output: Select a digital output from the drop-down list of available DOs.
Click OK to accept your selections and close this form.
Floor/Digital Output Tab
Elevator Form
This tab displays ONLY if you select No Floor Tracking or Floor Tracking By Keypad from the Floor
Tracking field on the Elevator tab.
Select this tab to link a digital output to a floor.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) must be on the same micro.
Assigned Floor/Digital Output
This box lists the currently assigned floors and digital outputs.
•
•
•
Output Selection dialog displays.
dialog displays.
Remove: To remove a floor/digital output, select and then click this button.
Secure Perfect 6.1.1 User Manual
172
Floor Tab
Access Right Form
This tab allows you to configure controls for elevators and floors by assigning them to access rights.
•
Assigned elevators: This windowpane displays a list of the elevators assigned to the current
access right.
•
from a list of elevators available for assignment by this operator. If no elevators are listed,
check that the elevators have been configured on the Elevator Form.
Assigned floors: This windowpane displays the floors assigned to the current access right.
list of floors available for assignment by this operator. Only floors assigned to the selected
elevators will be available for assignment. If no floors are listed, verify that the floors have
been configured on the Floor Form.
•
•
Floor Tab
Floor Form
Use this tab to create a description for a floor
•
•
Description: Enter a description for the floor.
Floor Selection: Click the drop-down list of number to select a floor number.
Floor Tracking By Input
Define the floors available. Define a digital input (DI) and digital output (DO) for each floor. The DIs are
used for floor selection. Only DIs provided by the 20 DI board may be used for floor selection and each DI
may be used in only one elevator and mapped to only one floor. The DOs are used to control where the
elevator moves. Only DOs provided by the 16 DO board may be used and each digital output may only
be used in one elevator and mapped to one floor. A maximum of 32 floors can be supported.
Floor Tracking By Keypad
Define the floors available and define a digital output (DO) for each floor. The reader's keypad is used to
select the desired floor. Only DOs provided by the 16 DO board can be used. In addition, each DO may
be used in only one elevator and mapped to only one floor. The number of floors is limited by the number
of 16 DO boards that can be placed in the Micro/5-PX; the maximum is 4. Therefore, the maximum
number of floors available is 64 (4 boards x 16 DOs = 64 DOs).
Secure Perfect 6.1.1 User Manual
173
Fonts Tab
This tab is used to change the fonts on selected text in the report, when generating any report.
Be careful when selecting font styles and sizes. Some styles may not appear as desired when printed
and some sizes may be too large for the page. Use the Print Preview option to check how the font style
and size will print on a page.
•
•
•
•
•
Title: To change the current font of the report title, click Change to display a list of available
fonts, font styles, and font sizes.
Header Fields: To change the current font of the report headings and/or field descriptions
within the report, click Change to display a list of available fonts, font styles, and font sizes.
Group Fields: To change the current font of the group headings, click Change to display a list
of available fonts, font styles, and font sizes.
Data Fields: To change the current font of the report information, click Change to display a
list of available fonts, font styles, and font sizes.
Page Footer: To change the current font of the report footer, click Change to display a list of
available fonts, font styles, and font sizes. The report footer contains the report title, current
system date, and the page number.
Functions Schedule Tab
Reader Form
Use this tab to select the schedules that will be used to set a reader offline/online or lock/unlock a door.
Time schedules define intervals which include a start AND an end time for different days of the week and
modes. At the start of the schedule, the state of the reader changes to the scheduled value. At the end of
the schedule, the state of the reader returns to the nonscheduled value. For example, if a reader is
scheduled online, it will return to offline at the end of the schedule.
Reader schedule
•
•
Time schedule: Select a time schedule from the drop-down list.
Online/Offline: Select whether the schedule chosen above will set the reader online or offline.
Door schedule
•
•
Time schedule: Select a time schedule from the drop-down list.
Unlock/Lock: Select whether the schedule chosen above will lock or unlock the door
controller by this reader.
•
Disable Auto Unlock: Select this check box to temporarily disable the schedule that would
automatically unlock a door at the start of a new time schedule. When a valid badge is
presented to the reader for the first time and during the current time schedule in effect, the
door unlocks for the first time and the schedule is now in place, as configured. If no valid
access has been detected from start of schedule to current time, the micro will continue to
wait for valid badge access before implementing the schedule. If a Lock schedule is selected,
this feature is grayed out and not available for selection.
Example: This is particularly helpful if a snowday or hurricane prevents employees from
entering the building at the normal time. Although the current schedule would normally unlock
the door, the door remains locked until the first employee arrives at the reader and presents
a valid badge.
Secure Perfect 6.1.1 User Manual
174
G
General Tab
Badge, Schedule, Floor Access, Reader Access, Roll Call, Alarm History, Badge History, Zone
History, DI History, Operator History Reports
Use this tab to set the general parameters for grouping and presenting the information of the form.
•
•
Report Title: Enter a name for this report, up to 64 characters.
Group Records: Select the field by which you want to group the records. Field titles vary with
type of report.
•
Sort Groups: Select the fields by which you want the groups sorted and position the fields in
order of precedence. If this box is empty, click Add to select fields.
Add: Click to select the fields by which you want to sort the groups. This displays the Sort
ꢀ
ꢀ
ꢀ
Delete: Select a field and click to remove a field from the Sort Groups list.
Up: Select a field and click to increase the priority of this field, which determines how the
groups will be sorted.
ꢀ
Down: Select a field and click to lower the priority of this field, which determines how the
groups will be sorted.
Example: To display and review a report of personal by Department, select the Group Records field as
Department. Select a Sort Group of Last Name, then First Name. Click Save. Select Print Preview from
the File menu. The report displays, sorted alphabetically by Department, then last name, then first name.
General Tab
Person, Administration, Device, and Time and Attendance History Reports
This form sets the parameters of the report.
Report Title: Enter a title for this report, of up to 64 characters.
Report Type: Select the type of report you want to run.
If this is a Person Report, the following options are available:
•
Access Rights Data provides a description of all access this person has, and if access is
granted all times in all modes.
•
Badge Data provides the badge number, PIN, status, issue, and expiration dates for each
badge the person has been assigned.
•
•
Location Data provides the address and telephone number for each person.
Standard Data provides the last name, first name, initials, personnel description, department,
employee number, and extended unlock time. This information is also provided on the other
report types for person reports.
•
User Data provides up to 90 user fields on each person. You can select which ones to
include in the report.
If this is an Administration Report, the following options are available:
•
•
•
Alarm Instruction provides a listing of alarm messages defined in the system.
Alarm Notifier provides a listing of e-mail alarm notification information defined in the system.
Alarm Routing and Bumping provides a listing of schedule descriptions, routing clients, time
to bump, bumping clients, routing clients, assigned alarms, and comments.
Archive provides a listing of all the archive files currently in the Database directory.
Badge Format (UBF) provides a listing of custom badge format types, data and parity
layouts, number of facility and badge characters, and comments.
•
•
•
•
•
Client provides a listing of the clients defined on the system, their Region, autoshutdown
selection, and whether they have an Imaging license.
Event Trigger provides a listing of defined event triggers defined in the system, including
Intrusion Zone events.
Events provides a listing of events defined on the system.
Secure Perfect 6.1.1 User Manual
175
•
•
•
Facility provides a listing of all facilities defined on the system.
Floor provides a listing of floor descriptions and their associated floor selection numbers.
Guard Tour provides information associated with each Guard Tour configured in the Secure
Perfect system, including Groups, Tour Points, and badges assigned.
Host Parameter provides a listing of information from the Parameter Form, including
database connection timeout, database retry count, e-mail addresses, e-mails sent, and
duress.
•
•
•
•
•
•
Intrusion Zone provides a list of intrusion zones and the micros that own them.
Operators provides a listing of operators and their permissions defined on the system.
Permission provides a listing of permissions defined on the system.
Response provides a listing of responses defined on the system.
Schedules provides a listing of time and mode schedules defined on the system.
If this is a Device Report, the following options are available:
•
•
Alarm provides a listing of alarms defined on the system and alarm specific information.
Alarm – API Connections provides a list of alarm details defined in the system, received
through an external interface.
•
Alarm – Camera provides a list of Kalatel camera alarm details defined in the system as well
as the DVMRs that own them.
•
•
Alarm – DVMR provides a list of Kalatel DVMR alarms defined in the system.
Alarm Group provides a listing of alarm groups defined on the system and the micro that
owns the groups.
•
•
•
•
•
•
Cameras provides a list of cameras and camera details such as camera presets on the
system and the DVR(s) that own them.
Digital Input provides a listing of digital inputs (DI) defined on the system and DI-specific
information.
Digital Output provides a listing of digital outputs (DO) defined on the system and DO-specific
information.
Digital Output Group provides a listing of digital output groups defined on the system and the
micro that owns them.
Digital Video Recorder provides a list of DVRs defined on the system and DVR-specific
details.
Elevator provides a listing of elevators defined on the system and elevator-specific
information.
•
•
Micro provides a listing of micros defined on the system and micro-specific information.
Reader provides a listing of readers defined on the system and reader-specific information.
If this is a Time and Attendance Report, the following options are available:
•
First In Last Out calculates the difference between the first In transaction and last Out
transaction within the time period you specify on the Date Range tab. All other transactions
are ignored.
•
Paired In Out calculates the difference between all In and Out transactions within the time
period you specify on the Date Range tab. The earliest In is paired with the first Out following
it and both times are displayed together followed by the difference between them in hours.
The next In along with its paired Out are displayed together on the next line. This continues
until all Ins and Outs have been paired together and displayed.
An error message will display if:
•
There is not a matching number of In transactions and Out transactions within a specified
time period.
•
•
There are two In transactions without an Out between them.
There are two Out transactions without an In between them.
Group Records: Select the field by which you want to group the records. This provides the organization
of the report. The choices in the drop-down list correspond with the selection of Report Type. This option
may not be available on all report types.
Sort Groups: Displays the fields in order of precedence by which the groups will be sorted. If this box is
empty, click Add to display a list of available fields. This option may not be available on all report types.
•
Add: Click to select the fields by which you want to sort the groups. This displays the Sort
•
•
Delete: Select a field and click to remove a field from the Sort Groups list.
Up: Select a field and click to increase the priority of this field, which determines how the
groups will be sorted.
Secure Perfect 6.1.1 User Manual
176
•
Down: Select a field and click to lower the priority of this field, which determines how the
groups will be sorted.
Global Edition Regional Configuration Rules
This topic addresses administration and behavior of a successful Secure Perfect Global Edition system.
Particular functions in the Global Edition must be handled locally, at the Regional level. The following
table is an overview of administrative functions and links to forms where configuration and behavior must
be considered.
Secure Perfect
Form
Updates Allowed
in Remote
Regions?
Deletions
Allowed in
Remote
Comments
Regions?
– Readers Only
Yes
Yes
Adding or deleting readers from an access
right for a local Region or remote Region:
The micros get updated with the correct
reader information in both cases
Digital Output Groups, Elevators, and
Zone assignment for access right must
wait until replication interval to update the
remote database and then perform a
database download to micros in the
remote Region.
No (See
Comments)
N/A
Updating in a Remote Region: Updates to
nonmicro alarms (such as CCTV, Camera,
and DVR alarms) are allowed. Updates to
devices directly controlled by I/O boards in
the micro (such as digital inputs and
readers) are not allowed. They must be
updated at a local Regional level.
No
N/A
Yes
Yes
Yes
Yes
Yes
Yes
No action required.
No action required.
Backup Clients tab, Assign micro phone
numbers
No action required.
No
No
No
N/A
N/A
No
Digital Output
Digital Video
Yes
Yes
Editing a DVR in a remote Region: Wait for
replication to occur before changes take
effect. If user changes the host name to a
remote client, wait for replication to occur
and then restart the hosting client’s
services.
Adding a DVR in a remote Region: Wait for
replication to occur and then restart
services on the remote client.
Yes
Yes
Editing an elevator in a remote Region:
Edits will not be applied until replication
occurs on the remote database. After
replication, the operator must manually
initiate a database download from the
Micro Utility Form in order for changes to
Secure Perfect 6.1.1 User Manual
177
take effect.
Form
Yes
Yes
Updating remote Regions: Wait for
replication interval and then perform a
database download. Applies to adds and
deletes.
Yes
No
Yes
No
No action required.
Intrusion Zone
Form
Form
Yes
Yes
Yes
Yes
No action required.
Editing a micro in a remote Region: Wait
for replication to occur and then perform a
database download to that micro. If the
user changes the host name to a remote
client, wait for replication to occur and then
restart the hosting client’s services.
Adding a micro in a remote Region: Wait
for replication to occur and then restart
services on the remote client.
Form
Yes
Yes
Updating remote Regions: Wait for
replication interval and then perform a
database download. Applies to adds and
deletes.
Yes
No
Yes
N/A
Yes
No action required.
Time Schedule
Yes
Updating remote Regions: Wait for
replication interval and then perform a
database download. Applies to adds and
deletes.
No
N/A
All tour points must be associated with
micros within the same Region.
Group Tab
Alarm Group Form
Use this tab to schedule when the alarms in the group are monitored or when to print alarm transactions
by assigning previously defined time schedules to alarm groups.
Number: This is a read-only field. Displays the number of the alarm group.
Micro: This is a read-only field. Displays the description of the micro on which this alarm group is located.
Monitoring
•
•
Time schedule: Select a time schedule from the drop-down list.
On/Off: Select On if the above schedule is when you want to monitor the alarm group or Off if
the above schedule is when you do not want to monitor alarms belonging to this alarm group.
Print Alarm
•
•
Time schedule: Select a time schedule from the drop-down list.
Yes/No: Select Yes if the above schedule is when you want to print alarms belonging to this
alarm group or No if the above schedule is when you do not want to print alarms belonging to
this alarm group.
Secure Perfect 6.1.1 User Manual
178
Guard Tour Assignment Dialog Box
This window displays when you click Guard Tour Assignment, enabling you to select and assign Guard
Tours that you want to trigger an event.
•
•
Select, and then click the right arrow to assign a Guard Tour.
Select, and then click the left arrow to unassign a Guard Tour.
Click OK to display the results in the Assigned Guard Tours windowpane.
Group Tab
Digital Output Group Form
Use this tab to assign digital outputs to a selected digital output group on a specified micro.
Number
This is a read-only field displaying the number assigned to the digital output group.
Micro
This is a read-only field displaying the description of the micro on which this digital output group is
located.
Digital Outputs
This windowpane displays the digital outputs assigned to this group.
Assign Digital Outputs
Click this button to display the Digital Output Assignment dialog box. This dialog lists all digital outputs
available.
Guard Tour
Administration Menu
The Guard Tour option opens the Guard Tour form that allows you to enter a description for your Guard
Tour inspection and configure the Tour Manager PC, Start Point, tour time, and points.
This option is unavailable if you are not licensed for Guard Tour.
Guard Tour History
Reports Menu
The Guard Tour History option opens the Guard Tour History Report Form that allows you to generate a
report of completed tours displaying tour activities such as start points, hits, invalid points, pauses,
resumes, tour end points, tour time exceeded, manual start and manual stop.
Secure Perfect 6.1.1 User Manual
179
Guard Tour Tab - Guard Tour Form
Reference Topic:
Configure the specifics of this tour by completing the elements displayed on this tab.
Requirements are indicated by an asterisk.
Element
Description
Tour Host Computer*
From the drop-down list, select the computer that will host this tour. Guard
tours must be owned by a specific client host.
Start Tour Point*
From the drop-down list, select a tour point as the start point of this tour.
•
Only direct and network micro devices display in this drop-down list.
•
•
When you select a start point,
becomes available.
Enter the maximum number of minutes that this tour is allowed to last.
When the maximum time is reached, a tour is ended automatically.
The default and maximum number of minutes in this field is 480.
Max tour time (min)*
•
Route Activity to
Printer
Select this check box to route badge activities to a selected and enabled
system printer at the client computer that is hosting the Guard Tour. You must
have two separate printers configured if you are using a printer for tour
activitiess and a printer for badges.
•
Displays a list of assigned tour points. All tours are random. A random tour
is a tour where all of its points do not need to be hit in a particular order,
except the assigned start point.
Tour Points*
•
•
•
Every time this tour is executed, the order of ‘hit’ points can vary. A random
tour ends automatically when all of its tour points have been hit.
Points to this tour.
Assign Tour Points*
Selection results display in the Tour Points windowpane.
Move Up
Select and click to move this Tour Point up the list. This tour point order
displays on the Manual Control form, Guard Tour tab.
Move Down
Select and click to move this Tour Point down the list. This tour point order
displays on the Manual Control form, Guard Tour tab.
Tour Badges*
Assign Tour Badges
Displays a list of assigned tour badges. At least one badge must be assigned
to a tour.
•
•
•
•
badges to this tour.
If a reader is assigned as a tour point, a badge must be assigned before
this Guard Tour record can be saved.
Click to save this tour record and simultaneously create a new alarm,
Guard Tour Max Time Exceeded.
If you have not completed the required elements, you cannot save.
Save*
Secure Perfect 6.1.1 User Manual
180
Guard Tour Tab - Manual Control Form
Reference Topics:
This tab does not display if you are not licensed for Guard Tour.
The purpose of using this form is to manually start, pause, resume, or stop a Guard Tour that is currently
in progress. The upper windowpane displays all Guard Tours configured in your Secure Perfect system to
which this operator has access.
Element
Description
Upper Windowpane:
•
•
Guard Tour
Tour State
A list of configured tours descriptions in the Secure Perfect system.
This column displays the current state of all Guard Tours in your Secure
Perfect system. Typical states are: 1) Tour Started; 2) Tour Not Started; 3)
Tour Paused.
•
•
Time to Complete
Client Description
This column displays the estimated time assigned for completion of a tour,
based on the clock time that this tour started and maximum tour time
allowed. If a tour is paused and later resumed before expiration of
estimated completion time, the remaining unused tour time is reflected in
the Time to Complete column.
This column displays the client that is hosting the selected tour. A color
indicator displays the current connection status of the client that is hosting
the selected tour.
•
•
Green indicates online.
Red indicates offline.
Lower Windowpane:
•
Tour Point
This column displays a list of points associated with the selected Guard
Tour.
•
Point Status
This column displays a ‘hit’ or ‘not hit’ real-time status. You do not have to
refresh your window to see the current state of the tour points for the
selected tour.
•
Last Hit Time
This column has an entry following a valid ‘hit’ to this point.
Set Tour to:
•
•
•
Start
Verify that the appropriate tour is selected in the upper windowpane. Click
to manually begin a Guard Tour. The Tour State column indicates ‘Tour
Started.’
Stop
Verify that the appropriate tour is selected in the upper windowpane. Click
to prematurely stop a tour in progress. The Tour State column indicates
‘Tour Not Started.’ This button is not available if a tour is not in progress.
Resume
Verify that the appropriate tour is selected in the upper windowpane. Click
to resume a tour that was previously paused. The Tour State column
indicates ‘Tour Started.’ This button is unavailable if a tour is not in
progress. This button is not available if the time assigned for the selected
tour has expired.
•
•
Pause
Verify that the appropriate tour is selected in the upper windowpane. Click
to pause a tour that is currently in progress. The Tour State column
indicates ‘Tour Paused.’ This button is unavailable if a tour is not in
progress.
Purpose
Specify a reason for stopping or starting this tour. Enter a brief statement
about the operator’s actions.
Secure Perfect 6.1.1 User Manual
181
H
Help Doesn't Display in My Assigned Language
This occurs when you are using either a non-English operating system or a non-English Secure Perfect
and you did not correctly shut down SP. To eliminate this problem, you MUST select the File menu and
then Exit to correctly shut down SP.
Help Topics
Help Menu
Selection of this option starts the Secure Perfect Help system.
You can also click the Help icon to access Help
, then move the ? over any area of your display and
click again. A window will open with information pertaining to the selected section.
Click the Show me icon to view a step-by-step animated demo.
Using Help Contents
Using Help Index
Using Help Search
Hex Characters
Valid and allowable hex characters include the base 16 numbering system (0 through 9 and A through F).
How Do I Perform a Search on a Specific Form
The Secure Perfect Search button can be found on any form that provides search capabilities. If you click
this button when the current form is blank, all records will be returned. To specify criteria, fill in the
information.
Example: If you want to find all badgeholders with the last name Smith, type Smithin the Last name
field and click Search.
You can also use the * character that allows you to search for patterns.
Example: A search for badgeholders with the last name starting with Sm*would yield such names as
Smithand Smythers.
How Do I Put a Reader Online
From the Secure Perfect main menu, go to Device, then Reader. Click Search to display existing reader
records. From the right windowpane, select the reader you want to set online, then select Online and
Active.
Secure Perfect 6.1.1 User Manual
183
How Do I Remove an Alarm from the Alarm Monitor Form
When an alarm displays on the Alarm Monitor Form, appropriate action should be taken. For example,
you may want to send a guard out to check that a door is secure. Once the alarm has been investigated
and reset, if necessary, it should be removed from the Alarm Monitor Form.
1. Some alarms may require an acknowledgment before they can be removed. This feature is set on
the Alarm Form. To acknowledge the alarm:
ꢀ
Without a response, click Acknowledge and the Process state for that alarm will change to
Acknowledged.
ꢀ
With a response, click Responses to select a predefined response or enter your own in the
Response field. Then, click Acknowledge and the Process state for that alarm will change to
Acknowledged.
2. To remove an individual alarm without waiting for it to reset, highlight the alarm and click Remove
Individual.
3. If you have permission, you can remove all alarms in one action by clicking the Remove All icon:
How Do I Troubleshoot My Global Edition System?
Reference Topic:
Review the Secure Perfect 6.0 Installation Guide chapter covering "Installing Secure Perfect 6.0 Global
Edition." Confirm and review your configuration options, then review the Troubleshooting section.
Additionally, refer to Microsoft Replication software documentation in printed and electronic format.
Secure Perfect 6.1.1 User Manual
184
I
Installing the Printer Driver
To install the print driver for your badge printer:
1. Follow the instructions shipped with your printer.
2. Select the appropriate printer port.
3. Select a name for the printer and indicate if it is the default printer.
4. Do not print a test page; click Finish.
5. After the installation is complete, move the mouse pointer over the printer icon, click the right
mouse button, and select and set Properties.
6. Complete the printer setup and then click Exit.
NOTES:
• The printer may NOT support transparent bitmaps.
• If the printer run out of cards or the ribbon need to be replaced while in the process of producing
badges, an error message will display. Correct the condition at the printer and then put the printer back
online before continuing with your print job.
Instruction
Administration Menu
The Instruction option opens the Alarm Instruction Form that allows you to create instructions on how to
react to alarms and link with alarm records. The instruction(s) will then display on the Alarm Monitor Form
when the alarm occurs.
Intrusion Zone
Administration Menu
The Intrusion Zone option opens the Intrusion Zone Form that allows you to create zones, assign
intrusion DI, intrusion DO, alarms, and readers. The Status Tab displays current state of the zone and
status of all assigned devices.
Intrusion Zone Assignment Dialog Box
This window displays when Assign Intrusion Zone is clicked on the Intrusion Zones tab of the Access
Right form or Event Trigger form. The window displays a list of all intrusion zones for the micros in the
facilities available for assignment by this operator. You can assign an unlimited number of intrusion zones
to an access right.
•
•
Select, then click the right arrow to assign an available intrusion zone.
Select, then click the left arrow to unassign an intrusion zone.
Click OK to accept the selections and display the Intrusion Zones in the Assigned Intrusion Zones list
box.
Secure Perfect 6.1.1 User Manual
185
Intrusion Overview
Reference Topics:
About Intrusion Options
Intrusion functionality provides the ability to define local intrusion zones per micro that consist of:
•
•
•
•
Readers
Alarms
Arm/disarm input point Intrusion DI
Arm/disarm output point DO
The defined intrusion zones have the ability to be armed and disarmed through access control by using a
card and keypad reader, DI, or manual control.
The intended application is suited for arming and disarming intrusion zones from outside of the monitored
and secured areas. Based on Secure Perfect system architecture, it is not our intent to fully emulate
traditional Burg/Intrusion panel functions but to provide similar functionality for less stringent
Burg/intrusion requirements that can be taken on natively within the access control system. Additionally,
the system provides increased value by allowing cross-system functionality between the Secure Perfect
micro and vendor-independent Burg/Intrusion panels.
Arm/Disarm Intrusion Point - Digital Input Form
•
•
•
An Intrusion DI Type has been added to the drop-down list on the Digital Input Form, Digital
Input tab.
When the Arm/Disarm Intrusion point is set/active (Armed), the associated zone is armed by
placing all readers offline, all alarm points monitored on, and the arm/disarm DO goes active.
When the Arm/Disarm Intrusion DI is reset/not active (Disarmed), the associated zone is
disarmed by placing all readers online, all alarm points monitored off (unless on a schedule),
and the arm/disarm DO goes inactive.
Intrusion Zone – Intrusion Zone Form
The Intrusion Zone Form is required for creating a relation between readers, alarm inputs, the
Arm/Disarm Intrusion point, and the arm/disarm DO.
2. A micro selection is required to establish the zone source and its intrusion points.
3. The Intrusion Zone tab provides for the assignment of the following intrusion zone components:
arm/disarm DO, arm/disarm Intrusion DI, readers, and alarms.
ꢀ
ꢀ
ꢀ
ꢀ
Arm/Disarm Intrusion DI: This is a single record selection from a drop-down list filtered by
active facility that consists of all available Arm/Disarm Intrusion points for the micro. Only the
Dis that have not been assigned will be available.
Alarm Points: This is a multi-record selection from an assignment dialog filtered by active
facility that consists of available micro alarm points not already assigned to a zone. (24/7 4-
State Supervision rules apply regardless of the Armed/Disarmed state of the zone.)
Readers: This is a multi-record selection from an assignment dialog filtered by active facility
that consists of available readers not already assigned to a zone. (Readers must be active
and nonelevator type.)
A zone can be configured to contain the following:
An Arm/Disarm Intrusion Point with Alarm Points only and no Readers.
An Arm/Disarm Intrusion Point with Readers only and no Alarm Points
Alarm Points and Readers only with no Arm/Disarm Intrusion Point.
Readers only.
An arm/disarm DO can be assigned for any of these.
4. A Status tab provides the ability to request status of the zone and each of its associated points, as
follows.
ꢀ
Zone: Armed or Disarmed
Secure Perfect 6.1.1 User Manual
186
ꢀ
ꢀ
ꢀ
Arm/Disarm Intrusion DI: Active/Inactive/Trouble
Readers: Online or Off-Line
Alarm Points: Monitored Off/Monitored On
Arm/Disarm By Access Right
The Intrusion Zones tab of the Access Right Form allows you to assign multiple intrusion zones using an
assignment dialog.
•
•
•
Only badge holders with an Intrusion Zone assigned on the Access Right Form will be able to
arm and disarm zones using any of the card/keypad readers within a zone.
When a zone is armed, all readers within the zone will go offline, and normal access rights
will not gain access into the area.
When a zone is disarmed, all readers within the zone will go on-line and normal access rights
will gain access into the area. If schedules were assigned, then the reader will follow the
schedule.
If you expect to arm/disarm by using any one of the readers within a zone:
•
That reader must be assigned on the Access Right tab of the Access Right Form and be an
assigned reader in the Intrusion Zone listed on the Intrusion Zone tab.
OR
•
Individually created access rights must be assigned to the person that will arm/disarm the
Instrusion Zone. (One right will allow access to the readers and another right will allow
access to the Intrusion Zone.)
Arm/Disarm by Manual Control
Manual zone control for arming and disarming is accomplished using the Intrusion Zone tab on the
Manual Control Form. This follows the standard Manual Control Form conventions including a Purpose
entry by the operator.
Intrusion Zone Tab
Reference Topic:
Access Right Form
This tab allows you to assign intrusion zone control to previously created access rights. Access to a
reader and access to an intrusion zone are two separate access rights. Only badge holders with an
Arm/Disarm Intrusion Zone access right will be able to arm and disarm zones by accessing a
card/keypad reader within a zone. When a zone is armed, all readers within that zone go off-line;
therefore, normal access rights will not gain access into the area.
Assigned Intrusion Zones: This windowpane displays a list of previously assigned intrusion zones for
the currently selected access right record.
Assign Intrusion Zone: Click this button to display the Intrusion Zone Assignment dialog box, allowing
you to assign and unassign intrusion zones to the selected access right. If no intrusion zones display,
verify that intrusion zones were configured on the Intrusion Zone Form.
If you do not have valid access to a reader that belongs to an Intrusion Zone due to a schedule in that
access right, you will not be able to arm/disarm a zone.
Secure Perfect 6.1.1 User Manual
187
Intrusion Zone Tab - Event Trigger Form
Reference Topic:
This tab allows you to assign Intrusion Zones and Intrusion Zone transaction type(s) that will become the
source for this Event Trigger.
Element
Description
Transactions:
Select any one or all of the types of Intrusion Zone
transactions that will trigger an event.
•
•
•
Arm
Intrusion Zone arm transaction in progress.
Intrusion Zone disarm transaction in progress.
Disarm
Invalid
Intrusion Zone arm/disarm transaction failed for one of the
following reasons:
•Device or badging failed. The zones are not secure.
•The arm/disarm device is not a part of the selected
zones.
•The 10-second time period allowed for completion of
the arm/disarm process at keypad and reader, has
expired.
•The presented badge does not have access rights for
transactions in the selected Intrusion Zones.
Tag Selection:
Select one of the options.
•
•
•
None
No tag is sent for marking a recorded video or
manipulating the record rate.
Tag only
Tag as event
A tag is sent for marking recorded video at the camera(s)
current record rate.
A tag is sent to the DVR for marking recorded video and
for changing the camera(s) record rate to its event record
rate settings.
Assigned
Intrusion Zones
This list box displays those Intrusion Zones that you have
assigned to this Event Trigger.
Assign Intrusion
Zone
listing available Intrusion Zones in your Secure Perfect
system. Those zones selected and assigned when you
close the dialog box, will display in this list box.
Secure Perfect 6.1.1 User Manual
188
Intrusion Zone Tab
Reference Topic:
Intrusion Zone Form
This tab allows you to edit or create an intrusion zone record and associate DI, DO, and devices such as
Number: Assign and enter a number for the intrusion zone, between 1 and 96. Duplicate numbers are
allowed but not on the same micro.
Micro:
Select a micro from the drop-down list of available micros that will control this intrusion zone. This is a
one-to-one relationship and establishes the zone source and intrusion/access points. The micro must be
connected and online.
A Reader or Digital Input and Alarm must be selected in order to save this record.
Arm/Disarm DO: Select one DO from the drop-down list of DOs that will trigger when an Intrusion Zone
is armed/disarmed. This is an optional assignment. This DO can be assigned to another Intrusion Zone.
Arm/Disarm DI: Select one DI for the drop-down list of available DIs of the Type Intrusion, as
assigned on the Digital Input Form. This DI can arm/disarm an Intrusion Zone and is an optional
assignment. This DI cannot be assigned to another Intrusion Zone.
When you unassign a DI, save this record. It is now available to re-assign this DI to another Intrusion
Zone.
Last Status:
•
•
•
Date: Date of last zone history transaction on record.
Time: Time of last zone history transaction on record.
Status: Status as of last zone history transaction on record.
In order to refresh this status section, click off of this record then back or close then reopen the form
Devices
Assigned Readers: This list box displays a list of available, active readers in the same zone, belonging
to the selected micro. You must assign at least one reader OR a digital input and alarm to an Intrusion
Zone. The reader cannot be assigned to an elevator. Click Assign Readers to display a dialog box that
enables you to assign active readers.
Assigned Alarms: This list box displays a list of intrusion alarms in the same zone, not already
assigned, on the selected micro. This cannot be an external, DVMR, or a logical such as Host Comm or
Lost Badge alarm. Click Assign Alarms to display a dialog box that enables you to assign alarms. This is
an optional assignment.
Arm Delay (sec)
Arm Delay: Enter the number of seconds to delay the arming of this intrusion zone. This field accepts up
to 255 seconds. This time limit should allow a person to pass into or out of a monitored area before the
zone is armed.
If your system is UL-listed, the delay cannot exceed 60 seconds. Refer to the UL Certification
Requirements in your Secure Perfect Installation Manual.
Secure Perfect 6.1.1 User Manual
189
Intrusion Zone Tab
Reference Topic:
Manual Control Form
This form allows you to manually control the Intrusion Zone, and takes the Intrusion Zone from one
Example:
•
When the Zone is Armed, readers will not allow access to anyone, alarm points are
monitored, and schedules are ignored.
•
When the Zone is Disarmed, personnel require only access rights for readers.
Select micro
Immediately following selection of a micro, the system searches and displays Intrusion Zone records in
the list box windowpane, associated with the selected micro.
•
•
All displays all micros in the operator’s facilities.
By Micro displays records for a specific micro. Click the down arrow to display the list of
micros.
Columns in Windowpane
•
•
Description: Description of the Intrusion Zone in the database.
Micro: Micro on which the Intrusion Zone Control is located.
Set State To:
•
•
Arm: Immediately arms the selected Intrusion Zone.
Disarm: Immediately disarms the manual Intrusion Zone.
Purpose
When you select an Intrusion record, this box is enabled. Enter an explanation for arming/disarming the
Intrusion Zone. This field accepts 255 alphanumeric characters. These comments are written to the
operator history file and display in the Purpose Field, on the Operator History Report.
Secure Perfect 6.1.1 User Manual
190
K
Keypad Alarm Shunting
Reference Topics:
The keypad alarm shunting feature allows you to turn the monitoring of a group of alarms off or on using
the keypad. This can also be accomplished by setting up a schedule for an alarm group using a time
schedule.
Only reader board door inputs and 20DI board input points can be shunted from a keypad.
• To identify a reader board door input, look for a default description that follows this format: 0001-1-01
Reader.
• To identify a 20DI board input point, look for a default description that follows this format: 0001-1-01
DI.
Keypad Only Type Reader
Only reader board door inputs and 20DI board input points can be shunted from a keypad. (To
identify a reader board door input, look for a default description that follows this format: 01-1-01 Reader.
To identify a 20DI board input point, look for a default description that follows this format: 01-1-01 DI.)
Follow the steps below to shunt alarm groups within a micro connected to a keypad reader.
1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>
depending on the reader model.
2. Type one of the following:
0 - to turn monitoring off
1 - to turn monitoring on
3. Type the alarm group number (00 to 15) you want shunted.
4. Click the end key that is labeled with either a pound sign (#) or an <x>.
5. Click the start key on the keypad again.
6. Type your badge number on the keypad.
7. Click the end key (<#> or <x>).
Secure Perfect 6.1.1 User Manual
191
L
Launch Client
Select this icon from the Client Monitor toolbar, to enable a CCTV interface (other than integrated CCTV).
This option also displays on the shortcut menu for this form. The shortcut menu displays when you click
the right mouse button.
Licensing
Reference Topic:
Your Secure Perfect software is licensed during the installation process. The license sequence is also
an item on the Start, Programs, Secure Perfect menu. Refer to the SP License Help system for
additional details of the licensing procedure.
Your license included Imaging software for Secure Perfect that controls the number of clients that can
launch Imaging. Imaging installs with every Secure Perfect installation; however, you cannot enable
Imaging on more computers than you have Imaging licenses. (Only clients that have an Imaging license
enabled can capture images and signatures, create badge designs, and print badges. If not all computers
require the license at the same time, you can enable and disable the license for the appropriate
computers.)
Thin client licenses are limited to Enterprise Server computers running Windows 2000/2003 operating
system. Licensing controls the number of computers that can host remote Secure Perfect sessions. You
cannot enable thin client on more computers than you have licenses. (If not all computers require the
license at the same time, you can enable and disable the option for the appropriate computers.)
To run the License program, click in this sequence: Start, Run, Programs, Secure Perfect, SP
License. The LicenseSetup window opens. Follow instructions as displayed. SP License has a separate
Online Help system.
Location Tab
Reference Topic:
Person Form
Use this tab to enter location information for this person. The fields accept 64 alphanumeric characters,
making possible exceptionally lengthy street addresses or E-mail addresses.
Address1/Address2/ Address3/Address4/Address5
The labels of these five fields are defined on the Parameters Form.
Any fields can be used as an E-mail Address, but must first be designated as the E-mail address on
the Parameter Form, as a User Field or Address Field entry.
Telephone
Enter the telephone number of this person. You may use up to 14 alphanumeric characters. There are no
restrictions in format (whether you use hyphens, parentheses, or spaces). Enter in a format meaningful
and understandable to your organization or application.
Secure Perfect 6.1.1 User Manual
192
LogFile
Administration Menu
The LogFile option opens the LogFile Form that allows you to select the computer, name your log file,
and navigate to, or enter the path and directory to your LogFile.
LogFile Tab
Reference Topic:
LogFile Form
Click Add to create a new logfile record or Search to display a list box of previously created LogFiles.
Computer
This field will be unavailable when creating a new
record. The name of your computer will display in this
field.
LogFile
Name or identify your file.
You must enter an .splextension. Example:
COM1log.spl
Path
Designate the path and directory in which to place
your LogFile.
Browse
Click to display a Browse for Folder window, allowing
you to navigate to the directory in which to place your
LogFile.
Save. Now, open the Diagnostic Settings Form from the Administration menu. You will want to select this
LogFile name from the list of files displayed, and assign components for monitoring.
Logoff
File Menu Item
Low-Battery Alarm
Micro/PX-2000 ONLY: When you create and save a Micro/PX-2000 record, Secure Perfect creates and
supports 11 DI points; however, the 11th DI is a low-battery alarm. To configure the 11th DI to function as
a low-battery alarm, refer to DI Board Records Creation. If power is off and the backup battery is running
low, the micro sends an alarm transaction to the Alarm Monitor form. The alarm displays until the battery
is reset by recharging or the micro is powered back on.
Secure Perfect 6.1.1 User Manual
193
M
Manual Control
Operations Menu
The Manual Control option opens the Manual Control Form that allows you to control:
•
•
•
DO (digital output) states for Door DOs and other DOs.
DI (digital input) states for Alarm DIs and other DIs.
Intrusion Zone states.
The shortcut key combination for Manual Control Form is CTRL+O.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Manual Control Tab
Digital Output Form
Use this tab to manually set the state of a specified digital output.
Purpose
Enter the reason for manually changing the state of the specified digital output. The text entered here is
recorded in Operator History.
Set state to:
•
On for Duration: Click to set the selected digital output to its Active state for the On time
specified on the Digital Output tab.
•
On Indefinite: Click to set the selected digital output to its Active state until it is manually set
to its inactive state. The only way to turn it off is by selecting Off on this tab or Off on the
Manual Door/DO Control Form.
•
•
Off: Click to set the selected digital output to its inactive state.
Sched. Override: Use this option to change the state of the DO if you want the schedule to
override its setting. For example, use Sched. Override to unlock a door if you want a
schedule at a later time to lock this door. If you don’t want the scheduler to lock your door,
use the On Indefinite selection.
Secure Perfect 6.1.1 User Manual
194
Mass Update
Reference Topic:
This option is not available until at least one record exists in the list box to the right of the form. The Mass
Update mode allows you to simultaneously update properties on a group of records within Secure
Perfect. This is very helpful when a number of records for a single form require the identical property or
value change. Forms where Mass Update is applicable include the Person Form and Badge Form.
Click the Show me icon to view a step-by-step animated demo.
Mass Update mode of processing is enabled as follows:
1. Open a blank form.
narrow your search results to only records that are to be updated. Records that match your
search criteria display in the list box to the right of the form.
If there are no records, Mass Update is not available.
3. Move the mouse pointer below any of the tabs and right-click to display a shortcut menu to
related forms. To enable the Mass Update mode, select Mass Update from the shortcut menu.
4. Note the change in the appearance of the form. ONLY those fields or dialog boxes that are
5. Select the records you want to adjust from the list box on the right. Typical Microsoft Windows
selection/deselection process is used in this application
6. Make the required adjustment to the form.
7. Click Save. The update of records begins immediately. A window displays with a progress bar,
indicating the update progress. Click Abort if you want to stop the update in progress.
ꢀYou cannot close a form during the Mass Update process.
Right-click shortcut menu navigation is unavailable when you are in Mass Update
mode.
ꢀIf you have changed any parameter but did not Save, a message reminds you to discard or
save your changes.
ꢀSmaller batch updates are recommended to prevent performance issues during a mass
update.
ꢀA Mass Update Complete dialog box displays, indicating completion or failure.
When mass updates are processed to an access right, a log file is generated and a
View Results key displays in the dialog box. Click to view the completion log. We
recommend that you rename and save this file to another location for reference purposes.
Renaming the log prevents an overwrite. The questionable log will be available for
Customer Support to review and locate discrepancies. Be aware that this log file is
automatically overwritten every 7 days, in order to prevent unnecessary data that would
accumulate on your hard drive.
8. When the process is complete, a Mass Update Complete dialog message displays.
9. Right-click and select Mass Update from the shortcut menu to disable and exit Mass Update
mode. The records refresh at this point.
10. Updates display in the list box to the right.
Secure Perfect 6.1.1 User Manual
195
Menu Buttons
View Menu
The Menu Buttons option determines whether or not the Secure Perfect graphics display beside options
in the drop-down menus.
Clear the check box to hide the graphics from view.
Message Format Tab
Alarm Notifier Form
This tab allows you to format the appearance of the e-mail alarm notification, based on your Windows
regional font settings.
Date/Time Format
Select a date/time format from the drop-down list.
Header
Select this check box to display a header greeting. In the Header field, enter text up to 256 alphanumeric
characters. This could be additional details explaining the alarm condition.
•
If you do not select the check box, any header message you create will NOT be included in
your e-mail.
•
If you do not enter a header greeting, an equivalent white space will display at the beginning
of the e-mail notification.
Footer
Select this check box to display a footer closing. In the Footer field, enter text up to 256 alphanumeric
characters. This space could provide a name and number to contact if the receiver has a question.
•
If you do not select the check box, any footer message you create will NOT be included in
your e-mail.
•
If you do not enter a foot or closing, an equivalent white space will display at the end of the e-
mail notification.
Alarm Information: The information displayed on the e-mail message may look similar to:
0151-1-01 DI|Alarm|10/16/02 15:20:59
where:
0151-1-01 DI=
Alarm
The micro, board and reader.
The alarm state.
=
10/16/01 15:20:59
=
The micro date and time.
Add Alarm Instruction
Select this check box to include the alarm instruction associated with this alarm, in this e-mail notification.
•
If this check box is not selected, any associated alarm instruction will not be included in the
message.
•
If this check box is selected and there are no alarm instructions, no instructions will be
included in the message.
Alarm/Reset Text
This text is how you want the alarm State to display to the receiver. You can do one of the following:
•
•
Accept the default alarm state entry, as displayed in the language of the current operator.
Select and replace the existing text with alarm state text in another language, such as the
language of the receiver. You can also add to the text with additional text (no more than 32
alphanumeric characters total) describing the state.
Alarm Text: Default alarm state text is Alarm, displayed in the language of the current operator.
Reset Text: Default alarm reset state text is Reset, displayed in the language of the current operator.
Secure Perfect 6.1.1 User Manual
196
Micro
Device Menu
The Micro option opens the Micro Form that allows you to identify and configure micros.
Micro/5-PX or Micro/PX-2000 Records Generation
When you select a micro type on the Micro Definition tab of the Micro Form, a Power/Comm board is
automatically added to the Configuration column on the Micro Configuration tab of the Micro Form. As a
result, certain additional records are created:
Alarm Records:
•
•
•
•
•
•
•
•
Tamper
Power
Lost Badge Alarm
Invalid Badge
Host Comm Alarm
8RP
Reminder: The Micro/PX-2000 supports 4 readers.
Reminder: The Micro/PX-2000 supports 8 DO points.
Reminder: The Micro/PX-2000 supports 11 DI points.
16DO
20DI
alarm for the micro.
None of these alarms are monitored. If you want them to display on the Alarm Monitor when the alarm is
triggered, you will need to go to the Alarm Form, Alarm Tab and enable Monitor in the Settings section.
In addition, all alarms are automatically assigned to Alarm Group 0. You can change the Alarm Group on
the Alarm Group Form.
Digital Input Records:
•
•
Tamper
Power
Sixteen (16) Alarm Group Records:
As mentioned above, all alarms are automatically assigned to Alarm Group 0. You can change this on the
Alarm Group Form.
Micro Assignment Dialog Box
This window displays when you click Edit, allowing you to select and assign micro association for this
•
•
Select, and then click the right arrow to assign an available micro.
Select, and then click the left arrow to unassign a micro.
Secure Perfect 6.1.1 User Manual
197
Micro Configuration Tab
Reference Topics:
Micro Form
Use this tab to assign the appropriate boards to this micro.
Before continuing, verify that the micro type (Micro/5-PX, Micro/5-PXN, Micro/PX-2000, or Micro/PXN-
2000) is correct. The boards listed in the Boards column depend on the type of micro you have selected.
Boards
Lists all boards supported by Secure Perfect and the micro type you have selected. To add a board to the
current micro record, click and drag to the Configuration column. If the addition of the board violates a
micro configuration rule, you will get an error and the board will not be added.
Configuration
Lists the current configuration of the micro. A Power/Comm board is automatically added when you
create the micro record. The reader, digital input, and digital output boards will need to be added to
match the physical setup of the micro.
Following the addition or deletion of a board, you MUST click Save for the appropriate records to be
generated or deleted.
Once you add a board, you are restricted to that type of board only. For example, if you add one 2RP
board, any additional boards MUST be 2RP boards. Likewise, you cannot violate any micro configuration
rule. These are based on the capacities for each micro. For example, for the Micro/5-PX, you can only
add up to four 2RP boards, four 2SRP boards, two 4CRP boards, two 8RP boards, or two CK8RP
boards.
Secure Perfect 6.1.1 User Manual
198
Micro Definition Tab
Micro Form
Configure your system with forethought. You will need to designate a physical address for your micro
before you create a definition.
This tab contains the basic information on the micro, such as its address and connection type. When
configuring a micro, COMPLETE THIS TAB FIRST. Other tabs display, depending on the selections you
make on this form.
Upon creation, the micro is offline. Before the host will communicate with the micro, you must change it to
online using the Micro Utility Form. You will not see any badge or alarm transactions until this is done.
Element
Description
Enter a number from 1 to 9999 maximum.
Micro
Address
When micro records are created, the default value is in the format:
mmmm-b-ppBoard Type where mmmm represents the micro number to
which a reader is associated, b represents the board number, pp
represents the point or device number, and Board Type is the type of
reader board.
Example:
0001-1-01 Reader
Micro Type
Select the micro you are configuring from the drop-down list. Secure
Perfect operates with the following micro types:
•
Micro/5-PX (supports 16 readers) for direct serial and remote dial-
up modem communications links.
•
Micro/5-PXN (supports 16 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
•
•
Micro/PX-2000 (supports 4 readers) for direct serial and remote
dial-up modem communications links.
Micro/PXN-2000 (supports 4 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
•
•
MicroPXNPlus (supports 16 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
MicroPXNPlus2000 (supports 4 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
When you make a selection, the appropriate fields become available for
the selected type.
Head of Line
Once you have connected the first micro to the host, this micro is the
Head-of-Line in a string of micros.
•
Select Yes if you are configuring the first micro connected to the
host.
•
If you select No, you must also select a head-of-line micro from the
drop-down list.
A MicroPXNPlus or MicroPXNPlus2000 must be a head-of-line micro to
take advantage of the Web Integrated Configuration Tool for flashing the
firmware.
If this is a new board, the network settings are set as the default. Open a
browser window such as IE, enter the micro IP address (such as
http\\192.168.6.6)and click Go. Firmware download begins.
•
If a MicroPXNPlus or MicroPXNPlus2000 is downstream, you must
use eFlash to download firmware to any micro.
Secure Perfect 6.1.1 User Manual
199
•
If a MicroPXNPlus or MicroPXNPlus2000 is downstream, consider
obtaining a network connection and using the Web Integrated
Configuration Tool to individually download firmware for ALL
micros.
Connection
Type
You must select a micro type before this field becomes available. An
error message displays if the selected connection type is not valid with
the micro type.
•
•
•
•
Select Dial-up if this micro is connected by a modem.
Select Direct if a cable connects this micro.
Select Network if this is a network micro connected by a network.
Select Network + Dial-up if this is a network micro and has a
backup dial-up option. When the network connection is not
available, the host attempts to reach the micro via a dial-up modem.
Select Network + Direct if this is a network micro. When the network
connection is not available, communication fails over to the
secondary direct connection and communication continues.
Select Network + Network if this is a network micro. When the
network connection is not available, communication fails over to a
secondary network communication through another IP address,
assigned on the Port Settings tab.
•
•
Dial-Up and Network + Dial-Up Micros: If the host computer of this
micro is licensed for Client Redundancy and has assigned a backup
client, a dialog box displays, reminding you to complete the Client Form
by configuring telephone numbers for backup clients to reach this micro.
Host Keep
Alive
Type (or use the up and down arrows) the number of seconds that the
host will wait before sending the next message to a micro. Enter a
number between 10 and 3600. In general, you want a large number
when you have many micros on the same line or have a slow baud rate.
The default is 30 seconds and in most cases, it does not need to be
changed.
Host
Computer
Select the PC Name from the drop-down list. This is the host machine
that will communicate with the newly defined micro in the future and acts
as the micro communication server.
If the Default Hostname computer is in a failover condition, you cannot
re-assign this micro to any other Host computer except the Active Client
that is presently hosting this device.
Badge
Loading
Note that any time a badge that is not in a micro is presented to a
reader, it is reported as unknown and the host sends the badge to the
micro. This happens regardless of the Badge Loading option. The
micros can store only a limited number of badges. Refer to the
"Licensing Secure Perfect" chapter of the Secure Perfect Installation
Guide for capacities. When a previously unknown badge is sent to a
micro whose badge capacity is exceeded, the micro randomly chooses
a badge to delete to make room for the new badge. The badge is
deleted from the micro but not from the Secure Perfect system.
Select Force to force a download of all badges that can possibly gain
access to a reader on the micro.
Select Learn to allow the micro to "learn" the badges as they are
presented. For example, when a badge is presented to a reader and the
micro does not recognize the badge as valid, the micro communicates
with the host to confirm badge validity. If the badge is valid, the
information for that badge is downloaded to the micro; therefore, the
micro will acknowledge this badge as valid the next time the badge is
presented to the reader.
Secure Perfect 6.1.1 User Manual
200
Exit Request
Debounce
Enable this field to increase the sense time on all the Exit DIs (exit
requests). This field is useful if using noisy or chattering contact
interference in which you receive false exit requests.
Send Real
Time Digital
Output
When this checkbox is selected, any digital output change-of-state is
reflected on the Alarm Graphics Viewer, in real-time status. This activity
is also recorded in Digital Ouput History.
Status
Micro Flash and Micro Parameter Configuration
This dialog box displays only if the micro is online. There are three options:
•
View/Edit Parameter Info
Micro Parameter – Direct/Dialup: This option is available for selection of a single micro. When
selected, the Micro Parameter Configuration screen displays and the configuration for the micro is
retrieved, allowing you to edit or change an existing setup such as micro address, IP address change,
or phone number changes. Once saved, the micro will reset and the new changes take effect.
If you change parameter block data through Secure Perfect, any Universal Badge Format (UBF)
data will be erased.
For example: If a M/5-PXN was originally configured as a direct serial micro during installation but
will now be a network micro, select the updated micro type and complete the network information.
Click OK. The micro will accept the changes, reset, then change the host information for this micro.
The Micro Parameter – Direct/Dialup tab allows you to change the connection type of the micro and
its Address, Idle Time, and DI res tolerance.
The Micro Parameter – Networking tab will display only if the system identified your micro as a
network micro and allows you to change the network parameters for the micro.
Micro Parameter – Badge Format: This tab opens to display the custom badge formats that are
currently in the micro. If there are no custom formats, the fields are empty. If a format in the database
does not match what is available in the micro, the window list displays a message ‘Unrecognized
Format.’ To change the badge format:
ꢀ
ꢀ
Magnetic stripe: Select the type of magnetic stripe format from the drop-down list.
to choose and assign to this micro.
ꢀ
Clear formats in micro: Click to clear all custom badge formats from the micro. Badges
associated with those formats will no longer work.
If you change the badge format, any format that existed in the micro previously is replaced.
•
•
Start Flashing Micro(s)
This option will start flashing the selected micro(s) with the latest firmware. A dialog box will display
asking you to verify your request. The flashing process takes approximately two to three minutes; it
varies with amount of data that needs to be transmitted to the micro.
View/Edit Flash Files
Use this option ONLY when it is necessary to selectively flash an older version of firmware on a micro.
The Secure Perfect system automatically selects the latest version by default. The flashing process
takes approximately two to three minutes; it varies with amount of data that needs to be transmitted to
the micro. Click OK to begin the flash. When flashing is complete, the micro resets and requests a
database.
ꢀ
ꢀ
ꢀ
Micro/5 – PX and Micro/PX – 2000: The form opens with the latest .eflfirmware file
displayed. Click the drop-down list to display and select an older firmware file.
Micro/5 – PXN and Micro/PXN – 2000: The form opens with the latest .eflnetwork firmware
file displayed. Click the drop-down list to display and select an older network firmware file.
MicroPXNPlus and MicroPXNPlus2000: The form opens with the latest .eflnetwork
firmware file displayed. Click the drop-down list to display and select an older network firmware
file.
ꢀ
ꢀ
Browse: Click to navigate to another media source or directory where firmware files reside.
Override Block Checking: Ignore this checkbox. This selection is for Customer Support use
only.
Secure Perfect 6.1.1 User Manual
201
Version 4.XX and later mico firmware is able to communicate with a Secure Perfect 6.x host and
continue to send alarm and badge transactions. Upgrading your system can be a seamless operation
without loss of data, time constraints during the micro migration process, or lockdowns during the
database upgrade process. However, in order to take advantage of the new features that are dependant
on the SP 6.x firmware, the ultimate goal is to bring all micros to current level as soon as possible
following the database upgrade.
Micro Utility
Operations Menu
The Micro Utility option opens the Micro Utility Form that allows you to monitor communications, control
the micro, and flash the micro. The shortcut key combination for the Micro Utility Form is CTRL+U.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual
202
Micro Utility Form Shortcut Menu
Reference Topic:
These options also display on the Micro Utility Form Toolbar. Refer to individual icons for additional
details of each function.
Select
Edit
To
Open the Micro Form and edit the settings for the selected micro.
Open the Micro Form and create a new micro.
Change the current state of the selected micro.
New
Set
Offline/Offline
Download
Badges
Reload the badge database records for the selected micro.
Download the micro’s database.
Download
Database
Reset Micro
Reset T&A
Physically reset the micro.
Set the time and attendance status to neutral for all badges in this
micro.
Reset APB
Set the anti-passback status to neutral for all badges in this micro.
Dial that micro immediately.
Dial/Hangup
Micro
Flash Micro(s)
window that allows you to download the latest firmware to the
selected micro.
Version 4.XX and later firmware is able to communicate with a
Secure Perfect 6.0 host and continue to send alarm and badge
transactions. Upgrading your system can be a seamless operation
without loss of data, time constraints during the micro migration
process, or lockdowns during the database upgrade process.
However, in order to take advantage of the new features that are
dependant on the SP 6.0 firmware, the ultimate goal is to bring all
micros to current level as soon as possible following the database
upgrade. Also,
Remove Micro(s)
Search Micros
Select Columns
Remove the micro from the Micro Utility Form window.
Recall Micro
Search
Refills the current form with the last search criteria. This is a toggle
option.
Secure Perfect 6.1.1 User Manual
203
Micro Utility Form Toolbar
For a shortcut menu to functions available within the Micro Utility Form, select a micro from the list
and right-click.
For icon functionality on the Micro Utility Form toolbar:
Click
To
Open the Micro Form and edit the settings for the selected micro.
Open the Micro Form and create a new micro.
Download database to the micro.
select micros that you want to display on the Micro Utility Form.
The first time the form is opened when there is more than 64 micros, a message will
display informing you of the number of micros about to display and ask if you want to
select search criteria.
Mode Labels Tab
Reference Topics:
Parameters Form
Use this tab to change the labels of modes. These labels are used in scheduling. Refer to the Event,
Time, and Mode Schedule Forms.
Mode 1/Mode 2/Mode 3
The default label displays. To change the label, select and enter over the existing text, up to 30
alphanumeric characters.
Secure Perfect 6.1.1 User Manual
204
Mode Schedule
Administration Menu
The Mode Schedule option opens the Mode Schedule Form that allows you to define a mode and assign
the date and time the mode goes into effect.
Mode Schedule Tab
Reference Topic:
Mode Schedule Form
Use this tab to create a mode schedule.
•
Time: The time displays in the format 00:00(hours:minutes). Select and retype over
existing time.
•
Date: Click the arrows to navigate through the months and years until the appropriate month
displays. Click the day on the calendar that this mode will begin.
•
•
Assigned micros: Displays the currently assigned micros for this operator.
micros currently assigned. You must select all micros that this mode change will effect.
From: Select the mode the system must be in for this schedule to occur.
To: Select the mode the system will change to when this schedule occurs.
•
•
Like events, there is no end time associated with a mode. The mode will remain active until changed
by another mode schedule.
Mode schedules created on the Mode Schedule Form will display as schedule options on the Event
Schedule Form and Time Schedule Form.
Also, you can change the label of your modes on the Parameters Form, Mode Labels tab. (You must
restart the Secure Perfect program for any changes to the Parameters Form to take effect.)
Secure Perfect 6.1.1 User Manual
205
Mode Tab
Reference Topics:
Manual Control Form
Select all or individual micros or clients for immediate change of mode.
Example: The change of mode for micros is helpful for an immediate "lockdown" or to open all doors
immediately. The change of mode for clients applies to alarm routing and bumping.
When you select this tab, a windowpane displays a list of available online micros or client groups in your
Element
Description
•
Micros: Select to display real time discription, current mode, and address of
online micros.
Select Display Type
•
Clients: Select to display real time current mode for configured Clients.
From the drop-down list, select one of the available modes to which you want to
change.
Set Mode to
•
The Current Mode status, as displayed in the list, refreshes automatically
following a change of mode (by schedule or manual control).
•
•
Updates for micros display in the Mode column of the Micro Utility Form.
Updates for clients display on the Client Monitor Form.
Apply Mode
Purpose
Click Apply Mode to send the command to the micro or client. Available modes
include Normal, Mode 1, Mode 2, and Mode 3. (Modes are created and
labeled on the Mode Labels tab of the Parameter Form.)
Enter the reason for this change of mode. This box accepts 255 characters. This
comment is written to the operator history file and displays on the Operator
History Report.
Secure Perfect 6.1.1 User Manual
206
Multiple Language Support
Some items you should note about SP’s national language support:
•
•
English is the default language and is always installed.
The Windows operating system should be installed for the specific language chosen for SP. For
example, if running Secure Perfect Spanish, Windows Spanish should be installed.
•
•
Secure Perfect will start in the language of the operating system. For example, if Windows Spanish is
installed, Secure Perfect will start in Spanish.
Initially, there is only one operator provided with the system: an English language operator with the
login ID of secureand a password of master. The very first login to Secure Perfect MUST be done
under this operator. If the operating system is in a language other than English, there will be a slight
delay in bringing up the Secure Perfect main menu since the English help files must be copied into the
main directory.
•
•
the desired language. A combo box on the operator form lists the available languages for the system.
A language must be selected prior to saving the operator’s record.
Multiple language logins are supported without having to restart the application. Log out of Secure
Perfect and log back in as the new operator. (There will be a slight delay in bringing up the Secure
Perfect main menu since the new language help files must be copied to the main directory.) Secure
Perfect along with the Help files will display in that operator’s language.
•
•
•
Any data entry done after the operator’s login will be in the operator’s language. For example, when
adding a micro, all the attached device descriptions will be in the operator’s language.
There are several areas in Secure Perfect that are not translated, such as certain Windows messages
and certain parts of the reporting functions.
If a particular language is not provided by GE Security, the installation will take place in English and
the Secure Perfect application will run in English.
Secure Perfect 6.1.1 User Manual
207
N
Networking
Secure Perfect requires that you set up a network protocol to allow the server and clients to
communicate. Secure Perfect uses the TCP/IP network protocol.
You will need to validate visibility and connectivity to the client and servers by name resolution. (Secure
Perfect uses PC Names only.) The following describes two ways to validate operations:
•
Envoking Ping: Select Start, then Run. At the Open field, type command. A DOS-like window opens.
At the prompt, type ping pcnamewhere pcnameis the name of the PC to which you are validating
visibility and connectivity. If you receive a response of an unknown host, you will need to re-examine
you TCP/IP configuration. If you receive a reply, the client/server is online and available for
connection.
•
Start, Run, PC Name: Select Start, then Run. At the Open field, type //pcnamewhere pcnameis
the name of the PC to which you are validating connection. If the connection is valid, you will see the
shared folders on the remote PC.
If you are using Token Ring and/or TCP/IP, you are encouraged to contact your system administrator
for local requirements and restrictions.
New Icon
Micro Utility Form
New Record
File Menu Item
The New Record menu option creates a new record preloaded with default data. This is the best way to
start or add a new record as the default data often saves you from entering in the data. The New Record
option is available only when a form is open, contains records, and you have been given permission to
update records.
Clicking this icon on the Secure Perfect toolbar can also access this option:
New Template Dialog
Use this dialog box to create a new template. You are prompted to enter the name of the template you
want to create. Keep in mind that any information currently on the report form will be saved under this
name.
Next Pane
View Menu
The Next Pane option moves the cursor between the main form, the tabs, and the search results window,
if there is one.
Secure Perfect 6.1.1 User Manual
208
No Alarms on Alarm Monitor
Go to the Alarm Form and click the Alarm tab. Make sure that the Monitor option is On. Also, check the
schedules. There may be one in effect that does not route certain alarms to the Alarm Monitor Form.
No Floor Tracking
With this method, you define the floors available and define a digital output for each floor. Only digital
outputs (DOs) provided by the 16 DO board can be used. In addition, each DO may be used in only one
elevator and mapped to only one floor. The number of floors is limited by the number of 16 DO boards
that can be placed in the Micro/5-PX; the maximum is 4. Therefore, the maximum number of floors
available is 64 (4 boards x 16 DOs = 64 DOs).
No Readers in List Box
Only readers assigned Active will be displayed in the list box. Go to the Reader Form and click the
Reader tab. Verify that the readers you are using are assigned Active.
Normal Type Reader
Follow the steps below to shunt alarm groups within a micro connected to a normal reader.
1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>
depending on the reader model.
2. Type one of the following:
0 - to turn monitoring off
1 - to turn monitoring on
3. Type the alarm group number (00 to 15) you want shunted.
4. Click the end key which is labeled with either a pound sign (#) or an <x>.
5. Present a valid badge to the reader.
Notes
File Menu Item
The Notes menu option opens a text file, notes.txt,into which you can enter site-specific information.
The program used to edit this file is the program that has been associated with .txtfiles in Windows
(usually Notepad). The notes.txtfile is saved to your desktop by default.
Secure Perfect 6.1.1 User Manual
209
O
Operations Menu Selections
The following selections display in the Operations drop-down menu:
Operator
Administration Menu
The Operator option opens the Operator Form that allows you to set up individuals as users for the
Secure Perfect system and assign the facilities to which they have access.
Operator History
Reports Menu
The Operator History option opens the Operator History Report Form that allows you to create a report
based on the history of operator activity.
Secure Perfect 6.1.1 User Manual
210
Operator Tab
Reference Topics:
Operator Form
Use this form to create operator records that allow individuals to access the Secure Perfect program.
•
•
•
Login ID: Assign and enter a login ID for this operator.
Name: Enter the name of the operator.
Permission: From the drop-down list of previously created permissions, assign a permission to ths
operator.
•
Language: Click the drop-down list to display a list of available languages installed on your system.
Select the language with which this operator accesses and operates the Secure Perfect system.
Secure Perfect Password Authentication
•
Password: Enter the password this operator will use to log in to Secure Perfect. This field accepts a
tab of the Parameter Form.
•
Confirm Password: Enter the password a second time exactly as entered in the Password field.
IMPORTANT: The assigned password cannot match any previous five passwords. Operator login
passwords are case sensitive. Because it is difficult to retrieve, it is important for operators to
remember their assigned password or write it down and store in a safe place.
•
Permission to Change Password: If this check box is selected, the operator indicated in this record
has the option to change the login password. If this checkbox is clear, the option to change the login
password is unavailable to this operator.
Expiration
•
Password never expires: If selected, the password assigned to the current operator will never expire.
If this checkbox is not selected, the two remaining fields are available.
•
Expires in (days): This field is not available if Password never expires is selected. From the drop-
down list of available time periods, select number of days that will pass before the password assigned
to the current operator expires. The selections are 30, 60, 90, 120, or 180 days.
•
Warn prior to expiration (days): This field is not available if Password never expires is selected.
Enter or select the number of days before the expiration of the operator’s password that a warning
message displays, indicating that the assigned operator password is about to expire. The number of
days in this field must be less than the number of days selected in the Expires in (days) field.
When this option is selected, a message displays when logging in to Secure Perfect, informing the
operator of the number of days until the password expiration is valid.
- Select Yes to change the password immediately.
- Select No to continue using Secure Perfect and change the password at a later time.
- If the password has expired, the operator can no longer log on.
- If the operator does not have permission to change the password, the operator is instructed to
contact the SP Administrator to change the password. These warnings are logged as operator history
transactions and can be retrieved by running a report on operator actions, using the System Operator
Secure Perfect 6.1.1 User Manual
211
Active Directory Password Authentication
If this option is available, Secure Perfect Password Authentication options will not be available. The
Active Directory domain controller authenticates this operator name and password. (The operator added
to Secure Perfect must be a valid operator in the domain computer.) The next time this operator logs in to
Secure Perfect, for this feature, the user must log in to the domain when logging into the computer, for
access to the Secure Perfect system. (The user cannot log in to the local computer; the user will log in to
the Domain.) Secure Perfect validates the user login ID and password against the specified Active
Directory, and not the Secure Perfect database. This authentication overrides any password parameters
entered through Secure Perfect.
• Browse: Click to display a list of Active Directory Domain Controller Servers. Select the Domain
Controller Server computer that will authenticathe the Secure Perfect operator, and controls the
users, passwords, and the Secure Perfect sytem to which you are assigning this operator. The
selected Server computer will authenticate this operator name and password. The selected Server
name now displays in this field.
Override
Administration Menu
The Override option opens the Override Form that allows an operator to configure persons and particular
readers for override, and generate Anti-Passback and Time and Attendance transactions that can be
added to history or archive databases.
Override Tab
Use this tab to set up the badge transaction that you want to enter into history.
Person: Select a person from the drop-down list.
Badge: Select a badge from the drop-down list of badges currently in the database.
The current time and date are displayed by default.
•
•
•
Time: Enter a time.
Date: Use the Calendar button to enter a date.
Reader Type: Select a reader type.
Reader: Select a reader from the drop-down list of available readers for assignment by the current
operator.
Update Micro: Enable this field if you want to send this transaction to the micro.
Database Selection:
Generate: Click this button to enter the transaction into history. Select either Secure Perfect History
database or Secure Perfect Archive database.
Secure Perfect 6.1.1 User Manual
212
P
Parameters
Administration Menu
The Parameters option opens the Parameters Form that allows you to establish settings for your entire
Secure Perfect system such as archive intervals and appropriate modems.
Password Tab - Parameter Form
Parameter Form
This tab allows you to select the parameters for passwords used on the Secure Perfect system.
•
•
•
•
•
Minimum Length (characters): This field accepts 1 to 20 characters.
Cannot begin with a numeric character
Cannot end with a numeric character
Must be mixed case (contain both upper and lower case characters)
Must contain both alpha and numeric characters: If selected, this option enables the Minimum numeric
characters contol field.
•
Minimum numeric characters: The range for this selection is 1 to 19 characters with at least 1 alpha
character.
If the current operator has permission to change their password, the parameters selected here display in
Pause Button
This option pauses or suspends the scrolling of badge transactions on the Activity Monitor Form.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
PDF Files and Adobe Acrobat Reader
Portable Document Files (PDFs) are read-only electronic versions of printed documents. The Secure
Perfect documents are in PDF format and included on a separate document CD.
Adobe Acrobat Reader is required to view these documents. It is also included on the CD. If you do not
already have Adobe Acrobat Reader installed, follow the steps below:
1. Copy the file ar500enu.exefrom CD-ROM onto your hard drive.
2. Navigate to Windows Explorer and double-click ar500enu.exe.
3. Follow the on-screen installation instructions.
To view the PDF file, double-click the file name or start Adobe Acrobat Reader and open the document
you want to view. For additional information, refer to Adobe Acrobat Reader online Help.
Secure Perfect 6.1.1 User Manual
213
People Assignment
This window displays a list of Person Records with an e-mail address in the Secure Perfect system. Only
person records in the operators’ facilities are available for assignment by this operator.
•
•
Select, then click the right arrow to assign an available person.
Select, then click the left arrow to unassign a person.
Permission
Administration Menu
The Permissions option opens the Permission Form that allows you to set access or right to use various
forms within your Secure Perfect system.
Permission Tab
Assigning a Level of Permission.
The forms in Secure Perfect will display an icon in the left corner indicating the permissions assigned
to this operator. The form icons correspond to the icons and permissions assigned here.
The information in Forms windowpane can be viewed one of two ways.
Forms
1. If a + displays to the left of the form name, then additional items are available. Click + to display
additional forms. You can also double-click the Forms: menu item to view the additional forms.
2. Right-click on the windowpane to display the shortcut menu with these options.
ꢀ
Show by Action lists the actions (None, Read, Update, All) followed by the forms assigned to
them.
ꢀ
Operator displays the Operator Form, which shows permissions assigned to existing
operators.
Actions
Four types of actions can be assigned:
None means that no access is given to that form.
Read means that read only access is given. The form and the associated records can be viewed
but not modified.
Update means that the records on that form can be viewed and modified.
All means that the records on that form can be viewed, modified and deleted.
Mixed is not an action to be assigned. It is used only on this form to signal that any forms beneath
a general title have different actions assigned.
Secure Perfect 6.1.1 User Manual
214
Example:
If you want an operator to monitor alarm and badge activity, select the Operation Forms, then set the
following actions:
•
•
•
Select Activity Monitor, then select Read.
Select Alarm Monitor, then select the action Read.
Select Manual Control, then select Update. (Selecting Update for Manual Control allows the
operator to manually change the DO state.)
•
Select Digital Output Status, then select Read.
On the Personnel Forms, set up actions to allow the new permission to add persons and badges into the
database.
•
•
Select Person, then select Update
Select Badge, then select Update.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Person
Personnel Menu
The Person option displays the Person Form that allows you to enter a person record into the system.
You will enter information such as the name and address, assign access rights for access control, assign
a department or user fields, and capture a photo. The shortcut key combination for Person Form is
CTRL+P.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Person
Reports Menu
The Person option displays the Person Report Form that allows you to create a report on the people in
the database.
Person Selection Tab
Alarm Notifier Form
The Person Selection tab allows you to assign people available in this operators’ facility that will receive
an e-mail notification of the alarm/reset condition.
Assigned People:
that will receive an e-mail alarm notification.
Only those with an e-mail address in their Person Record will display in the People Assignment list for
assignment to an alarm notification.
Click OK and the selected people names will display in the Assigned People windowpane of the Person
Selection window.
Save the new or modified Alarm Notifier record before you exit the form.
Secure Perfect 6.1.1 User Manual
215
Personnel Tab
Reference Topic:
Person Form
Create a record of an employee’s personal information.
Only Last Name, Personnel Type, and Employee Number are required fields.
Field
Action
First name
Enter the first name of the person.
Enter the middle name of the person
Enter an additional name, such as another middle name, of the person.
Middle name 1
Middle name 2
Initials, as displayed in the list box on the right, are the result of the
first letter of the First name and the first letter of each Middle name
entered.
Employee number
Enter a number assigned to and identifying this employee such as the
employee’s social security number. This is a required field and the
record will not save if the Empoyee number is left blank or if the number
is not unique to Secure Perfect. The field accepts up to 12 alphanumeric
characters.
CONVERSIONS ONLY: During the process of converting a
database, the system checks for possible blank or duplicate employee
numbers in the database. Results of this check display on the
Administration menu, Parameter Form. Open the form to display the
Settings tab:
•
If the Enable unique & required Employee Number check box is
selected and unavailable, all converted Person records have unique
employee numbers. All future Person records must have a unique
employee number before the record can be saved.
•
If the Enable unique & required Employee Number check box is NOT
selected, this is an indication that duplicate or blank employee
number records exist in the database.
At this time, you have the option to choose one of two preferences:
ꢀ
Do nothing and continue to allow blank or duplicate employee
numbers in Person records (the Enable unique & required
Emplyee Number check box remains clear).
OR
ꢀ
Set a control that requires all Person records to have an entry in
the Employee number field.
If you choose to require all Person records to have a unique
employee number, select Enable unique & required Employee
Number.
1. A message displays informing you: The Employee number
field on the Person Form will be required and unique. Once
this is enabled, it cannot be changed back. Do you want to
continue with this change? Click Yes.
2. A second message displays: Could not enable unique and
required Employee number. Duplicates already exist or field
is empty in the database. Refer to the Diagnostic Logfile.
Secure Perfect 6.1.1 User Manual
217
3. Navigate to the logfile. A message informs you that Secure
Perfect generated a text file and placed the file in the Logsfolder
of the Secure Perfect Server. Navigate to
SecurePerfect\Logs\ DuplicateEmployeeNumbers.txt
file, consult the list of duplicate or blank employee numbers,
locate those Person records, and assign a unique employee
number to each.
4. When all records on the .txtfile list have a unique employee
number, return to the Parameter Form, select the Enable unique
& required Employee Number check box, and Save. If you
cannot save and again receive additional messages, you must
repeat the steps above.
5. The selection to require all Person records to have a unique
employee number cannot be reversed and all newly added
Person records must have a unique employee number.
Personnel type
Department
Select the appropriate personnel type from the drop-down list.
Select the appropriate department from the drop-down list.
Trace activity
Select to enable this field if you want a record of all activity on this
badge. Each time this badge is used, a message displays on the Activity
Monitor and a record is written to the history database. If the system has
a printer association, the message is printed. This field overrides the
routing of activity as defined on the Reader Form.
We do not recommend activating the trace function at a site that
uses dial-up micros. A micro will dial the host whenever a traced badge
is read. This may incur additional telephone costs.
Extended Unlock
Time
Select to enable this field. This person is now allowed extra time to gain
access to an entry or exit point in the Secure Perfect system. A popup
message asks you if you want to change all associated Badge records
to follow Extended Unlock Time. If you select Yes, all badges for that
person are changed to Follow Extended Unlock Time, as configured on
Example: An extended time limit can be configured for an employee
who enters a motorized door by wheelchair.
Find and Assign
Badge
Click to find the next badge presented to a selected reader. Select any
active reader. If the badge is not in Secure Perfect, you can add it. This
is a convenient way to assign badges.
Personnel Type
Personnel Menu
The Personnel Type option opens the Personnel Type Form that allows you to create groupings of
employees and assign a badge design to the personnel type.
Secure Perfect 6.1.1 User Manual
218
Personnel Type Tab
Personnel Type Form
Use this form to create personnel types and assign a default badge design to each personnel type. Click
Search to display a list of existing types. Three personnel types come standard with SP: Permanent,
Contractor, and Temporary. Click Add to create additional types of your own.
Description
Enter a basic description of the personnel type.
Badge Design
Select a default badge design from the drop-down list of available designs. The design you select will
print whenever badges are sent to the printer for people assigned the current personnel type.
Badge designs are created on the Badge Design Form. If you do not want the badge to imprint the
default design, the design can be changed when the badge is printed.
Secure Perfect 6.1.1 User Manual
219
Photo Tab
Reference Topic:
Person Form
This tab allows you to capture images, assign badge design layouts, and print badges.
Field
Action
Photo
If there is a photo associated with this person
record, it will display here.
Taken
Date this photo was captured.
Capture
Image/Signature
Click to run the Capture program, allowing you to
capture an image or signature of this person.
Badge
Displays the Descriptions of badges assigned to this
person, as assigned on the Badge Form.
If a printer is configured for your system, you can
select a badge to print.
Badge Design
Print
Displays the name of the current badge design.
Click the drop-down list to select a different badge
design.
If there is a printer configured for your Secure
Perfect system, click to print a badge for this
person.
Signature
If there is a signature capture associated with this
person record, it will display here.
Point Assignment Dialog Box
This window displays when you click
points to a tour.
, enabling you to select and assign tour
•
•
•
Select, and then click the right arrow to assign an available point.
Select, and then click the left arrow to unassign a point.
A DI start point can exist in only one tour; therefore, any DIs previously assigned as Start
Tour Point in any tour, will not display in the list. The DI point cannot be re-used.
Tour points can be readers or DIs that are not on a dial-up micro:
1) If a reader is selected as the start point, DIs not assigned to a tour, display in this list.
2) DI points can only be assigned to one tour.
•
•
3) Reader tour points can be assigned to any tour and any number of tours. A reader as a
tour point can be re-used.
•
•
•
The number of points assigned to a tour is limited to 64.
If any reader is assigned as a tour point, at least one badge must be assigned to the tour.
If all tour points are DIs, you do not need to assign a badge to the tour.
Click OK to display the results in the Tour Points windowpane.
Secure Perfect 6.1.1 User Manual
220
Port Settings Tab
Micro Form
This tab displays only when you are configuring a micro type as direct-connect, network, network +
direct, or network + network micro type. Refer to the Connection type figure below:
Direct Configuration
COM port:
You will be able to change this setting ONLY if the micro connection type is direct-connect or network +
direct. Otherwise, this field is unavailable. From the drop-down list, select the COM port to which this
micro is connected. The system operates with the default setting of None if no port is designated.
NETWORK CONFIGURATION
Primary Network (you must complete ONE of the following two selections):
These fields are available ONLY if the micro is other than a direct-connect or dial-up micro.
IP Address: Select this option and then enter the IP address for network configuration.
Network Name: Select this option and then enter the network name for the micro that hosts this micro.
Secondary Network (you must complete ONE of the following two selections):
IP Address: Select this option and then enter the secondary IP address assigned for network + network
communications.
Network Name: Select this option and then enter the secondary network name for the micro that hosts
this micro.
Preset/Camera Selection
Select or change an already defined camera from the drop-down list, then select or change a Preset from
the Preset drop-down list. Click OK to display in the results in the Assigned Preset/Camera windowpane.
Secure Perfect 6.1.1 User Manual
221
Preset/Camera Tab
Event Trigger Form
This window enables you to assign camera(s) and their associated presets with an event. Up to four
cameras can be assigned per event trigger.
•
•
•
Preset and Camera combination associated with this Event. This option is disabled if there
are no existing records.
Click Add to select a camera and corresponding preset. The available presets for a camera
display after you select the camera. Click OK. The addition now displays in the Assigned
Preset/Camera box.
Select then click Remove to remove a Preset and Camera combination from the list of
available combinations in the Assigned Preset/Camera box. This option is disabled if there
are no existing records.
Presets Tab
Camera Form
This tab is unavailable for fixed cameras. Presets are assignable to PTZ cameras only. Assign predefined
presets for the selected camera.
The Presets tab allows you to assign previously defined presets to a camera. (Presets must first be
defined on the Camera Preset Form.) Presets are assignable to only the PTZ cameras types.
Assigned Presets:
This windowpane displays a list of already assigned presets.
Assign Camera Presets: Click this button to display the Camera Preset Assignment dialog box. A list of
available camera presets displays, enabling you to select and assign or unassign one or more presets for
the selected camera.
When the Camera Preset Assignment form closes, the selected presets display in the Assigned Presets
windowpane. Click Save to save the selections.
Print Preview Report
File Menu
The Print Preview Report option allows you to preview before printing and is available only when a
Report Form is displaying. Following completion of all tabs and options on the Report Form, click to
preview a copy of your report. A printer must be added to your Secure Perfect system in order for this
feature to be available.
On the Preview Report screen, the Total: field represents the number of records in the database and
not the number of records that matched your search criteria. The zoom % value will always read 100%
regardless of the zoom used.
Clicking this icon from the Secure Perfect toolbar can also access the option:
Print Report
File Menu
The Print Report option allows you to send the current report to a defined printer. This option is available
only when a Report Form or Report is displaying.
Secure Perfect 6.1.1 User Manual
222
Print Setup
Reference Topics:
File Menu
Select Print Setup to open the Print Setup Window, allowing you to select your printer, printer properties,
paper source, and orientation.
Print Setup
Select an available printer from the drop-down list and set properties.
Select paper size and source.
Select orientation as portrait or landscape.
If you are connecting to a network printer, click Network to navigate to the printer.
Secure Perfect 6.1.1 User Manual
223
R
Read and Keypad-Type Reader
Only reader board door inputs and 20DI board input points can be shunted from a keypad. (To
identify a reader board door input, look for a default description that follows this format: 0001-1-01
Reader. To identify a 20DI board input point, look for a default description that follows this format: 0001-
1-01 DI.)
Follow the steps below to shunt alarm groups within a micro connected to a keypad and badge reader:
1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>
depending on the reader model.
2. Type one of the following:
0 - to turn monitoring off
1 - to turn monitoring on
3. Type the alarm group number (00 to 15) you want shunted.
4. Click the end key that is labeled with either a pound sign (#) or an <x>.
5. Present a valid badge to the reader.
6. Click the start key on the keypad again.
7. Type your Personal Identification Number (PIN) on the keypad.
8. Click the end key (<#> or <x>).
Reader
Device Menu
The Reader option opens the Reader Form that allows you to modify records that are automatically
generated when you define a micro as well as configure door functions, routing, schedules, and events.
Reader Access
Reports Menu
The Reader Access option opens the Reader Access Report Form that allows you to create a report
based on persons in the Secure Perfect system that have access to any of the specified readers.
Reader Assignment
This window displays when you click Assign or Assign Readers, enabling you to select and assign a
reader association. Only readers in the operators’ facilities are available for assignment by this operator.
•
•
Select, and then click the right arrow to assign an available reader.
Select, and then click the left arrow to unassign a reader.
Click OK to display results in the Assigned Readers windowpane.
Secure Perfect 6.1.1 User Manual
224
Reader Board Records Generation
The reader boards listed in the Boards column on the Micro Configuration tab depend on the Micro Type
you selected on the Micro Definition tab of the Micro Form. When you add a reader board (2RP, 2SRP),
certain records are automatically created:
Reader records:
•
If adding a 2RP or 2SRP board, two reader records are generated. By default, these readers
are active and able to accept badge transactions. Readers marked as Active count against
your reader limit.
Alarm records:
•
An alarm record is generated for each reader record. If you selected Supervised when you
added the board, an additional alarm record is generated for each reader called Supervised
Reader. If you are adding a 2SRP board, you will receive an additional alarm record for each
reader called Supervised Exit.
•
•
None of these alarms are monitored. If you want them to display on the Alarm Monitor when
the alarm is triggered, you will need to go to the Alarm Form, Alarm Tab and enable Monitor
in the Settings section.
In addition, all alarms are automatically assigned to Alarm Group 0. To change this, go to the
Alarm Group Form.
Digital input records:
•
A digital input record is generated for each reader record.
Digital output records:
•
If you added a 2RP or 2SRP board, a digital output record called Aux DO is generated for
each reader record. (There are 2 DO relays available on a 2RP board.)
Reader Button
This option displays a reader assignment dialog box allowing you to configure readers to be used with the
Swipe and Show program. If Imaging is not licensed for the system, this option is not available.
•
•
Select, and then click the right arrow to assign an available reader.
Select, and then click the left arrow to unassign a reader.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
Secure Perfect 6.1.1 User Manual
225
Reader/Digital Output Tab
Manual Control Form
Manually lock or unlock doors and turn on or off DO (digital output) points, depending on the current
Schedules override manual changes unless Indefinite Unlock has been selected. Micros will always
run schedules defined previously in its database. Therefore, if there was a schedule set to be in effect at
the current time, the manual change would be overridden and the schedule would be enforced.
Select micro
A micro must be selected before the system searches and displays results in the list box.
•
•
All displays all the digital outputs of the type selected in the field Select DO type, found on all micros.
By Micro displays all the digital outputs of the type selected in the field Select DO type, found on a
selected micro. Click the drop-down list to display a list of micros.
Select DO type
•
•
If you select Reader, the windowpane displays the DO points available for the readers.
If you select Other, the windowpane displays Aux DOs (the two 2 DO relays available on a 2RP
board) and other DO points. Example DO points include lights, sirens, and door strikes that may be
connected to the micro.
Columns in Windowpane
•
•
•
Description: Description of the reader/DO in the database.
Micro: Micro on which the reader/DO is located.
On Time: Displays the On Time in the database. The On Time is the number of seconds this DO
remains in the active state when activated.
Set state to:
The names of the buttons change depending on the DO type (Reader or Other) selected.
If Reader is selected, click. . .
•
•
•
Duration Unlock: To unlock the selected door for the time specified in the On Time column.
Lock: To immediately lock the selected door.
Indefinite Unlock: To unlock the selected door. It will remain unlocked until you manually lock it by
clicking lock.
•
Sched. Override: To change the state of a door or DO, if you want a schedule to override its setting.
Example: Use Sched. Override to unlock a door if you want a schedule at a later time to lock this door.
If you don’t want the scheduler to lock your door, use the Indefinite Unlock selection.
If Other is selected, click. . .
•
•
•
On For Duration: Activates the selected DO for the time specified in the On Time column.
Off: Immediately deactivates the selected DO.
On Indefinite: Activates the selected DO, which will remain active until you manually turn it off by
clicking Off.
•
Sched. Override: Use this option to change the state of a DO if you want a schedule to override its
setting.
Purpose
Enter an explanation for locking/unlocking doors or activating/deactivating DO points. This field accepts
255 alphanumeric characters. These comments are written to the operator history file and display on the
Operator History Report, Purpose Field.
Secure Perfect 6.1.1 User Manual
226
Reader Tab
Reference Topics:
Reader Form
This tab contains the basic information about the reader.
Element
Micro
Description
This is a read-only field. The description of the micro that controls this reader.
Board
This is a read-only field. The default description is in the format: mmmm-b Board
Typewhere mmmmrepresents the micro number to which this reader is associated, b
represents the board number, and Board Typerepresents the reader board.
For example, 0001—1 8RPwould be the reader on micro one, 8RP board one.
Number
Model
This is a read-only field. The number of the reader (For a Micro/5-PX: 1 to 16; for a
Micro/PX-2000: 1 to 4). The number corresponds to where the reader is connected on
the micro. See the Micro/5 Installation Guide or Micro/PX-2000 and Micro/PXN-2000
Installation Guide for more information.
There are three options; select:
•
•
•
CASI-RUSCO Supervised if using a CASI-RUSCO supervised reader such as the
94x or 97x series proximity readers set for supervised F/2F.
CASI-RUSCO 440/445 if using a CASI-RUSCO Model 440, Model 445, or Model
910.
Other if using a reader that does not fit into the above categories.
Status
Online: This field is automatically enabled when this reader record is created. An
online reader will accept a valid card read and unlock a door, provided it is one of the
licensed active readers. You also have the option to schedule a reader off-line. When
the reader is off-line, the reader will not accept valid card reads, will not unlock a door,
and transactions display on the Activity Monitor as Invalid.
Active: This field is automatically selected and allows the accepting of badge
transactions when this reader record is created. The number of active readers counts
against your reader limit, as defined by your software license. For example, if your
license key allows the use of 64 readers, you may have only 64 readers marked as
Active.
Physical
type
Normal: This reader requires only a valid badge to gain access.
Badge and Keypad: This reader requires a valid badge and a valid number (PIN)
entered on the keypad to gain access.
Badge or Keypad: This reader requires you to enter either a valid badge number on
the keypad or a valid badge to gain access.
Logical type
•
•
Normal: Allows as many successive accesses as needed, as long as the badge
is valid.
APB in: Anti-passback in. This type of reader (which gives an IN status) is used
to enter an area. This reader will not release a door a second time until that
badge is presented to an APB out reader connected to the same micro or, if you
selected Enable global APB on the Settings Tab of the Parameters Form, a
different micro. All micros are updated.
•
APB out: Anti-passback out. This type of reader (which gives an OUT status) is
used to leave an area. This reader will not release a door a second time until that
badge is presented to an APB in reader connected to the same micro or, if you
selected Enable global APB on the Settings Tab of the Parameters Form, a
different micro. All micros are updated.
Secure Perfect Global Edition: You must configure this reader as APB if you
plan to include this reader in a Region APB configuration. Only designated APB
Secure Perfect 6.1.1 User Manual
227
•
•
•
T&A in: Time & Attendance in. This type of reader (which gives an IN status) is
used to enter an area. This reader will not release a door a second time until that
badge is presented to a T&A out reader connected to the same micro or, if you
selected Enable global T&A on the Settings Tab of the Parameters Form, a
different micro.
T&A out: Time & Attendance out. This type of reader (which gives an OUT status)
is used to leave an area. This reader will not release a door a second time until
that badge is presented to a T&A in reader connected to the same micro or, if you
selected Enable global T&A on the Settings Tab of the Parameters Form, a
different micro.
In required: This type of reader will open the door only if the badge presented
currently has an IN status. For example, if you had a badge with a status of OUT
and attempted to gain access through a reader that was marked as In required,
the door would not open.
•
•
Elevator: This type of reader is used for elevator control. This is set up using the
Elevator Tab of the Elevator Form.
T&A In/Out: Time & Attendance In/Out. This type of reader is used ONLY for
Wiegand Swipe Readers, such as the Model 100.
To get an IN status, hold the badge so that the front of the badge is facing you.
(The logo is usually printed on the front of the badge.) Then swipe the badge
through the reader.
To get an OUT status, turn the badge around so that the back of the badge is
now facing you. Swipe the badge through the reader.
•
and attendance (T&A) reader, enable this field for the reader to function as a
Normal type reader thereby allowing any valid badge to unlock the door
regardless of the badge’s IN/OUT status. However, the badge’s status will still be
logged as IN or OUT according to the reader used and will be recorded as such
in the badge history. Use this if you want to record APB or T&A without
preventing unauthorized persons from accessing doors.
APB and
T&A
Settings
Example: Timing begins when a badge is presented to an IN reader. Until that
time expires, the user cannot enter again regardless whether they went through
an OUT reader. If a user tries to go through the IN reader a second time, the
micro sends an invalid Timed APB message to the host.
Timed APB (min): This field is enabled when you select a Logical type as ‘APB
in.’ The default of this field is ‘0.’ Enter a number between 0 and 255.
•
Max Invalid PIN Count: 1) Select this checkbox if you want your Secure Perfect
system to suspend badges after an invalid PIN is entered and a badge is
presented at a reader a configured number of times. 2) Then, enter a number
between 1 and 6 as the number of times an invalid PIN code is entered at a
system reader before the badge is suspended. The default of this field is ‘3.’ 3) If
suspended, the badge must be changed to active by a system administrator.
Keypad PIN
If the Parameter Form is set to grant access on duress, access will be granted
and the badge transaction will display as Valid Duress. If the Parameter Form is not
set to grant access on duress, the door will not open and the transaction will be
Invalid Duress. If set to monitor, an alarm will be generated in both instances.
Enable
‘Valid No
Passage’
Select this checkbox if you want your Secure Perfect system to notify you when a
valid badge read occurs but the door did not open within the configured unlock time.
This may be an indication of someone deciding not to pass through the door, or an
accidental read as someone passes a reader.
•
This feature must be associated with an alarm type of door forced or door held in
order to be notified of a change in state of the door.
configured.
•
Secure Perfect 6.1.1 User Manual
228
Reader Type Events Tab
Reader Form
Use this tab to select the events that will be used to determine when a reader will be used as a Normal,
Badge/Keypad, or Keypad reader.
Events define start time(s) and day(s) only. There is no end associated with an event. Therefore, that
event will stay in effect until another event changes it or you change it manually.
•
•
•
Normal: Select an event from the drop-down list. This reader will then be used as a Normal
reader beginning at the time and day given by the event.
Badge/keypad: Select an event from the drop-down list. This reader will then be used as a
Badge/keypad reader beginning at the time and day given by the event.
Keypad: Select an event from the drop-down list. This reader will then be used as a Keypad
reader beginning at the time and day given by the event.
Readers Tab
Reference Topic:
Event Trigger Form
Select reader(s) and transaction type(s) that will become the source for initiating the Event Trigger.
Assigned Readers:
This pane displays readers assigned to this Event Trigger record.
Element
Description
Assign
Readers
select and assign a reader to this Event Trigger.
Transactions
trigger an event.
Valid
Invalid
Unknown
Lost
Tag Selection
Select one of the Tag options.
None (No tag is sent to the DVR for marking recorded video or
manipulating record rate.)
Tag only (A tag is sent to the DVR for marking recorded video at
the camera(s) current record rate.)
Tag as event (A tag is sent to the DVR for marking recorded
video and for changing the camera(s) record rate to its event
record rate settings.)
Secure Perfect 6.1.1 User Manual
229
Readers Tab - Reports
Reader Access Report or Roll Call Report
Use this tab to select specific readers that will form the basis of information for this report.
This windowpane displays the list of readers that currently apply to this report. If there are no readers
listed, click Edit to display a Reader Assignment dialog box, allowing you to select and add readers.
Readers Tab - Time and Attendance History Report Form
Use this tab to select the readers you would like to use for this report. The windowpane displays the list of
readers that currently apply to this report. If there are no readers listed, click Edit to display the Reader
Assignment dialog that allows you to add readers.
Recall Search
Search Menu
The Recall Search option refills the current form with the last search criteria data. Use this option when
you want to recall the last search criteria. The option does not conduct a search or affect any data in the
database. The Recall Search option is available only when a form that contains records is open.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Recorded Video Currently Being Accessed
When attempting to retrieve a recorded video event from SP, you may receive this message. You will not
be able to access recorded video events while the DVR is currently serving another request for playback.
Records Generation
Reference Topics:
You can configure your micro record to match the micro’s physical board configuration. Only those
records that are needed are configured. Refer to the Reference Topics for details and lists of records
generated when the board/micro is added:
Secure Perfect 6.1.1 User Manual
230
Region
Reference Topic:
Administration Menu
The Region option opens the Region Form that allows you to assign synchronization intervals for your
Global Edition database replication.
This option is unavailable if you are not licensed for Global Edition software.
Region Form Tab
Region Form
Use this tab to identify a Global Database Server or Regional Database Server, and configure
synchronization intervals. This tab also contains the licensing information about the Region.
Global Server
If the selected server name:
•
Is a Global Database Server, a Yes displays in the Global Server field. Synchronization
interval fields are unavailable for input. You can assign synchronization intervals on Regional
Database Servers only.
•
Is a Regional Database Server, a No displays in the Global Server field. Synchronization
interval fields are available for input.
ꢀ
ꢀ
The synchronization processing time is dependent on how much data needs to be
synchronized and the performance of your system.
Using Windows, we recommend that you synchronize time settings on the computers within
your Secure Perfect Global Edition system.
SP Database Synchronization Interval (min):
This database contains configuration data relating to badges and micros. The default and minium number
of minutes for synchronization of this database is every five minutes. The maximum number of minutes is
1440 (once per day).
SP History Database Synchronization Interval (min):
This database contains current history including badge transactions and operator history. The default and
minimum number of minutes for synchronization of this database is every five minutes. The maximum
number of minutes is 1440 (once per day).
REMINDER: A subscription is a request for a copy of data or database objects to be replicated. It
defines what publication will be received, where, and when. The time that it takes to complete this
process of replication and synchronization is dependent on the amount of data needed to be
synchronized.
License Info:
This list informs the operator of the current licensing capabilities of the selected Region.
Example: This information is helpful to an operator when attempting to add an additional feature to a
Region. A message may display, informing the operator that addition of the feature is in excess of the
license limit for that Region. The operator consults this form to review the license capabilities. If limits for
that feature have been reached, additional devices cannot be added at this time.
Secure Perfect 6.1.1 User Manual
231
Remove All Button
Alarm Monitor Form Toolbar
Click this icon on the toolbar to remove all alarms on the Alarm Monitor regardless of whether the alarms
are acknowledged or unacknowledged. An operator must have an ALL permission for the Alarm Monitor
in order to have access to this icon.
Remove Individual Button
Alarm Monitor Form Toolbar
Click this icon on the toolbar to remove one or more alarms without waiting for them to reset. The
alarm(s) can be unacknowledged and cleared as long as it was not defined on the Alarm Form as
requiring an acknowledgment. Select a series of alarms in sequence or individual alarms not in
sequence.
Replication and Synchronization Conflicts
Conflicts with Secure Perfect replication are rare but can occur. A conflict occurs whenever two users in
different regions simultaneously update a field on an individual record; or update a record at a Global
Database Server computer and a Regional Database Server computer during synchronization.
For example:
Region 1 revises an address from 4444 SW 8th St to 5544 SW 8th St.
Region 2 revises an address from 4444 SW 8th St to 6544 SW 8th St.
There are now two different values in the same field of the same records in two different regions. Each
region’s scheduled SQL Server Merge Agent will activate the merge process and the changes will be
sent to the Global Server.
•
If both updates arrive at the Global Server during the same synchronization process, the SQL
Server will detect which update arrived first and that update will be successful.
If the update at Region Two arrived before the update at Region One during the same
synchronization process, then Region Two’s update will be successful. The address will be
updated to 6544 SW 8th Street on both Region One and Region Two. Keep in mind that
conflicts can only occur during the same synchronization process.
•
•
When the Global Server and Regional Server are connected and synchronization occurs, the
SQL Server Merge Agent detects conflicts and then determines which data will be accepted
and propagated to other sites based on the first record to successfully reach the Global
Server.
1. The synchronization processing time is dependent on how much data needs to be
synchronized and the performance of your system.
2. Using Windows, we recommend that you synchronize time settings on the computers within
your Secure Perfect Global Edition system.
3. When re-assigning devices such as micros or DVRs across regions, you must stop and
restart services, first on the original owner of the devices and then on the computer to which
the devices are newly assigned. You must allow sufficient time for data replication to
complete across all affected regions before restarting services on the newly assigned
computer. Verify that devices are online and operable following the re-assignment.
Secure Perfect 6.1.1 User Manual
232
Report Templates Window
Click the Show me icon to view a step-by-step animated demo.
A list box displays a list of available templates. To use, select the desired template and do one of the
following:
Close
Click to close this window without taking any action.
Save As
Select a template, and then click to save with a new name. A dialog box displays, enabling you to enter a
name for the new template.
Save
Select a template and click to save any changes made to the template parameters. An update message
will display.
Remove
Select a template, and then click to delete it from the list. A Delete Template dialog box displays to
confirm you choice and the template is deleted.
Make Default
Select a template, and then click to automatically load this template whenever this form is opened. A
Default Template confirmation message displays.
Secure Perfect 6.1.1 User Manual
233
Reports Menu Selections
The following selections display on the Reports drop-down menu:
Reset Micro
This causes the micro to empty its database and stored history. When the reset is complete, the micro
will request a new database and, if it is configured for forced badge downloading, the micro will also
receive a new badge database.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Response
Administration Menu
The Response option opens the Alarm Response Form that allows you to create a list of frequently used,
predefined responses to an alarm, and prevents the need of retyping an equivalent entry. The response
entries that you create will display on the Alarm Monitor Form.
Secure Perfect 6.1.1 User Manual
234
Restoring Secure Perfect Databases
Complete instructions for Restore functions are detailed in the Secure Perfect Installation Guide.
Restoring your databases depends on your system and how you performed your backups. The following
demonstrations are examples only.
Secure Perfect Enterprise Edition:
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect Professional or eZ Edition:
If you have a backup of Secure Perfect databases, the data can be restored using the SP Maintenance
Utility.
Click the Show me icon to view a step-by-step animated demo.
Resume Button
This icon will be active only if you clicked Pause. All badge transactions that occurred while the Pause
option was on will be displayed, once you select resume.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
Return Date Filter Tab
Badge Report
Use this tab to generate a report based on the return date of the badges.
•
Do not filter badges by return date: Select this field if you do not want to use the expiration
date as a method of filtering the report information. This is equivalent to running a report on
badges for all return dates.
•
Filter badges using this return date range: Select this field if you do want to use the return
date as a method of filtering the report information. If this is selected, you must select a
starting and ending date.
•
•
Starting date: Click the start date you want for the starting range of badge return dates.
Ending date: Click the ending date you want for the ending range of badge return dates.
Roll Call
Reports Menu
The Roll Call option opens the Roll Call Report Form that allows you to create a report based on
parameters selected for people who last entered a facility by way of a specified reader.
Secure Perfect 6.1.1 User Manual
235
Routing Schedule Tab
Reference Topic:
Reader Form
Use this tab to select the schedules that will be used to determine when valid transactions will be sent to
the history file, monitor, and/or printer. Time schedules define intervals which include a start AND an end
time for different days of the week and modes. At the start of the schedule, the routing of the transactions
changes to the scheduled value. At the end of the schedule, the routing of the transactions returns to the
nonscheduled value. For example, if valid transactions are scheduled to route to history, the transactions
will stop being routed to history at the end of the schedule.
Valid transactions to history
•
•
Time schedule: Select a time schedule from the drop-down list.
Yes/No: Select Yes if the above schedule is when you want valid transactions to be saved to
the history file or No if the above schedule is when you do not want valid transactions to be
saved to the history file.
Valid transactions to monitor
•
•
Time schedule: Select a time schedule from the drop-down list.
Yes/No: Select Yes if the above schedule is when you want valid transactions to be
displayed on the Activity Monitor Form or No if the above schedule is when you do not want
valid transactions to be displayed on the Activity Monitor Form.
Valid transactions to printer
•
•
Time schedule: Select a time schedule from the drop-down list.
Yes/No: Select Yes if the above schedule is when you want valid transactions to be sent to
the printer or No if the above schedule is when you do not want valid transactions to be sent
to the printer.
Secure Perfect 6.1.1 User Manual
236
Routing Tab
Reference Topic:
Reader Form
Use this tab to define where transactions on the reader are sent. You have three options: badge history,
Activity Monitor, and a badge transaction printer. Badge transactions will print only if the transaction is
routed to the printer, the badge transaction printer is enabled, and a badge transaction printer is selected.
The enabling and selection of the badge transaction printer is done on the Parameters Form.
History
•
•
Valid: Enable this field if you want valid badge transactions recorded in badge history.
Invalid: Invalid badge transactions are always recorded in badge history. This default is a
read-only field and cannot be changed.
•
Lost: Lost badge transactions are always recorded in badge history. This default is a read-
only field and cannot be changed.
Monitor:
•
Valid: Enable this field if you want valid badge transactions to display on the Activity Monitor
Form.
•
•
Invalid: Enable this field if you want invalid badge transactions to display on the Activity
Monitor Form.
Lost: Enable this field if you want lost badge transactions to display on the Activity Monitor
Form.
Printer
•
Valid: Enable this field if you want valid badge transactions to be sent to the badge
transaction printer.
•
•
Invalid: Enable this field if you want invalid badge transactions to be sent to the badge
transaction printer.
Lost: Enable this field if you want lost badge transactions to be sent to the badge transaction
printer.
Secure Perfect 6.1.1 User Manual
237
S
Save Record
File Menu Item
The Save Record menu option saves changes made to the current record into the database. Unsaved
entries are discarded. The Save Record option is available only when a form is open, and you have been
given permission to update records.
Clicking this icon on the Secure Perfect toolbar can also access this option:
Save Template As
File Menu
Select this option to create a new template and save under a new file name. This option is available only
when a Report Form is displaying.
Schedule Tab
Alarm Form
Use this tab to assign schedules for monitoring and printing alarms. Time schedules define intervals that
include a start AND an end time for different days of the week and modes. At the start of the schedule,
the alarm monitoring or printing changes to the scheduled value. At the end of the schedule, the alarm
monitoring or printing returns to the nonscheduled value. Example: If alarm monitoring is scheduled On,
it will return to 0ff (no monitoring) at the end of the assigned schedule.
Monitoring
•
•
Time schedule: Click the drop-down list to select a time schedule.
On/Off: Select On if the above schedule is when you want to monitor alarms or Off if the
above schedule is when you do not want to monitor alarms.
Print alarm
•
•
Time schedule: Click the drop-down list to select a time schedule.
Yes/No: Select Yes if the above schedule is when you want to print alarms or No if the above
schedule is when you do not want to print alarms.
Secure Perfect 6.1.1 User Manual
238
Schedule Tab
Digital Input Form
This tab is available only if you have selected Digital Output in the Type field on the Digital Input Tab.
Use this tab to assign a schedule. Time schedules define intervals which include a start AND an end time
for different days of the week and modes.
Time schedule
Click the drop-down list to select a previously created time schedule.
Enable/Disable
•
Select Enable if you want to enable this digital input when this time schedule starts. Enabling
the digital input allows it to then trigger the associated digital output when a state change
occurs.
•
Select Disable if you want to disable this digital input when this time schedule starts.
Disabling the digital input prevents the state change from being reported and the associated
digital output from triggering.
Schedule Tab
Digital Output Form
Use this tab to define schedules for turning digital outputs (DO) on or off. Time schedules define intervals
that include a start AND an end time for different days of the week and modes. At the start of the
schedule, the state of the DO changes to the scheduled value. At the end of the schedule, the state of
the DO returns to the nonscheduled value.
Example: If the DO is scheduled On, the DO will return to Off at the end of the schedule.
Turn DO On/Off
•
Time Schedule: Select a time schedule from the drop-down list. This determines when the
DO will automatically turn on and off.
•
On/Off: Select On if the above schedule is when you want the digital output to be in the
Active state or Off if the above schedule is when you do not want the digital output to be in
the Active state.
Schedule Tab
Digital Output Group Form
Use this tab to define schedules for turning all digital outputs in a selected digital output group on or off.
DO control
•
•
Time schedule: Select a time schedule from the drop-down list.
On/Off: Select On if the above schedule is when you want the digital outputs in the selected
digital output group to be in the Active state. Select Off if the above schedule is when you do
not want the digital outputs in the selected digital output group to be in the Active state.
Schedules/Events
Reports Menu
The Schedules/Events option opens the Schedule Report Form that allows you to create a report on the
schedules and events defined in the Secure Perfect system.
Secure Perfect 6.1.1 User Manual
239
Search
Search Menu
The Search option conducts a search in the database for all records that match the search criteria data
you enter in the form. The records found by the search are displayed in the search results window. Data
can be in any number of fields in the form or any number of tables.
Only records that match all fields in which data are entered are displayed. An asterisk (*) can be entered
in text boxes to indicate wildcard characters. The Search option is available only when a form that
contains records is open.
Example: Enter S*in an appropriate text box to display any records beginning with S. Example: A
search for badgeholders with the last name starting with Sm*would yield such names as Smithand
Smythers.
If no search data is entered, all records display. Any column displaying in the list box can be sorted by
clicking on the column heading.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Search Menu Selections
The following selections display on the Search drop-down menu:
Secure Perfect 6.1.1 User Manual
240
Secure Perfect Services
Reference Topic:
Windows uses special programs called services. A service is a process that can start automatically when
the system boots and remains running as a background process independently of anyone being logged
in. It runs regardless of whether anyone is logged into Windows or SP. In other words, the computer must
be turned on but no one needs to be logged in. The SQL Server 2000 MUST be running for network
clients to connect and share the SQL database.
Secure Perfect has three services that run on all computers. Refer to your Secure Perfect Installation
Guide for additional information about services. The default Startup Type for services is set to Manual.
You are instructed to set the three services for an Automatic startup during the Secure Perfect installation
process, which means that they start as soon as the computer is started. Once set to Automatic, we
recommend that you do not change these settings.
1. Secure Perfect Diagnostics handles all diagnostics on all computers.
2. Secure Perfect Manager is the main service and handles micro communications and alarms.
3. Secure Perfect System Manager manages communication between computers and licensing.
Changing the state of services without a good working knowledge of the services purpose can cause
the computer to act erratically!
4. Secure Perfect API Service is used when using an API interface. This service is used when an
external system is sending or receiving transactions by way of Application Program Interface to
Secure Perfect. Do not start this service or change the settings unless you are using the API option in
Secure Perfect and have been previously licensed. This service can be started manually at the time
you install an API interface.
Services will automatically shut down when a client closes the Secure Perfect application and meets ALL
of the following criteria:
1. Does not host any micros or DVRs.
2. Does not have any API connections.
3. Is not a Thin Client.
4. Is not a backup client or have any backup clients of its own.
5. Is not a CCTV client.
6. Is not hosting a Guard Tour.
7. Client form Enable Auto Shutdown is selected.
The shutting down of a particular client computer designates that license capacity unused. Now, that
license is available for another computer that can now be designated a Secure Perfect client.
Secure Perfect 6.1.1 User Manual
241
Security Tab - Micro Form
Micro Form
Micro Passwords: The Micro Passwords list box has the following default password entries, enabling
four possible levels of security. Select a password; it now displays in the Password dialog box:
Select
one-1
To
Re-assign a password by typing over the
default displayed in the dialog box.
two-1
Re-assign a password by typing over the
default displayed in the dialog box.
three-1
four-1
Re-assign a password by typing over the
default displayed in the dialog box.
Re-assign a password by typing over the
default displayed in the dialog box.
Click Change to save and re-assign the new password.
If you change your micro passwords, you must enter the changed passwords in FlashTool by typing
over the existing entries. As you type the password in FlashTool, the characters will be replaced by
asterisks (*) to ensure the security of the host access system.
Communication Encryption
This feature allows you to configure additional security encryption that scrambles data into an
unbreakable code for public transmission. Encryption protects the Host-to-micro exchange of information.
The Host uses the Exchange Key to send the Data Key to the micro. Once the Data Key is received, the
Host-to-micro communication is encrypted using that key.
Enable Encryption: This check box is available only for head-of-line network, network+dialup, network +
direct, and network + network micros.
This checkbox, and all selections in the Communication Encryption grouping, are not available on
downstream micros.
•
System: When you choose this selection, no additional selections are available or required.
This key is set at the factory.
•
Custom: When you select this option, the three dialog boxes become available. At the micro,
enter the 48-character exchange key using FlashTool. This exchange key must be identical
to the key that was entered into the micro parameter block at the micro.
If the Custom exchange key entries do not match, an alarm condition indication displays
in the Reference column of the Alarm Monitor Form.
•
•
Edit: Click to re-assign or revise an existing encrypted Custom exchange key for a selected
micro. It is possible to assign a duplicate exchange key on separate micros in your Secure
Perfect system. When you click this button one time, this button label changes to Auto
Generate.
Auto Generate: Click this button to system-generate a Custom exchange key. We
recommend that you record this number. You can now enter this key into the micro
parameter block at the micro.
Secure Perfect 6.1.1 User Manual
242
•
DES: When you select this method, only one dialog box is available for input. Enter 16
unique hex characters in this binary field. We recommend that you do not repeat any
DES III: Enter 48 unique hex characters in the binary dialog boxes, in three 16-character
stirngs.
•
Edit: Click to re-assign or revise an existing encrypted data key for a selected micro. When
you click this button one time, this button label changes to Auto Generate.
Auto Generate: Click this button to system-generate a data key. We recommend that you
record this number.
•
•
Select Columns
This option allows you to select columns that you want to display on the Micro Utility Form by putting a
check next to the column name. When you click OK, the selected columns are saved so you will not have
to select again the next time the form is opened.
If you are licensed for Client Redundancy, the column Default Hostname is available for selection. If
not licensed for Client Redundancy, this selection is unavailable.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Select Criteria and Micro Selection
Clicking this icon from the Micro Utility Form toolbar will access this option:
This dialog box allows you to enter search criteria for available micros, from facilities to which you have
access, that you want to add to your view or remove from the list of displayed micros, based on the
results of the search criteria. Complete one or more of the search criterion.
Micro Description: Enter a micro description for which to search. You may use wildcard characters as
part of the search criteria.
Micro Address: Enter a micro address.
Online, Offline, Error: Select micros that meet the search criteria and are online, offline, or in an error
state.
Hostname: Select a host name.
Comm Port: Select a Comm Port.
Available Micros The micros are displayed that meet the search criteria and are not already selected to
be displayed in the Micro Utility Form.
Selected Micros: This box displays the results of the search. The list of micros are those that meet the
search criteria and are selected to be displayed.
Search: Click to display the micros as requested by the parameters you selected.
Clear Search: Clears the micro search criteria and selection parameters from the form windowpanes,
allowing you to selected new criteria.
Select Default Alarms
Select Default Alarms Dialog Box
This dialog box displays all alarms currently assigned to this map. To designate this map as the default
for an alarm, select each alarm that should have this map as its default association, which means this
map will display whenever you select this alarm point from the Alarm Monitor Form and open the Alarm
Graphics Viewer Form.
Secure Perfect 6.1.1 User Manual
243
Select Facilities
Operations Menu
The Select Facilities option opens the Set Active Facilities Form that allows you to change the facilities
currently in use.
Set As Default Template
File Menu
Use this option to select a template to use as the default template. This option is available only when a
Report Form is displaying with a loaded template. While the selected Report Form is displaying, select
Set As Default Template. A message displays stating the current template is now the default template
for this form. This template will automatically be loaded whenever you open this report form. You cannot
undo this election; however, you can later display and assign another report as the default.
Set Instruction Tab
Alarm Form
Use this tab to select the instructions you want to display on the Alarm Monitor Form when this alarm
occurs. Instructions are simply directions explaining how to react to the alarm.
Instruction
This windowpane displays the currently selected instructions in the order in which they will display on the
Alarm Monitor Form.
Move Up
Click to move a selected instruction up one line; it will display on the Alarm Monitor Form in the modified
order.
Move Down
Click to move a selected instruction down one line; it will display on the Alarm Monitor Form in the
modified order.
Edit
alarm instructions to this alarm.
Setting the Automatic Logoff Time
1. From the Administration menu, select Client.
2. In the Auto Logoff field, select a number between 1 and 99 to set the number of minutes of system
inactivity to elapse before an operator is automatically logged off. (Clicking the mouse button and
pressing keys on the keyboard is considered system activity; simply moving the mouse pointer is
not.)
3. To disable this feature, enter 0.
Secure Perfect 6.1.1 User Manual
244
Setting Up an Elevator
Do not switch between floor tracking and no floor tracking in the same elevator record. If you want to
change an existing record, delete that record and create a new one with the desired floor tracking
method.
1. Decide which method of elevator control you want to use: no floor tracking, floor tracking by input, or
2. Set up a micro (along with the reader board(s) and the digital output board(s); if using the floor tracking
by input method, then also set up a digital input board).
•
•
See information for setting up a direct-connect micro
See information for setting up a dial-up micro
3. Set the desired readers to active using the Reader Tab of the Reader Form.
•
4. Verify that the desired digital outputs are set up correctly. Also check the digital input setup if you are
using the floor tracking by input method.
6. Set up the elevator using the Elevator Form. Here you assign readers, digital outputs, and digital inputs
if using the floor tracking by input method.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) MUST be on the same micro.
Settings Tab
Reference Topic:
Diagnostic Setting Form
Enable debug messages: Select this box to enable monitoring for the selected diagnostic object.
Logfiles: Default and newly created LogFile names display in the Logfiles windowpane. Select a file
name from the list of files displayed, to which you are assigning this component for monitoring. By
assigning a component object to write to a particular logfile, you are removing that object from the list of
components that will write to the default logfile.
Save your new settings.
When you open the Diagnostic Viewer, the activities of your selected component will display in the logfile
to which it is assigned. (Those items with the COM # and Line # as part of the component name have the
highest effect on system performance and hard drive usage.)
After viewing, return to the Diagnostic Setting Form and disable the debug messages.
Secure Perfect 6.1.1 User Manual
245
Settings Tab
Parameters Form
Use this tab to set the general system settings.
Archive Database
Select an option to schedule archiving history. Archiving creates a copy of the latest history transactions,
leaving your history database empty. The default value for this option is Monthly. If you select:
•
•
Daily: The archive is appended every day beginning at 11:59:58 P.M.
Weekly: The archive is appended every week on the day that you select, beginning at 11:59:58
P.M. (You must select a day of the week.) Any change in the scheduling occurs immediately. For
example, if archiving is taking place on Tuesdays and the schedule is revised to archive on
Wednesday, the archiving will occur one day later, on Wednesday.
•
Monthly: The archive is appended on the last day of the month beginning at 11:59:58 P.M.
Agent services are running.
Database Connection
This feature allows you to configure the amount of time that elapes before your Secure Perfect system
detects and advises you that your database is not accessable.
•
Timeout (sec): The default is 30 seconds. The minimum is 3 seconds; the maximum is 120
seconds. 1) In a Secure Perfect Global Edition configuration, this is the amount of time until a
Regional failover begins. 2) In a typical Secure Perfect configuration, this is the amount of time
before Secure Perfect transactions are saved, Secure Perfect services shut down, and a
message advises you to repair your database.
•
Retry: The default is 3 retries. The minimum is ‘0’; the maximum is 5 retries.
Photo Aspect Ratio: Select or enter a number for the height and the width. The aspect ratio controls the
relationship between the height and width of the photos. This setting controls the photos displayed in the
Capture program, on the Person Form, and in the Badge Designer program.
Console alarm sound:
•
Continuous/Short: Select Continuous to sound a continuous tone when alarms are detected.
Select Short to sound a short tone when alarms are detected.
Enable global T&A: (Selected by default.) Select this check box if you want the entry status (either IN or
OUT) for all badges using Time and Attendance readers to be sent to and enforced by all micros.
Disabling the check box will require each micro to enforce T&A independently.
Enable global APB: (Selected by default.) Select this check box if you want the entry status (either IN or
OUT) for all badges using anti-passback readers to be sent to and enforced by all micros. Disabling the
check box will require each micro to enforce anti-passback on readers within each micro.
Enable unique & required Employee Number: (Selected and unavailable by default.) This checkbox is
only available after converting and upgrading a previous database. This feature enforces assignment of
Grant Access on Duress: Select this check box to allow a door to open, and to signal a threatening
situation. With a valid access right and valid badge, a 1 + PIN code is entered at the reader. This
sequence generates a duress alarm that displays on the Alarm Monitor similar to the following: 0001-1-
your system includes this feature already selected. Clear this checkbox if you do not want this feature.
Secure Perfect 6.1.1 User Manual
246
Alarm Notifier E-mail Support:
Enable: Select this check box to activate the e-mail notification option. The following e-mail dialog boxes
become available:
•
To E-mail Address Field: Select a field name from the drop-down list that will be assigned as an
e-mail address. 1) Labels for these field names are assigned on the User Fields and Address
Fields tab of this form. 2) The content of each field is entered in the User Fields or Address fields
on the Person Form.
[Global Edition: To ensure successful e-mail alarm notification across regions in a Global Edition
system, the Global Database Server and all Regional Database Servers must have identical
configuration settings. That is: 1) For all Servers in your Global Edition system, the user field
selected for the ‘To E-mail Address Field’ must be identical. While configuring each Server, select
the field that represents the e-mail address from the drop-down list. 2) All other Alarm Notification
information is specific to the Regional Database Server.]
•
•
•
SMTP E-mail Server: Enter the name of the server that handles the transfer of e-mail to and from
the e-mail addresses. This dialog box cannot be left blank and accepts up to 256 alphanumeric
characters.
From E-mail Address: Enter an e-mail address of the account or person that is generating this
alarm notification such as [email protected]. This dialog box cannot be left blank and accepts up
to 64 alphanumeric characters.
Allow Anonymous Access: This check box is selected by default, permitting the transmission of
an e-mail alarm notification without further authentication. The E-mail User Name and E-mail
Password dialog boxes are not available for entry and not required with default settings.
If the security requirements of the e-mail server require further authentication, clear the check box
to make available the dialog boxes for entry of an E-mail User Name and E-mail Password
E-mail User Name: Enter the user name that the e-mail server uses to validate this user. This
dialog box accepts up to 64 alphanumeric characters.
E-mail Password: Enter the user password that the e-mail server uses to validate this user. This
dialog box accepts up to 64 alphanumeric characters.
Save before you exit this form.
Settings to Reach Host Tab
Micro Form
This tab will display ONLY when you are setting up a dial-up, head-of-line micro. Use this tab to
configure how the micro dials the host.
Phone Numbers to Reach Host
Enter telephone numbers of up to 20 digits, that the micro dials to reach the host. If an outside line must
be accessed in order to dial out, type a comma after the number that accesses the outside line, (typically
9). In this situation, if the telephone number to be dialed is 1-555-666-7777, you would enter the number
in this field as follows: 9,15556667777
The micro will dial the number in Number 1: and then try the others in numerical order until connection it
made.
All Number fields must contain a telephone number of up to 20 digits. If there is only one telephone
number for this micro to reach the host, repeat this number in all fields. (If you click Save after completing
the first Number field, the system will automatically complete all Number fields with a duplicate number.)
Dial Interval
Select the interval (none, 1 hour, 8 hours, 12 hours and 24 hours) at which the micro will automatically
dial the host. The micro will dial at the bottom of the hour. For example, if you select the 1 hour interval,
the micro would dial at 4:30, 5:30 and continue every hour after.
Same Number Retries
Enter the number of times (from 0 to 9) the micro should redial the same telephone number before
moving on to the next available telephone number.
Secure Perfect 6.1.1 User Manual
247
Retry Interval (30 sec)
Enter the number (from 1 to 9) of 30-second intervals that the micro will wait in between each dial to the
host. For example, if you specify 2, then the micro will wait: 2 x 30 = 60 seconds between each dial to the
host.
Settings to Reach Micro Tab
Micro Form
This tab will display ONLY when you are configuring a dial-up, head-of-line micro. Use this tab to
configure how the host dials the micro.
Phone Numbers to Reach Micro
Enter the telephone number of up to 20 digits, that the host dials to call the micro. If an outside line must
be accessed in order to dial out, type a comma after the number that accesses the outside line, (typically
9). In this situation, if the telephone number to be dialed is 1-555-666-7777, enter the number in this field
as follows: 9,15556667777
The micro will first dial the number in Number 1: and then try the number in Number 2:.
All telephone number fields must contain a telephone number. If there is only one telephone number
for the micro, enter this number in all fields.
Dial Interval
Select the interval (None, 1 hour, 8 hours, 12 hours, 24 hours) at which the host will automatically dial the
micro. The host will dial one hour from the time the micro went into an idle (no activity) state. If this is a
new record, the count begins once the record is saved. If the Secure Perfect system is shut down, the
count begins once Secure Perfect is started.
Same Number Retries
Enter the number of times (from 0 to 9) the host should redial the same telephone number before moving
on to the next available telephone number.
Retry Interval (30 sec)
Enter the number (from 1 to 9) of 30-second intervals that the host will wait in between each dial to the
micro. For example, if you specify 2, then the host will wait: 2 x 30 = 60 seconds between each dial to the
host.
Host Call Back
Select this check box if you want the host computer to return a call back to the micro, providing additional
validation that the correct host-to-micro communication has taken place.
Show Me Demo Files
Reference Topic:
If this graphic is displayed in a topic, click the Show me icon to view a step-by-step animated demo that
may assist you in performing the tasks described in the related fields. The demo files are in English only.
There is a short pause as the demo begins.
Sort Fields Dialog
This dialog box allows you to select fields by which to sort the information on a given report. The window
lists the fields available for the current report. If you want to sort by more than one field, hold the Control
key while you left-click the additional fields.
Secure Perfect 6.1.1 User Manual
248
Split
View Menu
The Split option allows you to increase or decrease the horizontal size of the tabs and windowpanes on a
form.
Status Bar
Reference Topic:
View Menu
Status Bar is a toggle option and determines whether or not you view the Secure Perfect status bar at
the bottom of your Secure Perfect screen. Clear the check box to hide the status bar from view. The
status bar displays the status of your Secure Perfect system, indicating the current operator,
communication port status, number of clients connected, number of alarms, and number of background
tasks.
The numbers indicate the total status of all active facilities assigned to the current operator.
Status Tab
Alarm Form
The Status tab provides the status of a selected alarm as stored in the micro’s database, such as its
sense time. This status reflects any changes made by schedules on this alarm and displays the date and
time of the last status.
•
•
•
•
•
Alarm group: Displays the alarm group to which the alarm is assigned.
Monitor: Displays whether this alarm is routed to the Alarm Monitor Form.
Last status date: Displays the date on which the status was last requested.
Last status time: Displays the time on which the status was last requested.
Refresh: Click Refresh to receive the most current status from the micro. This may take
several moments.
A status refresh on an offline micro will never be returned.
Secure Perfect 6.1.1 User Manual
249
Status Tab - Badge Form
A badge record must be selected in order to enable this tab. This windowpane provides an immediate
status of the selected badge according to the information in the micro database.
This is a diagnostic tool. The status displayed here is verification that a badge modification has
actually taken place in the database, according to a change in the Status as modified on the Badge
Definition tab.
Requirements are indicated by an asterisk.
Element
Micro*
Description
this operator, and then click Status. The selected micro must be online in order
to display a Status windowpane conveying information about the selected badge.
Badge Status
TA Status
Status*
Displays the current status according to the micro database.
Displays the current Anti-Passback status.
Displays the current Time and Attendance status.
Click to refresh or update changes that occurred since the last Status request.
Status Tab
Digital Input Form
Select this tab to display information about the digital input as stored in the micro’s database, such as its
sense time. Request the latest information by clicking Refresh. It may take a moment to process
refreshing the data.
A status refresh on a micro that is offline will never be returned.
Sense Time:
The sense time as of the last status date and time.
Enabled:
Yes/No - Whether the digital input is enabled or disabled as of the last status date and time.
Last status date:
The date on which the status was last requested.
Last status time:
The time that status was last requested.
Refresh
Click to receive the current status information for this digital input.
Secure Perfect 6.1.1 User Manual
250
Status Tab
Digital Input Status Form
Provides the status of the selected digital input according to the information in the micro database. You
can list the digital inputs for all micros or list the digital inputs per micro.
Select micro
•
•
Select All to display the status for all digital inputs on all micros.
Select By micro to display the status for all digital inputs on a selected micro. Click the drop-down
arrow to display a list of active micros.
Refresh
Click Refresh to get an updated status on the digital inputs. A refresh for a dial-up micro will cause the
host to dial the micro unless they are already connected. The refresh process may take a few minutes. A
reader and associated DIs are grouped together, by reader number.
A refresh selected for a micro that is offline or in error will never be returned.
Column Headings:
Number
Displays the number of the digital input assigned by the system.
Description
Displays the description of the digital input. (A reader and associated DIs are grouped together, by reader
number.)
Micro
Displays the number of the micro to which this digital input belongs.
State
Displays the state of the digital input as On, Off or Trouble.
•
On means that the digital input point is in the Active state as defined on the Digital Input
Status Form.
•
•
Off means that the digital input point is Inactive as defined on the Digital Input Status Form
Trouble means that the digital input point has been cut or shorted.
Physical State
Displays the physical state of the digital input point.
•
•
•
•
Open means that the contact is open.
Closed means that the contact is closed.
Cut means that the line has been cut.
Short means that the line is shorted.
Date
Displays the date that the status was requested.
Time
Displays the time that the status was requested.
Secure Perfect 6.1.1 User Manual
251
Status Tab
Digital Output Status Form
This form displays the status of the selected digital outputs according to the information in the micro’s
database, by Reader DO or other DOs, by micro or for all micros.
Select DO Type
•
•
Select Reader to display the DO points available for the readers.
Select Other to display Aux DOs (the two DO relays available on a 2RP board) and other DO
points. Example DO points include lights, sirens, and door strikes that may be connected to
the micro.
Select Micro
•
Select All to display the status for the digital outputs of the type selected in the field Select
DO type found on all micros.
•
Select By Micro to display the status for digital outputs of the type selected in the field Select
DO type found on a selected micro. Click the drop-down list to display active micros.
Refresh
Click to get an updated status on the digital outputs. A refresh for a dial-up micro will cause the host to
dial the micro unless they are already connected. The refresh process may take a few minutes.
A refresh selected for an offline micro or micro in error will never be returned.
Column Descriptions:
•
•
•
•
•
•
DO Number: Number of the digital output.
Description: Description of the door/DO in the database.
Micro: Number of the micro on which this digital output is found.
Current State: Displays the state of the digital output.
Date: Displays the date that the status was requested.
Time: Displays the time that the status was requested.
If this is a reader DO, the states are:
•
•
Lock: The door is locked.
Unlock: The door is unlocked.
If this is any other DO, the states are:
•
•
Active: The digital output is in the Active state defined on the Digital Output Form.
Inactive: The digital output is NOT in the Active state.
Status Tab
Digital Video Recorder Form
Perform a search, select a DVR from the right pane of this form window, and click Status. The DVR must
be online in order to display a Status pane conveying the following information about the selected DVR:
•
General Status: Current time, time powered on, MUX firmware, PPC firmware, and disk
capacity.
•
•
•
•
Camera Status: Current in alarms and current in video loss alarms.
Record Status: Record status, disk status, time recording, and time until disk is full.
Archiving Status: Archive status, device status, time archiving, and time until archive is full.
Ethernet Status: Normal connect IP address and connect priority, and live connect IP
address and connect priority.
ꢀ
ꢀ
A duplex recorder priority status displays on a line separate from the IP address.
A Triplex and/or Matrix recorder priority status displays as the last entry of the IP address
such as: 003.018.146.159/3
Click Status to refresh or update changes that occurred since the last Status request.
Secure Perfect 6.1.1 User Manual
252
Status Tab
Reference Topic:
Intrusion Zone Form
Perform a search, select an Intrusion Zone record from the right pane of this form window, and click
Status. This list box will display the status of all devices associated with this zone and status of the Zone.
•
•
•
•
•
•
Reader Status: Online/offline
Alarm Status: Monitored on/monitored off
Zone Status: Armed/Disarmed.
Digital Input: On/off/trouble
Digital Output Status: Active/inactive
Refresh: Click to refresh or update changes that occurred since the last status Refresh
request.
Status Tab - Micro Form
This tab allows you to quickly view the status of an individual micro.
The columns of the Micro Utility Form also reflect the status of the selected micro and explains what is
happening between the host and the micro.
Refresh: Click to update the data on this page. Depending on the size of your Secure Perfect system,
this may take some time. A status refresh can only be executed for on-line micros.
Encryption status for a head-of-line network + direct micro: If the micro loses network
connection and fails over to a direct connect, a configured Encryption status changes to None, since
Encryption is available for network micros only.
Secure Perfect 6.1.1 User Manual
253
Status Tab - Reader Form
Select this tab to view information about the reader as currently stored in the micro’s database, such as
its type and routing information. You can request the latest information by clicking Refresh. It may take a
moment to complete the refresh of the data.
Physical type: Displays the actual reader type: Normal, Badge and Keypad, and Badge or
Keypad.
Logical type: Displays the reader type this reader is being used as: Normal, APB In(anti-passback In),
APB Out(anti-passback Out), T&A In(time & attendance in), T&A Out(time & attendance out), In
Required, and Elevator.
Online status: Displays Onlineif the reader is currently online and Offlineif the reader is currently
offline.
Routing for valid transactions
•
•
•
History: Whether valid transactions are being routed to history.
Monitor: Whether valid transactions are being routed to the Activity Monitor Form.
Printer: Whether valid transactions are being routed to the printer.
Active Access Rights: Click to display a list of access rights that are currently active on the reader.
Last status date: Displays the date when the status was last requested.
Last status time: Displays the time when the status was last requested.
Refresh
Click to receive the current status information for this reader from the micro. A refresh for a dial-up micro
will cause the host to dial the micro unless they are already connected. The refresh process may take a
few minutes.
A status refresh requested for a micro that is offline or in error will never be returned.
Supervised DI Points on 2SRP Board Not Working
Check the board addresses on the reader boards in your micro. They must be consecutively numbered.
This means that the first reader board must be set to Address 1, the second reader board must be set to
Address 2 and so on.
Swipe and Show Button
Secure Perfect 6.1.1 User Manual
254
Swipe and Show Option
Only one instance of Swipe and Show is available for display on a computer at one time. If readers
have not been selected, the program will not start. If Imaging is not licensed for the system, this option is
not available.
The Swipe and Show program is a monitoring and validation option, available on the Activity Monitor
Form. When properly configured and following a badge transaction, the operator is able to observe a
badge photo and text description of the transaction in the Swipe and Show window. An operator is able to
monitor transactions and compare the photo ID to a live image.
The Swipe and Show window is set to a default size, cannot be resized, and displays the following:
Element
Photo
Description
A photo displays in this windowpane for the badge presented to the reader. If
no photo is available or an unknown badge is presented to the reader, a
silhouette displays.
Name
First name, middle initial, and last name of badge holder.
Number assigned to this employee.
Employee Number
Department
Department where person is assigned.
Transaction Type
Valid (displays green), invalid (displays red), or unknown (displays gray)
messages display. Guard Tour activity types also display. See Activity
Date/Time
Reader transaction date and time.
Reader Description
Always on Top
Description of reader where badge was presented.
Right-click the Swipe and Show title bar to display a shortcut option that
keeps the window in the forefront of all windows displaying on the Secure
Perfect workstation.
If you select another transaction, the window content changes to the available information for that
transaction. Close this window by selecting the window exit button, closing the Activity Monitor Form, or
closing the Secure Perfect client program.
Secure Perfect 6.1.1 User Manual
255
T
Takeover and Recovery Timing
Reference Topics:
Client device takeover occurs following communication breakdown between the default client and the
backup client, under the following circumstances:
1. If network problems should occur.
2. If a default client computer crashes.
3. Immediate takeover following normal shutdown, ignoring any other settings. This occurs if Secure
Perfect services are stopped and Perform Backup on Normal Shutdown is enabled on the Backup
Clients tab of the Client form.
When a backup client detects that the default client is offline, an approximate takeover timing can be
predicted using the following formula:
Ping Interval X Retry Count of Default Computer
+ Heartbeat Interval X Heartbeat Retry Count of Default Computer
+ Network Delays
All these values are configured on the Client form.
The values in this formula can be adjusted to achieve a shorter or longer takeover scenario.
Template - Defined
Reference Topics:
The Template drop-down list on the Report forms displays the name of the currently loaded template, if
there is one. To load, select from the drop-down list of the available templates and load the details to the
form. Report templates are useful when you run a certain report frequently. After you select a report, it
can be saved as a template and revised by loading it from the template combo box.
Tile
Window Menu
This option allows you to control multiple window or forms. If you have several forms open but not visible,
select this option to view all forms at one time tiled side-by-side or one over the other on your display
monitor.
Secure Perfect 6.1.1 User Manual
256
Time and Attendance
Set the time and attendance status to neutral for all badges in this micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Time and Attendance History
Reports Menu
The Time and Attendance History option opens the Time and Attendance History Report Form that
allows you to create a report based on the history of time and attendance activity and the parameters you
select.
Time Schedule
Administration Menu
The Time Schedule option opens the Time Schedule Form that allows you to define when an action will
begin and conclude on a daily or weekly basis. The schedules created here can be used many times in
controlling how the system works.
Time Schedules Tab
Time Schedule Form
The display time is in half-hour increments by default. To change the display increment, click and hold on
the right end of the bottom time bar, then move the cursor to the left until you are at the time increment
that you want. Then, click the desired time.
The time 00:00 is the same as 24:00 of the same day. For example, Saturday at 00:00 on the left side
of the chart is the same as 00:00 on the right side of the chart .
Use this tab to create a time schedule.
•
Time chart: Click the desired start time and day of the week/mode and drag to the desired
stop time and day of the week/mode. This creates a bar that indicates that the time schedule
will occur during that time frame. Note that the current time schedule’s bar is selected.
Continue for each appropriate day that completes you new time schedule.
Interval: Displays the number of the time schedule.
New: Click to create a new time schedule.
Delete: Click this button to delete a time schedule. You may delete a schedule that is
currently in effect. Refer to the note below.
•
•
•
Deleting a schedule does not affect the current state of any devices to which this schedule is
associated. Any devices currently under the effect of the deleted schedule will remain in that state until
changed manually or by another schedule.
•
Interval details: The controls in this section are not needed in most circumstances. Use
details to verify that your selections match the calendar display.
Start time: Displays the time on which the time schedule will begin.
Stop time: Displays the time on which the time schedule will end.
Mode/day: Displays the mode or day on which the time schedule will occur.
You will need to assign this time schedule to a device such as a reader. Note the example below.
Secure Perfect 6.1.1 User Manual
257
Example:
1. On the Reader Form, select Building 1 Lobby Door reader record.
2. On the Functions Schedule tab, select a Door schedule BocaHQ Normal Workweekfrom the
drop-down list.
3. Select Unlock.
4. The result is that the reader will unlock the door based on the time schedule of BocaHQ Normal
Workweek.
Time Zone Tab
Micro Form
Select the time zone of this micro from the drop-down list of available time zones. The global map
graphics reflects the areas within that time zone. You can also use your mouse click-and-drag feature to
select and edit the time zone.
Toolbar
View Menu
The Toolbar option determines whether or not you view and access the Secure Perfect toolbar icons.
Clear the check box to hide the Toolbar from view.
Tour Point
Administration Menu
The Tour Point option opens the Tour Point Form that allows you to select a reader or digital input,
associated with pre-determined security inspection points by someone such as a security guard.
This option is unavailable if you are not licensed for Guard Tour.
Secure Perfect 6.1.1 User Manual
258
Tour Point Tab
Tour Point Form
A tour point can be a reader or digital input. You must select one option before you can save this point
record.
Element
Description
Reader
If you selected Reader, this field is available. Select a
reader from the drop-down list of available readers.
that you keep the mmmm-b-pp prefixand add text to
the description field. A complete and accurate reader
description aids in assigning the reader points from this
drop-down list.
Digital Input
If you selected Digital Input, this field is available. Select a
digital input from the drop-down list of available digital
inputs.
recommend that you keep the mmmm-b-ppprefix and add
text in the description field. A complete and accurate
digital input description aids in assigning alarm points
from this drop-down list.
Secure Perfect 6.1.1 User Manual
259
U
UL Certification
Secure Perfect is a UL-listed Grade A system (UL 1076 Grade A Proprietary Burglary Requirements/UL
294 Access Control Requirements). Your installation must adhere to the requirements listed in the
Certification section of the Secure Perfect Installation Manual, in order to qualify as UL-listed Grade A
certified.
User Fields Tab - Badge Form
Use this tab to enter user-defined information for the Badge Form record selected in the right
windowpane.
Modify Field
To give value to one of the fields, select a Label in the User Fields windowpane. Enter the value that you
want to display, corresponding to this label. This text box field accepts 32 alphanumeric characters.
User Fields
The existing list of labels and their values is listed in the User Fields windowpane. The selected label in
the User Fields windowpane is the label to which you are assigning a value.
Example:
The Badge User Field 1 was previously defined and labeled on the Parameters Form as Condition of
Badge. The first label listed here, in the User Fields windowpane, displays as Condition of Badge. Select
Condition of Badge. In the Modify Field dialog box, enter the corresponding condition of this badge as
Reported Lost by Badgeholder.
User Fields Tab
Parameters Form
Complete this tab to modify the labels for user fields. These labels are used on the Person Form and
Badge Form.
Person User Fields
Person User Fields Labels: Displays a list of 90 currently assigned labels for the Person Form user
fields.
New label: To assign or edit the label of a Person Form user field, select a label and enter the new or
edited text in this dialog box. The user field label can be up to 32 alphanumeric characters long.
Badge User Fields
Badge User Fields Labels: Displays a list of 20 currently assigned labels for the Badge Form user fields.
New label: To assign or edit the label of a Badge Form user field, select a label and enter the new or
edited text in this dialog box. The user field label can be up to 32 alphanumeric characters long.
Save before you exit this form.
Secure Perfect 6.1.1 User Manual
260
User Fields Tab
Person Form
Use this tab to enter user-defined information.
Modify Field
Enter the value for the currently selected User Field. This text box field accepts 32 alphanumeric
characters. User Fields are not appropriate for exceptionally lengthy street addresses or E-mail
addresses.
User Fields
The current user field Label and Value is listed in this windowpane. To give values to these fields, select
a Label.
Example:
The label for User Field 1 was previously defined on the Parameters Form as Social Security Number.
The first label listed in this windowpane displays as Social Security Number. Enter the corresponding
Social Security for this person record in the Modify Field text box.
Secure Perfect 6.1.1 User Manual
261
V
Video Display Tab
Reference Topic:
Digital Video Recorder Form
Select this tab to set up your DVR video window display options. These options are configurable per DVR
and are intended for optimizing system performance based on your network bandwidth and computing
hardware. Secure Perfect can be configured to request and process video from DVRs in reduced
resolution and color for display purposes, while the video remains locally stored on the DVR in its original
recorded resolution and color settings. All video is transmitted over the network in a compressed Wavelet
format.
Resolution
From the drop-down list, select your video display resolution as Low (~12K per image), Medium (~20K
per image), or High (~28K per image).
Window Size
From the drop-down list, select a video window display size: Small (180 x 121); Medium (360 x 242); or
Large (720 x 484). Window sizes are to be selected based on achieving the best display quality for the
selected resolution. A medium window size with a medium resolution is an optimum selection for most
systems.
Black and White
Select if you choose to further reduce the size of images transmitted over the network for display
purposes. Video will display in black and white; however, the video remains locally stored on the DVR in
its original recorded resolution and color settings.
Max Search Time for Recorded Events (secs)
Enter number of seconds from the drop-down list. This selection is the length of time a search request for
recorded video will wait before timing out. Search times may vary depending on network traffic, DVR
processing load, and number of recorded events.
Video Standard
Select PAL or NTSC. PAL (Phase Alternating Line) is a European TV standard. NTSC (National TV
Standards Committee) is the U.S. TV standard administered by the FCC.
Password
Enter the same password, if any, that has been configured locally in the DVR for authenticating remote
network connectivity. This is not a required field and the default is no password.
Secure Perfect 6.1.1 User Manual
262
Video Driver Installation
After installation of the video adapter card, Windows will automatically detect the new video card on
power up. Follow the installation instructions received with your video driver software; then, reboot your
computer.
After your computer has rebooted, you will need to select your video resolution. A Secure Perfect
computer requires that you run in 1024 x 768 resolution. Choose 16-bit High Color minimum. To change
your video settings, follow the steps below:
1. Right-click the desktop and select Properties.
2. From the Display Properties window, select the Settings tab.
3. Select the desired video characteristics.
Once you have completed the installation of the video driver, now install the Video for Windows (AVI)
driver.
Video for Windows (AVI) Driver Installation
The Video for Windows driver must be installed to allow Secure Perfect to capture images. After you
have installed your video drivers, follow instructions included in your video system software to install the
Video for Windows driver.
Read any README file produced during installation.
This completes the installation.
Secure Perfect 6.1.1 User Manual
263
Video Windows - An Overview
When you open a live or recorded video window, the window size corresponds to the choice you selected
on the Video Display tab of the Digital Video Recorder Form. Each window displays a title bar identifying
the source of the video, the display, and a dialog box containing the current date and time. The minimize,
restore, maximize, and exit options display in the upper right corner of each window.
Resize Window
To resize a window, point to any window frame or corner border and drag a sizing handle to the size
window you want to display.
A resized window has a Restore option that restores the window size as it was prior to resizing.
Increasing the window size is limited to the size of your monitor screen.
Decreasing the window size is limited to the system default, corresponding to the Small option available
on the Video Display tab.
Shortcut Menu
Right-click anywhere on the video window to display a shortcut menu:
•
Save Position: Each window can be independently moved anywhere on the desktop. Select
this option to save the position. If you close the window and reopen, the window opens at the
saved position. This feature has been incorporated to facilitate multi-window management for
both single and multi-monitor workstation configurations.
•
Restore Window to Default Size: After resizing, select this option to return the window to
the default size corresponding to the choice you selected on the Video Display tab of the
Digital Video Recorder Form.
•
•
Always On Top: Selection of this option keeps the window in the forefront of all windows
displaying on your Secure Perfect workstation.
Save Picture As: When you select this option, an image of the display in the video window is
grabbed. The video continues to advance. An additional window opens for you to save the
captured image as a .JPG video file. The default file folder may display similar to the
following:
c:\Program Files\GE Interlogix\Secure Perfect\Video\untitled.jpg
(If this is a custom installation and the file shares were separated from the Secure
Application, the default video folder resides on the File Server.) If you choose, you can
navigate to another location and store the file. You can assign additional alphanumeric
characters to the file name to assist in identification. The following characters are not
permissable:
/ \ ? * < > | "
Click the Show me icon to view a step-by-step animated
demo.
Secure Perfect 6.1.1 User Manual
264
W
Weak Encryption Key
Weak encryption implies that the key could be unscrambled with a realistic amount of processing
capacity and within a reasonable amount of time.
In Secure Perfect, a message displays informing you that an assigned key is too weak and therefore,
invalid. Corrections must be made before the record can be saved. We recommend entering 48 unique
hex characters, in three 16-character strings. Do not repeat any character. Do not create a pattern.
Why a Host PC Dials a Micro
Whenever a change is made to a form that requires an update to the micro database, such as changes to
the Person Form, the host will dial the micro with the changes.
If you make many changes, the micro may go to idle between your changes causing a disconnection with
the host. Then, the host will need to dial the micro back to download the next change. You have two
options available to work around this situation:
1. Increase the idle time (found on the Parameters Form, Communication Settings tab) on the micro
that will give you more time to make the changes. Secure Perfect Server services must be
restarted for the changes to take effect.
2. Put the micro offline, make the changes and then put the micro online. The host will automatically
dial the micro and download the changes.
Why Can't I Delete a Record?
Some forms, such as the Digital Output Status Form and the Manual Control Form, do not contain a
Delete button because they display only status information. Other forms, such as the Reader Form,
Alarm Form, Alarm Group Form, Digital Output Form, and the Digital Output Group Form, also do not
contain a Delete button.
To keep the system stable, NO ONE is given permission to delete these records, not even a System
Administrator. These records are deleted when the associated micro is deleted. However, on other forms,
you may be assigned delete permission. If you can’t delete on those forms, you do not have permission
to delete.
Wiegand Badge Formats Dialog Box
Select from the Available list those badge formats that you want to assign to this micro. The maximum
number of formats that you can select is 8.
•
•
Select, then click the right arrow to assign an available badge format.
Select, then click the left arrow to unassign an available badge format.
Click OK to display the results in the Wiegand badge format windowpane.
Window Menu Selections
The following selections display on the Window drop-down menu:
Secure Perfect 6.1.1 User Manual
266
|