286
92000701 Users manual Thor System Access and Intrusion Management System - AIMS 92000701 6.04.048 and 6.05.045 and later versions Publication date: 990201

Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

  • Upload
    others

  • View
    24

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701

Users manual

Thor System

Access and IntrusionManagement System - AIMS

92000701

6.04.048 and 6.05.045 and later versions

Publication date: 990201

Page 2: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701

This page is intentionally left blank

Page 3: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701

Access and IntrusionAccess and IntrusionAccess and IntrusionAccess and IntrusionManagement SystemManagement SystemManagement SystemManagement System

Users manual

This manual will provide you with the information needed to to use the 97TAIMS program

Date of publication: 990201

This manual covers the operation of AIMS program, version 6.04.048 and6.05.045 and later versions.

Reference number: 92000701

Due to continuous research and development, the information contained in thisdocument is subject to change without prior notice and does not represent acommitment on the part of HI SEC International.

HI SEC International declines any liability for not respecting the informationcontained in this manual or for the incorrect use of this manual, as well as forerrors or omissions and their consequences in the installations.

Introduction

Date

Version

Reference

Disclaimer

Page 4: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701

All trade marks and products mentioned in this manual are registered trademarks:MS-DOS® ,Windows®, Windows95® and WindowsNT® are registered trade-marks of Microsoft Corporation.

Copyright © 1998 HI SEC International. All rights reserved. No part of thismanual may be reproduced or transmitted in any form for any purpose withoutthe written permission of HI SEC International.

Trademarks

Copyright

Page 5: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 i

Table of contents

1. Presentation..................................................................................... 1-1

1.1 Introduction........................................................................................ 1-21.1.1 AIMS Software modules.................................................................... 1-3

1.2 General information........................................................................... 1-4

1.3 The AIMS program in broad outline .................................................. 1-5

1.4 Description of large capacity HI SEC systems.................................. 1-71.4.1 Multi-reader Access Control system ................................................. 1-71.4.2 Multi-central Intruder system on a single site.................................... 1-8

1.5 Multi-PC on local network................................................................ 1-10

1.6 Configuration of the remote sites .................................................... 1-12

2. Basic concepts of the AIMS program............................................ 2-1

2.1 Access Control database structure ................................................... 2-2

2.2 Priority of programming cards ........................................................... 2-4

2.3 Connect/Disconnect (PC communication) ........................................... 2-5

2.4 Structure of event and alarm logs ..................................................... 2-6

2.5 Alarm handling................................................................................... 2-7

2.6 The possibilities of the report generator............................................ 2-8

2.7 Addresses for for bus devices ........................................................... 2-9

2.8 Single-site and multi, local-site systems ......................................... 2-102.8.1 Single-site system ........................................................................... 2-102.8.2 Multi, local-site system .................................................................... 2-10

3. Basics of the user interface ........................................................... 3-1

3.1 Starting the program.......................................................................... 3-2

3.2 AIMS V6 window and dialog overview .............................................. 3-33.2.1 Windows System menu..................................................................... 3-3

3.3 Conventions....................................................................................... 3-8

3.4 Command buttons used by AIMS...................................................... 3-9

4. "System" menu................................................................................ 4-1

4.1 “Login” and “Logout” commands ....................................................... 4-34.1.1 Login procedure................................................................................. 4-34.1.2 Logout procedure .............................................................................. 4-3

4.2 “Connect” and “Disconnect” commands............................................ 4-54.2.1 “Connect” command.......................................................................... 4-54.2.2 “Disconnect” command ..................................................................... 4-64.2.3 “Show Clocks” command .................................................................. 4-6

Page 6: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701ii

4.3 “Show Bus Devices” command ......................................................... 4-84.3.1 The Bridge Interface 90T GPI BR ..................................................... 4-9

4.4 “Remote sites” command ................................................................ 4-10

4.5 “Holidays” command ....................................................................... 4-114.5.1 “Show Holidays” and “Edit Holidays” commands ............................ 4-11

4.6 Selection dialogs ............................................................................. 4-124.6.1 Select Intruder CU........................................................................... 4-124.6.2 Select Readers ................................................................................ 4-124.6.3 Selection of Sites............................................................................. 4-13

4.7 Upload and download of data.......................................................... 4-144.7.1 Dialogs for confirmation................................................................... 4-144.7.2 Dialogs for execution....................................................................... 4-15

4.8 Upload and download for Access Control System.......................... 4-164.8.1 Upload / Download of local data base............................................. 4-164.8.2 Upload and download of global data base ...................................... 4-174.8.3 Upload and download of Cards database ....................................... 4-17

4.9 Upload and download of holidays ................................................... 4-19

4.10 Upload and download for Intrusion System .................................... 4-204.10.1 Upload and download of Auto Set Programs.................................. 4-204.10.2 Upload and download of User Nos./Codes ..................................... 4-204.10.3 Complete download......................................................................... 4-204.10.4 Upload Alarm functions ................................................................... 4-214.10.5 Complete upload ............................................................................. 4-21

4.11 “System Operators” command ........................................................ 4-224.11.1 System............................................................................................. 4-234.11.2 Access ............................................................................................. 4-254.11.3 Intrusion........................................................................................... 4-27

4.12 “Import” command ........................................................................... 4-294.12.1 Import system configuration ............................................................ 4-294.12.2 Import cards of special format ......................................................... 4-294.12.3 Import of graphics............................................................................ 4-30

4.13 “Export” command........................................................................... 4-324.13.1 Export system configuration ............................................................ 4-324.13.2 Export cards of special format......................................................... 4-32

4.14 “Backup” command ......................................................................... 4-34

4.15 “Restore” command......................................................................... 4-35

4.16 Print Access Control configuration .................................................. 4-374.16.1 “Holidays” command ....................................................................... 4-374.16.2 “Personnel Groups” command ........................................................ 4-384.16.3 “Departments” command................................................................. 4-384.16.4 “Cards” command............................................................................ 4-394.16.5 “Messages” command..................................................................... 4-404.16.6 “Anti Passback Zones” command ................................................... 4-414.16.7 “Week programs” command............................................................ 4-424.16.8 “Readers” command........................................................................ 4-434.16.9 “Elevator Definitions” command ...................................................... 4-444.16.10 “Guard tours” command .................................................................. 4-45

4.17 Print Intrusion configuration............................................................. 4-464.17.1 “Auto Arm Programs” command...................................................... 4-464.17.2 “Zones” command ........................................................................... 4-474.17.3 “Areas” command............................................................................ 4-484.17.4 “User Nos./Codes” command.......................................................... 4-49

Page 7: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 iii

4.17.5 “Input Addresses” command. .......................................................... 4-494.17.6 “Output Addresses” command ........................................................ 4-504.17.7 “Alarm functions” command ............................................................ 4-51

4.18 “Remote Print-outs” command ........................................................ 4-524.18.1 “Local Modems” command.............................................................. 4-524.18.2 “Remote Sites (List)” command....................................................... 4-524.18.3 “Remote Sites” command................................................................ 4-534.18.4 “Remote Modems”........................................................................... 4-534.18.5 “Routine Call Week programs” command ....................................... 4-534.18.6 “Routine Call Setup” command ....................................................... 4-534.18.7 “All” command ................................................................................. 4-53

4.19 “Real Time Alarm Printing” command ............................................. 4-54

4.20 Printing ............................................................................................ 4-554.20.1 “Font” dialog .................................................................................... 4-554.20.2 “Printer setup” dialog ....................................................................... 4-56

4.21 Network ........................................................................................... 4-574.21.1 Status for Communication Server. .................................................. 4-574.21.2 Client connections to Network......................................................... 4-57

4.22 “About” command............................................................................ 4-58

4.23 “Exit” command ............................................................................... 4-59

5. "Status" menu.................................................................................. 5-1

5.1 Alarm status....................................................................................... 5-35.1.1 Alarm procedures .............................................................................. 5-4

5.2 Master Area status ............................................................................ 5-6

5.3 Status for Intrusion Central Units ...................................................... 5-7

5.4 Symbols and buttons in Intrusion Status dialogs .............................. 5-85.4.1 Symbols............................................................................................. 5-85.4.2 Command Buttons............................................................................. 5-8

5.5 Area status ........................................................................................ 5-9

5.6 Zone status...................................................................................... 5-11

5.7 Circuit status.................................................................................... 5-12

5.8 Setting fault...................................................................................... 5-14

5.9 Door status ...................................................................................... 5-15

5.10 Door control ..................................................................................... 5-16

5.11 Show event log ................................................................................ 5-17

5.12 Show operator log ........................................................................... 5-18

5.13 Show log status ............................................................................... 5-195.13.1 Move log .......................................................................................... 5-20

6. "Cards" menu .................................................................................. 6-1

6.1 Show list of cards .............................................................................. 6-3

6.2 Show and edit cards.......................................................................... 6-56.2.1 General information. .......................................................................... 6-56.2.2 Single-site system ............................................................................. 6-66.2.3 Multi-site system................................................................................ 6-76.2.4 Single-Site & Multi-Site systems ....................................................... 6-9

Page 8: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701iv

6.2.5 Image badging................................................................................. 6-116.2.6 The programmable format............................................................... 6-12

6.3 Show and edit Visitors cards ........................................................... 6-13

6.4 Show and edit messages ................................................................ 6-156.4.1 Messages for cards ......................................................................... 6-156.4.2 Messages for personnel groups or zones ....................................... 6-16

6.5 Edit department ............................................................................... 6-18

6.6 Person counting............................................................................... 6-196.6.1 Persons in Zone .............................................................................. 6-20

6.7 Parking counting.............................................................................. 6-21

6.8 Anti passback control ...................................................................... 6-22

7. "Access" menu ................................................................................ 7-1

7.1 Show and edit week programs.......................................................... 7-37.1.1 Week program functions for personnel groups ................................. 7-37.1.2 Week program functions for readers ................................................. 7-47.1.3 Week program dialog description...................................................... 7-57.1.4 Programming method........................................................................ 7-6

7.2 Show and edit personnel groups....................................................... 7-8

7.3 Show and edit anti passback zones.................................................. 7-97.3.1 Show & Edit Time Limits for Zone................................................... 7-107.3.2 Show Reader in Anti Passback Zone.............................................. 7-11

7.4 Show and edit elevator definitions................................................... 7-12

7.5 Show and edit readers .................................................................... 7-137.5.1 Edit personnel groups for reader..................................................... 7-157.5.2 Show reader input ........................................................................... 7-177.5.3 Show reader output ......................................................................... 7-187.5.4 Show and edit door parameters ...................................................... 7-19

7.6 System overview ............................................................................. 7-207.6.1 Personnel groups overview ............................................................. 7-217.6.2 Anti passback zones overview ........................................................ 7-227.6.3 “Reader - Card” menu command .................................................... 7-237.6.4 “Card - Reader” menu command .................................................... 7-24

7.7 Door control ..................................................................................... 7-25

7.8 Vault Control.................................................................................... 7-26

7.9 Service mode................................................................................... 7-28

8. "Intrusion" menu ............................................................................. 8-1

8.1 Show and edit Master areas.............................................................. 8-3

8.2 Show and edit Central units .............................................................. 8-48.2.1 Show and edit user numbers/codes.................................................. 8-48.2.2 Show and edit auto setting programs................................................ 8-58.2.3 Show areas........................................................................................ 8-88.2.4 Show zones ....................................................................................... 8-98.2.5 Show input addresses - Intruder ....................................................... 8-98.2.6 Show output addresses - Intruder ................................................... 8-108.2.7 Show alarm functions - Intruder ...................................................... 8-108.2.8 Show timers – Intruder .................................................................... 8-11

8.3 Testing............................................................................................. 8-12

Page 9: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 v

8.3.1 Test seismic and infrared detectors ................................................ 8-128.3.2 Test batteries................................................................................... 8-138.3.3 Test sirens ....................................................................................... 8-13

8.4 Service mode................................................................................... 8-14

9. "Alarms" menu ................................................................................ 9-1

9.1 Show alarm log.................................................................................. 9-39.1.1 Show alarm handling report - Intruder and Access Control .............. 9-4

9.2 Edit alarm filters................................................................................. 9-5

9.3 Edit alarm procedures ....................................................................... 9-6

9.4 Edit alarm functions........................................................................... 9-89.4.1 Enabling the AIMS Alarm Function facility ........................................ 9-9

10. "Reports" menu ............................................................................. 10-1

10.1 Operator, Alarm, Event report ......................................................... 10-3

10.2 Edit report ........................................................................................ 10-4

10.3 Generate report ............................................................................... 10-710.3.1 External log...................................................................................... 10-810.3.2 Destination of report ........................................................................ 10-8

10.4 Event screen report ....................................................................... 10-10

10.5 Operator screen report .................................................................. 10-11

10.6 Alarm screen report ....................................................................... 10-12

10.7 Presence time report ..................................................................... 10-1310.7.1 Presence time screen report. ........................................................ 10-14

11. "Guard Tour" menu ....................................................................... 11-1

11.1 Show and edit guard tours .............................................................. 11-3

11.2 Guard tour management ................................................................. 11-5

12. "Remote Sites" command ............................................................ 12-1

12.1 “Select” command ........................................................................... 12-3

12.2 “Upload Events” command.............................................................. 12-4

12.3 “Upload Alarms” command.............................................................. 12-5

12.4 “Remote Broadcast” command ....................................................... 12-6

12.5 “Local Modem Set-up” command.................................................... 12-812.5.1 Modem commands.......................................................................... 12-9

12.6 “Site Setup” command................................................................... 12-1112.6.1 Configuration of remote modems.................................................. 12-12

12.7 “Routine Call Week Programs” command..................................... 12-1412.7.1 Programming method.................................................................... 12-16

12.8 “Routine Call Set-up” command.................................................... 12-17

12.9 “Routine Call Status” command .................................................... 12-19

12.10 “Program Modems” command....................................................... 12-20

Page 10: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701vi

13. "Graphic Presentation" command............................................... 13-1

13.1 Introduction...................................................................................... 13-213.1.1 General information......................................................................... 13-2

13.2 Concepts and presentation ............................................................. 13-313.2.1 Graphic presentation ....................................................................... 13-413.2.2 Description of the screen................................................................. 13-6

13.3 Instructions for use ........................................................................ 13-1013.3.1 Activation of the graphic module ................................................... 13-1013.3.2 Operation of the THOR system using the GPM ............................ 13-1113.3.3 Setting and unsetting..................................................................... 13-1113.3.4 Alarm handling............................................................................... 13-1213.3.5 Door control ................................................................................... 13-14

14. Examples of reports ...................................................................... 14-1

14.1 Event report ..................................................................................... 14-2

14.2 Alarm report..................................................................................... 14-3

14.3 Operator report ................................................................................ 14-4

14.4 Presency report ............................................................................... 14-5

15. Glossary ......................................................................................... 15-1

15.1 Access Control ................................................................................ 15-2

15.2 Alarm messages.............................................................................. 15-5

15.3 Error messages ............................................................................. 15-10

Page 11: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 1-1

1111

PresentationPresentationPresentationPresentationThis chapter provides a brief introduction to the AIMS program and itsapplication in different types of systems.

The chapter contains the sections listed in the following table.

Section Page

Introduction 1-2

General information 1-4

The AIMS program in broad outline 1-5

Description of large capacity HI SEC systems 1-7

Multi-PC on local network 1-10

Configuration of the remote sites 1-12

Introduction

This chapter

Page 12: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

920007011-2

1.1 IntroductionThe program 97T AIMS for operation on a PC platform is a managementprogram for Thor Access Control and Intrusion Alarm Systems.

The Thor Access Control and Intruder Alarm System is very flexible. It can beused in a wide varity of systems to suit the individual needs of the user.The modularity of the AIMS software needed to operate the Thor systemsreflects this flexibility.

The AIMS system consists of a number of modules. With reference to thediagram below, it is configured as follows:

1. Choose an Operating Platform for the Access Control or/and Intruder AlarmSystem.

2. If the AIMS is to work on a PC Network, a Network Module must be addedwith the number of Client Modules required.

3. For operating an Access Control System, an Access Control ReaderLicence must be added, covering the maximum number of Readers (AccessControl Terminals) on a site.

4. For operating an Intruder Alarm System(s), an Intruder Alarm SystemLicence has to be selected, covering the maximum number of IntruderAlarm Systems on a site.

5. For Remote Site control, a Remote Site Licence has to be added, coveringthe number of remote sites required.

6. Finally, options such as a Graphic Presentation Module and Image/VideoBadging can be chosen.

In Section 1.1.1 on the following page you can find a number of tables listing theindividual modules available. Options for the AIMS is listed in Section 1.3.

Configuration

Page 13: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

92000701 1-3

1.1.1 AIMS Software modules

When combining the modules for the AIMS system, the following modules areavailable:

Number Name

97T ACC-P/95 Access Control Platform for Windows 95

97T INT-P/95 Intruder Alarm Platform for Windows 95

97T ACC-P/NT Access Control Platform for Windows NT

97T INT-P/NT Intruder Alarm Platform for Windows NT

97T ACC-P/31 Access Control Platform for Windows 3.11

97T INT-P/31 Intruder Alarm Platform for Windows 3.11

Number Name

97T NM-95-X Network module for Windows 95

97T CM-95-X Client Module for Windows 95

Number Name

97T ACC-10 Access Reader Licence for 10 readers/site

97T ACC-20 Access Reader Licence for 20 readers/site

97T ACC-30 Access Reader Licence for 30 readers/site

97T ACC-60 Access Reader Licence for 60 readers/site

97T ACC-120 Access Reader Licence for 120 readers/site

97T ACC-300 Access Reader Licence for 300 readers/site

97T ACC-600 Access Reader Licence for 600 readers/site

Number Name

97T INT-1 Intruder Alarm System Licence for 1 system/site

97T INT-10 Intruder Alarm System Licence for 10 systems/site

97T INT-30 Intruder Alarm System Licence for 30 systems/site

Number Name

97T REM-3 Remote Site License for 3 remote sites

97T REM-10 Remote Site License for 10 remote sites

97T REM-50 Remote Site License for 50 remote sites

97T REM-100 Remote Site License for 100 remote sites

97T REM-300 Remote Site License for 300 remote sites

97T REM-600 Remote Site License for 600 remote sites

97T REM-600+ Remote Site License for more than 600 remote sites

Operating platforms

Network modules

Access ControlReader Licences

Intruder AlarmLicences

Remote SiteLicences

Page 14: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

920007011-4

1.2 General informationThe aim of this manual is to describe the installation and the operation methodsof the AIMS Management program for the Thor Access Control and Intrudersystem. It is not the programming manual for the Thor system.

The different manuals for the products concerned must be used together withthe AIMS manual while programming. Moreover, the program has powerful helpfunctions which can be used whilst programming.

The program AIMS V6 requires Windows® 3.1, Windows 95®, or Windows NT.

A knowledge of the Windows operating system is advisable before starting theusage of the AIMS program.

This can be achieved consulting the Microsoft "Windows User's Guide",specially chapter 2, "Basic Skills", and in the same chapter "Using WindowsHelp " for all the help functions in the program.

In many figures and paragraphs of this manual, Windows terms are widelyused. They are described in the "Windows User's Guide".

The terms used in this manual (and in the AIMS program) are the same asthose used by Windows® whenever possible.

Page 15: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

92000701 1-5

1.3 The AIMS program in broad outlineThis section describes the basic functions of the AIMS.

To protect HI SEC against illegal copying and to protect the final user againstpossible illegal programming (modification of the program), the program isdelivered with a site code. The program can only be connected to readershaving the same site code.

The management of a security system must not occupy the system full-timewhen you use an efficient security system as the AIMS.Even in big installations you will only need some hours a week to keep a highlevel of security.

The AIMS program does not require the permanent connection of a PC, as it isthe case with other systems.All events will automatically be stored by the system and uploaded to the harddisk when the PC is reconnected to the THOR bus.All the intelligence is distributed among the card readers.

No hardware fault in the PC can produce false alarms or interferences with theTHOR system.

A database of cards with some predefined fields (name, address, etc) and someuser-definable fields can be created by the user on the PC hard disk (the textfor the user-defined fields must be programmed during the installation of theAIMS program).

It is possible to search for any information in the database. The search for theName and Card No. keys allow a quick answer from the system, notconsidering the size of the database.

The program has a flexible system of messages, with the possibility of sendingboth individual messages and messages affecting groups of users.

There are 3 types of different logs available in the system:

Alarm log: All alarms from the intruder and Access Control system apartfrom alarm types stopped by the alarm filter.

Event log: All events coming from all readers are stored in a separate log(sorted by time).

Operator log: All actions programmed by the operators on the PC.

A very flexible report generating system allows the output of almost everyimportant piece of information from these logs.

When the PC is connected to the THOR bus, it is possible to have an alarmreaction in real time. This reaction can be a pop-up window or dialog, with thedescription of the specific alarm, or just as a new line in the alarm log.

In the “Alarm status” window, each alarm is described by one line and the statusis indicated in different text colours. It is also possible to suppress the reactionor select the form of this reaction depending on the different types of alarm,through the alarm filters.

Copy protection

Systemindependence ofPC

Card database

Flexible messagesystem

Advanced logsystem

Alarm handling

Page 16: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

920007011-6

It is possible to ask for instructions (procedures) to the screen in case of alarm,based on any type of Intruder or Access Control alarm. They can be specifiedfor each reader or for the Intruder central.

When the system is connected to the THOR bus, it verifies that all authorizedand no non-authorized peripherals are available.

After having verified the peripheral numbers, the system checks if all theperipherals are correctly initialized with the correct site code. All thecorresponding card databases are interrogated to know their check sum andare compared to those in the PC. This ensures that the PC and your installationalways contain the correct programming information.

The enhanced database structure allows the control of all day-to-day operations(messages, visitor cards, block/unblock cards etc) by means of programmingcards via any reader. This can be very useful if the PC is disconnected for anyreason (technical problems, holidays, meetings, faults).

The program includes the functions of Guard tour control through the readers asremote control points.

The setting/unsetting control will work for main areas, areas, zones or for thedetectors (circuits).

Each area, zone or detector is represented by one line on the screen in thearming/disarming dialog the system status is represented by different colours.The status can be changed with the command buttons and/or the mouse.

The automatic setting of the THOR Intruder system can be programmed usingweek programs similar to those already used in the programming of the AccessControl.

The program permits the display of graphic representations using the optional95T GPM – Graphics Presentation Module that enable automatic display ofpictures as a function of events as well as setting/unsetting control.

A number of other options or modules can be integrated in the AIMS program.The following modules are available:

95T ELP – Export Logfile Program

95T IBM – Image Badging Module

95T CSM – Camera Support Module(Requires Frame Grabber Card 95T CFG and Video Camera 95T BCA)

95T SSM – Signature Support Module(Requires scanner with TWAIN interface)

95T DDE – Dynamic Data Exchange

95T CPT – Card Programming Tool

95T GDT – Graphics Design Tool – for distributors/installers

Automatic databaseand device check

Usage ofprogramming cards

Guard tourmanagement

Setting/unsettingcontrol

Automatic settingcontrol

Possibility todisplay graphics

Other options

Page 17: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

92000701 1-7

1.4 Description of large capacity HI SECsystemsThe program has been developed for integration in the Multi-reader system(961 card readers) and in the Multi-Intruder central system (31 Intruder centralunits). The configuration applies the bridges described in this document.

The system configuration is based on 2 levels of the RS 485 bus, each having acapacity of 32 units (card readers, terminals etc.).

Example of large capacity HI SEC system.

General limitations of a large capacity system:

The PC interface must always be connected to Bus 00, the other addresses canbe used for the communication bridges 90T GPI BR or for all other bus devices.

The 993 units include thirtyone 90T GPI BR (bridge interfaces) and one 95TGPI COM (PC interface).

1.4.1 Multi-reader Access Control system

This system requires use of the communication bridge 90T GPI BR. This bridgeis based on the same materials as the PC interface 95T GPI COM into which isincorporated a galvanic isolation from the bus.

Max. 961 card readers on each site.

The number of readers will be limited by the addresses already used for theunits of the Intruder central, modem or printer interfaces.

Max. 32 units/bus

Max. 993 units/site

Page 18: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

920007011-8

Max. 15 anti passback zones per bus.

Readers belonging to different busses can not be used for the same antipassback zones.

Max. 465 anti passback zones per site.

All readers will recognize, for each card, whether it is inside or outside of thesite; determining whether a card is inside or outside a certain bus is ofcourse the same as determining if the card is inside or outside the zone onthe same bus.All exit readers in an anti passback zone must be connected to the samebus. The maximum number of anti passback zones per bus is 15.

Seen from the PC, the following relations between the bus addresses and theanti passback zones have been defined:

Zone 00: Out of site.Zone 1-15: Exit readers connected to main bus at Level 0.Zone 16-30: Exit readers connected to sub-bus No 1 (GPI BR address 1)Zone 31-45: Exit readers connected to sub-bus No 2 (GPI BR address 2)Zone 46-60: Exit readers connected to sub-bus No 3 (GPI BR address 3)... ...

... ...Zone 466-480: Exit readers connected to sub-bus No 31 (GPI BR address 31)

Each reader only recognizes the anti passback zones 00 to 15. Zone 00 is themeans to indicate if the card is inside the controlled zones or on another localbus or even out of site. Zone 1 to 15 indicate where the person is inside one ofthe 15 zones related to the local bus. The readers will keep track of the persononly if he is located in one of the zones related to the bus.

1.4.2 Multi-central Intruder system on a single site

This system is comparable to the multi-reader Access Control system withregard to the communication being dependent on bridges and the distribution ofmails in the system.

Max. 31 Intruder centrals per site.

Only one Intruder central can be connected per bus. It is also possible tohave one Intruder central unit on the Level 0 Bus.

Max. 31 Intruder terminals or 31 card readers per Intruder central unit.

The Intruder central can only work locally with the terminals or readersplaced on its own bus. All central units can be operated from the PC.

Page 19: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

92000701 1-9

Concepts and principles of function

Each bus is totally independent of the other busses. The total amount of alarmsfor transmission is treated independently.

The PC can be considered as a local alarm station or as a central controller.

From the PC it is possible to see and accept the alarms and likewise to set,unset or isolate all the detectors.

It is possible on the PC to define and operate upon master areas consisting ofzones belonging to different central units.

Page 20: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

920007011-10

1.5 Multi-PC on local networkThe network version of the AIMS V6 program can be used by several PCs(Max. 30 PCs) on a standard network of the type Netware, Microsoft or others,and sharing the same data base.

Example of a HI SEC system with multiple PCs.

This system comprises the following two PC programs:

Server

One single PC on each site can use this program and must be the only PCthat is connected to the Thor bus. Further on, it is recommended to be thePC having the data base and the log files on its hard disc. In some types ofconfigurations, the server PC can be used as an operator's PC. The serverPC decides which data bases and which status informations will benecessary on the network PCs.

Client.

This second program appears similar to AIMS V6 for the operator, but it hasneither the bus interface nor the personal data base. It must have a networkinterface and must interrogate the server for all status information or database information.

In a network system of the type Peer to Peer (Windows 3.11 or Windows95) thedata base files will be placed on the PC or incorporated in the AIMS V6 Serverprogram.

Location of database files

Page 21: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

92000701 1-11

On a network system of the type Server-Client (NOVELL Netware) it ismandatory that the data base files are placed on the File server , and not on thePC where the AIMS V6 Server program is implanted.

In both cases the PC Clients do not have a database.

The installation of the AIMS network program requires the assistance of theperson responsible for the network in order to configure the passwords and thesharing of network features, especially on an already existing network.

For more information on the possible configuration types and the setup, pleaserefer to the Technical description, Networking concepts, AIMS Client/Server,reference number 99000101 (English).

Note

Additionalinformation

Page 22: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

920007011-12

1.6 Configuration of the remote sitesIn the present version of the program the remote sites can be operated bymeans of a standard modem or an X.28 interface.

This project implies the use of Modem Interface 95T GPI COM. This interfacewill be based on the GPI PC printed card, upon which is incorporated a galvanicisolation and a non-volatile memory.

Example of a HI SEC system with more remote sites.

Below, the different possibilities in this project are briefly described:

Max. 1000 remote sites controlled by a single PC.

The remote sites communicate with the PC by means of modemscompatible with the Hayes standard or they communicate on the X25network via a standard X28 output. It is evidently possible to have severalcommunication modems on the main site.

Max. 993 units per remote site.

On each remote site up to 993 units can be installed.

Max. 16000 cards per remote site.

The card data base is identical with that existing in all the readers on thesite. The card data base might be identical (or partly identical) or differenton each remote site.In the mode with programmable format cards, the number of cards islimited to 4000.

Page 23: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

92000701 1-13

Max. 31 Intruder central units per remote site.

It is possible to connect two modems on the remote sites.

The modem interface 95T GPI COM and the Hayes compatible modem must beconnected to the main bus (Bus Level 0).

The connection via modem can be made in two different ways:

Connection via special line.

In this configuration, two modems (9600 bauds Hayes compatible) will beconnected directly towards each other by means of a special line.No programming is necessary when the mode special line is selected. Inthis mode, the relation between the modems is exactly the same as acommunication by means of the 90T GPI BR bridges, and the bus on theremote site is considered as a sub-bus for whatever no. selected by theaddress programmed on the interface.Max. 30 sites can be connected in this way, and only one bus can beconnected on the remote site.

Connection via dial-up lines (dial-up modem).

In this configuration, up to 1000 sites can connected.

Page 24: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Presentation

920007011-14

This page is intentionally left blank

Page 25: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 2-1

2222

Basic concepts of theBasic concepts of theBasic concepts of theBasic concepts of theAIMS programAIMS programAIMS programAIMS program

This chapter describes the the basic concepts of the AIMS programs andoutlines the structure of the data base, event and alarm logs, alarm handling.Also described is the report generator and the concepts of single-site and multi,local-site systems.

The chapter contains the sections listed in the following table.

Section Page

Access Control database structure 2-2

Priority of programming cards 2-4

Connect/Disconnect (PC communication) 2-5

Structure of event and alarm logs 2-6

Alarm handling 2-7

The possibilities of the report generator 2-8

Addresses for for bus devices 2-9

Single-site and multi, local-site systems 2-10

Introduction

This chapter

Page 26: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

920007012-2

2.1 Access Control database structureTo ease the understanding of the programming and the display possibilities, it isnecessary to consult the database structure. This structure is represented in thefollowing diagram.

Data only inreader - - - - - - - -

♦ Hardware configuration

♦ PIN codes

♦ Card Status:

- Anti Passback status

- Message status

- Validity status

♦ Reader options

System data - - - - Data in reader and PC - - - - -

♦ Anti passback zone definition

♦ Personnel group database

♦ Week programs

♦ Holidays

♦ Programming cards priority

♦ Relation cards/personnel groups

♦ Created cards Yes/No

♦ Date and time

♦ Reader log filter

♦ Door Control times

♦ Message text strings

Data only in PC - - - - - - - - -

♦ Name of card-holder

♦ User-defined personal data file

♦ Last reader used

♦ Validity period of a card

The Database structure shown will ensure, that information in the PC and thereader is identical, also when the PC is disconnected.

The PC database includes all the data the security manager needs for completecontrol of the security system, including the card administration.

The fact that all data are not available in the PC database, does not mean thatthe user cannot see or operate these. If the PC is connected to the system, datacan be loaded on request.

All the data present simultaneously in the PC and in the readers must beprogrammed from the PC, on which it is also very easy to take backup.

Page 27: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

92000701 2-3

Nevertheless, it is possible (in case of emergency) to program each readerusing master cards, or cards with a priority 3, but in this case, the PC databasewill be different from that in the reader. Then it is necessary for the user tocorrect it by uploading, downloading or programming. You will get a warningwhen reconnecting the PC.

The principle of the Access Control database structure.

���

�������

�����

����

� ���

� ��

��

������

��

� ����������������������������������

�����

������

��� ��

����

����

��

����

��������������������

���������������������� ������

�����������������!�����

"��#���$�������������������

"��#���$�������������������

��������� ��

��������� ��

"��#���$��������������������������

��������������������������� ������������������

���������$������� ��!"������##������������������$��%���������&''

���

�������(����������)

���������$������� ��������������������������� ������������������

��������������������������� ������������������

���������$��������

��!"������##������������������$��%���������&''

��!"������##������������������$��%���������&''

���*�&�������������+,-"./���

���*�&�������������+,-"./���

��*�&�������������+,-"./���

���������$����

��*�&�������������+,-"./���

��� �

%%%%

��+��������������+�������0�����

$���1������ -".��%��

$���1������ -".��%��

� ������������

������������

������������

&�����'� ��(���

��

$���1������ -".��%��$&��������������������

�"�##

�"���

�"�''

�� ���

2�� ���

3���"�����

�"�''

"��#������������

� ���

����

���

)��*����

�4����(

�4�����(���

+���,

��

�"������1

���������

�-���###

4���5"����"������� ����6�� �"������� ����"������17������1 �����4���5

"����"������� ����6�� �"������� ����"������17������1 �����

4���5"����"������� ����6�� �"������� ����"������17������1 �����

��

Page 28: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

920007012-4

2.2 Priority of programming cardsThe following changes apply in the card priorities, when a reader is connectedto a PC:

With the option "PC connected" programmed - Option 9, Menu 82 - cards with apriority 2 are not authorized to edit (program) or delete the cards.

With this change in the "Priority level" for the reader, the programming cardswith the priorities 1 and 2, can be used to program those data only, that arepresent in the card readers, but not data in the PC database.

With the new priority 2 level, the card holder is allowed to:

Block/validate cards

Display and handle the alarms

Display the local log of card readers

Display the programmed cards and the status of cards

Manage visitor cards

Send messages

These are the necessary functions for the day-to-day operation of the system, ifthe PC is not available.

The functions for priority 3 cards are not changed.

Priority 1 and 2

Priority 2 only

Priority 3

Page 29: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

92000701 2-5

2.3 Connect/Disconnect (PC communication)When the PC is connected to the Reader Bus, the PC will automatically uploadall the events and alarms, which have occurred while the PC was disconnected.

If the PC is off-line, all the programming dialogs are blocked. At least onereader must be present in the Bus device table to allow the access to the dialogof the global database. The programming of Readers is only possible if thereaders are on-line.

The full database can always be up- or downloaded on request as in theinstaller version of the program (90T AICS).

PC and THOR hardware separated

The 95T GPI COM interface board will separate the THOR bus from the PChardware and software, which are out of HI SEC control.

The 95T GPI COM interface board is important for the basic system functions,as the PC hardware should not be considered as part of the security investmentbut as a general investment, because it can be used for other purposes thansecurity management. Security management is far from a full time job with theAIMS program, so when the user wants to manage security, he will use his PCfor that purpose, when he wants to do something else, he can use his PC forany other purpose.

THOR does not require the full time use of a PC, the program has beenspecially designed to allow the user full use of other programs on the PC.

Page 30: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

920007012-6

2.4 Structure of event and alarm logsIn each reader or Intruder central unit every event has an event no. (Modulo65535). This no. is a direct pointer in the local log at the reader or Intruder centralunit.

The PC remembers the last event no. received from each reader or Intrudercentral unit.If the PC receives off-line, reset, high priority overflow or low priority overflow aftera connection, it must request the missing log information from the readers or theIntruder central unit.

The PC will ask every reader or Intrusion central unit to transmit every event witha higher event no., and if some events are missing, due to overrun in the readerevent logs or in the Intruder central unit event log, the event "x events missingfrom reader no. y" will be logged at the PC.

The log size in each reader is 2300 events, while in the Intruder central unit thelog size is 1000 events.

Log size

Page 31: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

92000701 2-7

2.5 Alarm handlingIt is possible to program alarm filters, specifying the type of reaction for differentalarm types.

The following possibilities are available:

Reaction Type: "pop-up" The alarm will be displayed in the “Alarm status”window and the new alarm will be indicated in the top of the alarm list in red.The “Alarm status” window is displayed in front of all other opened dialogs.

Non "pop-up" type: The alarm needs no handling, it is just logged in thelog and can be displayed on demand (or in a report).

No registration: The alarm is not logged and is ignored by the PC.

Alarms are identical in both the “Alarm status” window and the “Alarm log”dialog. They are presented in a line with the following parameters:

Alarm type description.

Reader number.

Card number, if cards are involved in the alarm situation.

Time and date.

Identification of the operator either working with the alarm oracknowledging the alarm.

Current state of alarms.

The “Alarm status” window has a list box with 4 or more alarms (lines) and 2counters indicating:

Number of new alarms not dealt with by an operator.

Number of acknowledged alarms, which are not yet cleared.

The “Alarm status” window has 3 command buttons with the following functions:

Accept: Alarms will be present in the alarm list in the “Alarm status”window, but the colour will change from red to yellow (the alarm line willalso be indicated in yellow in the “Alarm log”).

Clear: The alarm will be erased from the “Alarm status” window, and thetext will become green in the “Alarm log”.

Procedures: In this dialog the programmable alarm instructions and allinformation concerning this alarm can be displayed.

Page 32: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

920007012-8

2.6 The possibilities of the report generatorThe report generator can work on the event, alarm and operator logs. Usingthese logs, all events, alarms and information is available (unless local filtersare used in the readers).

In the “Reports” menu, four menu commands are available:

“Operator Reports”.

“Event Report”

“Alarm Report”

“Presency Report”

In the “Edit Report” dialogs, the user can specify a log filter, used to generatethe report.

With the filters, definable by the user, it is possible to make any combination.The user can select any event type in the filter.

In the “Generate report” dialog, a report name, a given period and a path for theinformation must be specified. Then, the user must decide where the reportmust be generated, on the monitor, on the printer or in a file.

A predefined report calculating the time for a card holder between the use of thefirst reader and the last one every day can be demanded.

Page 33: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

92000701 2-9

2.7 Addresses for for bus devicesEach bus device (card reader, central, interface etc.) has a 4-digit address thatis used in the menus for the readers, Intruder centrals and in the menus foruploading/downloading etc.

The 2 first digits represent the address on the main bus (the address for thebridge on the main bus 00) and the 2 last digits represent the actual address onthe bus. The number of the sub-bus is indicated by the address of the bridgeconnected to the main bus (defined as being Bus No. 00).

Example: 1601 = Bus 16 (address 16 on the main bus 00) and 01 on the sub-bus.

Page 34: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

920007012-10

2.8 Single-site and multi, local-site systemsAt the installation the AIMS program can be configured to function in two modes:

Single-site system

Multi, local-site system

described briefly in the following sections.

2.8.1 Single-site system

The readers and the Intruder centrals are operated in the same way as onesystem.This means that all elements has an identical level for the operator. For example,an operator having access to program readers (or cards) can program cards onany of the busses in the system.A card belongs to a single personnel group out of the whole system.

2.8.2 Multi, local-site system

This concept gives the possibility to divide the access to operate the system. Thismeans that each operator will have access only to those parts of the system thatshe/he may operate upon (programming of readers, cards etc.). For example, thecard supervisor for each building will only be able to perform operations on thereaders at her/his own site.The system is divided into different sites, a site consists of one bus or anassociation of different busses.All readers on a bus will per definition belong to the site because also the busbelongs to the site. This means for instance, that if Sub-Bus 03 belongs to asite, all readers present on Sub-Bus 03 also belong to the site.

Example of a multi, local-site system.

Page 35: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

92000701 2-11

Each site operator can be associated with one site or several sites, upon whichoperation is allowed.

All menus are preceded by a “Site Selection" dialog so that the operator canindicate which site she/he wants to operate.

Example of the “Site Selection" dialog.

The cards are independently associated to the different sites, so in this way thecards can belong to a different personnel group on each site. This f. inst. makesit possible to give No Access to a card on one site without interfering with theexisting programming on the other sites.

The definition of the sites (association with the bus) is the responsibility of theinstaller, in accordance with the site configuration and the needs of thecustomer. The site definition can not be modified by means of the AIMSprogram.

Description offunction

Definition of sites

Page 36: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basic concepts of the AIMS program

920007012-12

This page is intentionally left blank.

Page 37: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 3-1

3333

Basics of the userBasics of the userBasics of the userBasics of the userinterfaceinterfaceinterfaceinterface

This chapter describes how the AIMS program is started and introduces you tothe basics of its user interface.

The chapter contains the sections listed in the following table.

Section Page

Starting the program 3-2

AIMS V6 window and dialog overview 3-3

Conventions 3-8

Command buttons used by AIMS 3-9

Introduction

This chapter

Page 38: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

920007013-2

3.1 Starting the programWhen installing the program, a program group called “Hi Sec Int.” has beencreated under Windows. The program group can be opened by clicking twice onthe Hi Sec icon. Then, a program group with the AIMS V6 icon is displayed.

Example of the “Hi Sec Int.” program group.

To start the AIMS program, click twice on the AIMS icon.

When you have fully installed the AIMS program, the item “HI SECInternational” is added to the “Start” menu.

To start the AIMS program, point at “Start” to display the “Start” menu. Thenpoint to the “Programs” item to display a menu listing the programs available onyour PC.

Then find the “HI SEC International” item on the menu and point to this todisplay a submenu listing the HI SEC programs installed.

Click the AIMS icon to start the program.

Please note that a description of the user interfaces of Windows 95 andWindows NT are not supplied in this manual. You are referred to thedocumentation delivered with the Windows 95 or Windows NT program installedon your PC.

Windows 3.11

Windows 95

Page 39: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

92000701 3-3

3.2 AIMS V6 window and dialog overviewThis section provides a brief description of the user interface of the AIMSprogram when running under Windows 3.1.1.

Example of AIMS main window with the “Cards” menu displayed.

3.2.1 Windows System menu

This menu is standard for all Windows applications, it makes it possible to closethe application, move the window or dialog, etc. as all Windows applications. Thismenu is displayed clicking on the “System menu” box or pressing ALT andSPACE.

Example of the Windows System menu available i all dialogs, windows, etc..

Windows System menu box

Menu bar

Communication status line

Title bar Minimize icon Reduce ormaximize icon

GeneralHelpIndex

Arrow indicatesadditional submenu

Unavailable commands

Page 40: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

920007013-4

If the option “Authorized to Exit” is not issued to the operator in the “SystemOperators Configuration” dialog, the Windows System menu will not be accessible(impossibility to use another program, to close or reduce the application, changingof window or dialog size).

The top of the screen indicates the window, dialog or program name. A click onthe title bar selects the window or dialog, which must be done before anycommand when using multiple windows.

The application window can be reduced to an icon by clicking on this button (thesame will be achieved with the “Minimize” menu command in the Windows“System menu”).Although the application is reduced to an icon it continues to work normally.

A single click opens the Windows “System menu”, allowing the access to the“Restore” menu command to be able to go back to the normal dialog or windowsize.

The AIMS V6 windows and dialogs (as most programs under Windows 3.10,Windows 95 or Windows NT) have 2 sizes, a default window size, which can bemodified at will and a full screen size. The shown buttons can be used to passfrom one size to the other.

A window can be enlarged (until full screen in any direction using the mouse,clicking where you want to enlarge (or reduce), moving and not releasing themouse button.

Example of the “Alarm status” window. The arrows indicate the directions in which the dialog can berezed.

If the number of lines displayed in the list box exceeds the box size, a scroll baris displayed and the text can be moved higher or lower with the arrow buttons.The position button indicates the cursor position compared to the total file size.

This zone contains all the accessible functions in the program. Each menuopens a box of menus containing the specific commands (Pull-down menus).To open a menu, you must click on its name with the mouse (left button). Youcan use the keyboard abbreviation keys (this method is valid for all Windows

UnavailableWindows Systemmenu

Title bar

Minimize

Reduce ormaximize

Menu bar

Scroll bar arrows

Position button

Page 41: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

92000701 3-5

programs). Just hold the ALT key and press the underlined letter in the menu(i.e. ALT-S to select the “System” menu).

Each menu has commands, separated with horizontal lines, organizing themenu commands in groups.Commands can be executed by clicking with the mouse, or moving with thekeyboard direction keys (→ ←) and entering the selected command (zonecoloured in inverse video) with the ENTER key; or just pressing the underlinedletter (i.e. C for the “Connect” menu command in the “System” menu).Menu commands displayed in grey indicates, that they are not accessible eitherbecause the system cannot use them (on-line/off-line) or because the operatordoes not have the correct priority to have access to these menu commands.

This zone indicates the state of the communication between the PC and theThor system.

See Section 4.2, “Connect” and “Disconnect” commands for a description of thevarious messages.

This command opens the Windows Help dialog for the AIMS V6 program, andthe general index gives access to all the subjects in the AIMS V6 program.

Example of the General Help Index of the AIMS program.

This dialog is accessible in most dialogs with the “Help” command button. It willgive a context help on the current subject.The access to related subjects can be made by clicking on texts underlined ingreen. A text underlined in dots opens a window or a dialog not quitting thesubject displayed on the screen.You can go back to the program by closing the dialog (Windows “Systemmenu”) or with the “Minimize” button.

Menus

Communicationstatus line

General Help index

Page 42: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

920007013-6

Basic information on dialogs

The data keyed in by the user is done in text boxes.

Example showing two text boxes for entry of operator name and associated password.

In all text boxes it is possible to ease the programming using the clipboard forcopying by the following method:

Select the text to be copied by using the mouse(click and move the mouse to the end of the selection).

Use the keyboard keys CTRL + INS.

Activate the text box where it must be copied to.

Use the keyboard keys SHIFT+INS.

A list box displays a list of choices or a list with elements programmed in thesystem.

Examples of two listboxes. The right box uses a scroll bar to display choices not shown.

If the number of lines displayed in the List box exceeds the box size, a scroll baris displayed and the text can be moved higher or lower with the arrow buttons.A position button indicates the cursor position compared to the total file size.It is possible to use the keyboard keys HOME and END to get the first and thelast elements in the list.

A drop-down list box displays by default the current selection, by the right arrowcan the box containing the other selections be opened.

Example of a drop-down list box. The list box is in normal condition to the left.

If the number of lines displayed in the List box exceeds the box size, an scroll baris displayed and the text can be moved higher or lower with the arrow buttons. Aposition button indicates the cursor position compared to the total file size.

It is possible to use the keyboard keys HOME and END to get the first and thelast elements in the list.

Text boxes

Using the clipboard

List boxes

Drop-down list box:

Page 43: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

92000701 3-7

These boxes or buttons allow you to select and attribute options to differentmenus.

Check boxes allow to select non-exclusive options (multiple selection ispossible).

Option buttons propose an exclusive choice (only one can be selected).

These buttons allow selection of the next or the previous number. The numberis displayed in the box to the left of the arrows.

Option buttons andcheck boxes

Arrow buttons

Page 44: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

920007013-8

3.3 ConventionsIn this manual, we use drawings to signal the restrictions of using some menus.The access to the menus when the drawings are not correct is impossible (themenu text is then displayed in grey).

This icon indicates that this menu is only accessible when the PC is Online (incommunication with the THOR bus) (see Section 4.2).

This icon indicates that this menu is only accessible when the PC is Offline (nocommunication with the Thor bus) (see Section 4.2).

This icon indicates that this function is not accessible in Editing mode(programming), only displaying mode is possible.

This icon indicates the editing (programming) function is only possible when thePC is Online (in communication with the Thor bus) (see Section 4.2).

This icon indicates that the function (or characteristic) is specific for multi, local-site systems.

This icon indicates that the function (or characteristic) is specific for operation ofthe AIMS on network.

This icon indicates that the function (or characteristic) is specific for the operationof the AIMS with remote sites connected.

Page 45: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

92000701 3-9

3.4 Command buttons used by AIMSThe “OK” command button accepts the proposed choice, it closes the dialogand the program returns to the preceding menu.

The “Cancel” command button cancels an action or stops an action (i.e.printing). In editing menus, the command button has a limited function, it is onlypossible to cancel the selected operation. Previously these edits have beenstored on the hard disk when changing subjects with the arrow buttons.

In display menus, the “Cancel” command button works like the “OK” commandbutton and quits the dialog.

The “Delete” command button deletes the displayed subject, a confirmationdialog will be displayed by each action of this button.

The “Help” command button opens a help window on the subject selected

The other command buttons are described in their corresponding chapters.Other buttons

Page 46: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Basics of the user interface

920007013-10

This page is intentionally left blank.

Page 47: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 4-1

4444

“System” menu“System” menu“System” menu“System” menuThis chapter provides a detailled description of the “System” menu. The menucommand “Print Badges” is only available when the program Image BadgingModule is installed.

The chapter contains the sections listed in the following table.

Section Page Section Page

“Login” and “Logout” commands 4-3 “Export” command 4-32

“Connect” and “Disconnect” commands 4-5 “Backup” command 4-34

“Show Bus Devices” command 4-8 “Restore” command 4-35

“Remote sites” command 4-10 Print Access Control configuration 4-37

“Holidays” command 4-11 Print Intrusion configuration 4-46

Selection dialogs 4-12 “Remote Print-outs” command 4-52

Upload and download of data. 4-14 “Real Time Alarm Printing” command 4-54

Upload and download for Access Control System 4-16 Printing 4-55

Upload and download of holidays 4-19 Network 4-57

Upload and download for Intrusion System 4-20 “About” command 4-58

“System Operators” command 4-22 “Exit” command 4-59

“Import” command 4-29

Introduction

This chapter

Page 48: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-2

Overview of the “System” menuWhen you have just started the AIMS program or if you have logged out, the“System” menu contains the menu commands below.

Tthe “System” menu before log-in.

After log-in, but before connecting to the system, the “System” menu containsthe menu commands shown to the right in the figure below. After connecting tothe system, it contains the commands to the right.

The “System” menu after log-in with the system disconnected and connected.

If your program includes network modules, the menu command “Network” isadded to the “System” menu. The remaining commands are the same as aboveand so are their availability.

The “Network” menu command.

Logged out

Logged in

Network AIMS N(Server only)

Disconnected Connected

Page 49: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-3

4.1 “Login” and “Logout” commands

4.1.1 Login procedure

Access to AIMS is protected by a Name (identifier) and a Password. The interestof these names is to allow to identify the operators in session and store alloperator actions in the Operator log.

Example of the “Login” dialog.

The operator's name is displayed in the corresponding text box (it will be thename used in the operator log).

For security reasons, the entry of the password is masked on the screen withasterisks (*). The program makes no distinction between capital and small letters.After having entered the user name and the password and having validated thename and password by the “Ok” command button, the main menu is displayed.

The seven usable menus is displayed in the menu bar at the top of the screen.

Example of the menubar.

The start of the program after the first installation needs the entry of a Name: HiSec International and a password: 44669292.This user has access only to the “System Operators” menu commanddisplaying the “System Operators configuration” dialog to allow him to create anew operator with higher access rights.

The default operator will automatically be erased after the first logout. At leastone new operator must be created before leaving the program and this operatormust have the authorization to create new operators.

4.1.2 Logout procedure

With the “Logout” command, the user can terminate the session, but the AIMS willgo on working and a new log in procedure must be made by the user (or anotheruser) to get access to the AIMS menus. All session entries/exits are stored in theoperator log.The pop-up of the alarm dialog (if programmed) and the storing of events in thelogs will remain active.

Name

Password

Menu bar

Important

Page 50: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-4

The “Logout” command does not cut the communication between the PC and theRS-485 bus. Do not confuse this command with the “Exit” command which closesthe program.

Please note, that an automatic logout can also be performed depending on thesetup of the AIMS (for version 6.06 and later).

Page 51: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-5

4.2 “Connect” and “Disconnect” commandsBefore the program can be put to use it is necessary to select the buscommunication port on the PC (see Section 4.3). Having selected the buscommunication port (COM1 - COM4), you can connect the PC to the RS 485 busthrough the 95T GPI COM interface.

AIMS program Network Client:These menus are not used for connecting/disconnecting the PC to/from theTHOR system but they are used to establish the network communicationbetween the Client and the Communication Server. Only the programs AIMS V6itself and AIMS V6 SERVER can perform connection/disconnection to/from theTHOR system (RS 485).

4.2.1 “Connect” command

This command establishes the communication between the PC and THOR.

When the PC is connected, a “wheel” turns in the Communication Status Lineat the bottom left of the window.

When the PC is connected to the 95T GPI COM interface, “Online” will bedisplayed in the bottom left, and when the PC is not connected the text “Offline”is displayed in the bottom of the window, indicating the status of the PC buscommunication.

If the text “Online” is green, communication with all units is Ok. If the “Online”text is red, the communication with a reader or some other unit is missing.

If this command is activated when the PC is not in a position to communicate,an alarm message will be generated and the PC will indicate “Offline”.

The “Connect” command is executed in several steps. When the PC is starting thecommunication with the 95T GPI COM interface a text “Connecting to interface” isdisplayed. When the communication has been established between the PC andthe interface, the interface will make a Connect on the RS485 bus and the text“Connecting to THOR” will appear in the Communication Status Line. When theconnection to the THOR bus is succeeded, the text will change to “Online”.

The operator is asked if they require to adjust the THOR (or PC's) system clockwhen he executes the “Connect” command (only if the difference between bothclocks is more than 1 minute). See Section 4.2.3.

The consistency of the database, the system configuration and the site code willbe verified after connection. If a fault is detected, an appropriate error messagewill be displayed.

The PC tests automatically that the data base is correct; in case of error the PCperforms a correction of the data base, indicated by the message "Repairingdata base".

After the PC is on-line, the message “Updating events” is displayed, indicatingthat the PC is uploading the stored events (Bus by Bus) since the lastconnection.

Important

No communication

Page 52: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-6

The uploading begins with the Intruder alarm events followed by the alarmevents from the Global alarm log in the card readers (100 events). The alarmswith a pop-up reaction will open the “Alarm status” window.

If the capacity of the global alarm log is exceeded between a disconnection andthe next connection, the program will make an alarm indicating “Alarm overflow”and the number of lost events is displayed.

Then, the PC will upload the Intruder standard events - including alarms (1000events per central unit) and after that the local logs in each card reader (2300events per reader).

This operation can take several minutes or even hours if the number ofinformations, transactions and readers is large.

It is strongly recommended to connect the PC to the THOR system as often aspossible and not only when programming is needed. The more oftenconnections are made, the faster the access time to the program will be.

4.2.2 “Disconnect” command

With the “Disconnect” command, it is possible to stop the communicationbetween the PC and the 95T GPI COM interface.

This command signals to the program that the communication is about to stop.All logs etc. in all readers will store the last event sent to the PC, allowing thePC to retrieve the events that occurred between the disconnection and the nextconnection.

If the link between the PC and the GPI COM interface (or between the GPICOM interface and the RS 485 bus) has been cut, the program automaticallygenerates the “Disconnect” command. Then it is necessary to activate the“Connect” command to restart the communication and update all logs.

4.2.3 “Show Clocks” command

This dialog is automatically displayed if the PC and the THOR system do nothave the same time when starting the system or if you select the “Show Clocks”command in the “System” menu. Two text boxes display the PC time and theTHOR time.

Example of the “System Clocks” dialog.

Two command buttons “Correct PC” or “Correct THOR” allow you to selectcorrection of either THOR or the PC.

Alarm overflow

Recommendation

Automaticdisconnection

Page 53: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-7

To close this dialog, you must activate the “OK” command button.

Before connecting the PC through the 95T GPI COM interface to the RS 485bus, it is necessary to select the communication serial port (COM).

The GPI COM interface must have been previously programmed (as all busdevices) with an address between 1 and 31.

Examples of the “Communication Ports” dialog.

The AIMS V6 can use communication ports COM1 to COM4.

Select the required communication port (1-4) to where the 95T GPI COMinterface is connected, avoiding any conflict with a port already used by a PC busdevice, like a modem or a mouse.

The mouse normally uses the communication port COM1, in this case, you mustuse COM2 for the GPI COM interface.

The default values of the address and IRQ no. for each COM port:

Serial port number Address IRQ No.

COM1: 3F8 4

COM2: 2F8 3

COM3: 3E8 4

COM4: 2E8 3

The programming made in this dialog is logged and must not be touched againin normal use.

To close this dialog, you must activate the “OK” command button. Thisoperation stores the configuration. To leave this dialog without making anymodifications, you must activate the “Cancel” command button.

This dialog is not used with on AIMS Clients connected to a network.Note

Page 54: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-8

4.3 “Show Bus Devices” commandBy activating the “Show Bus Devices” command, it is possible to have acomplete overview of the installation with the addresses of the different busdevices on the RS-485 bus.

Example of the “Bus Devices” dialog.

This overview indicates the present bus devices and their addresses. Onlythose units giving an active answer to the questions from the PC will beindicated in this table. The number indicated by each bus device is the addressof each programmed element.

This overview of bus devices works real time, giving you always the generalstatus of the bus. All the units (bus devices) will be indicated with their busdevice names, which are the following:

Non-initialized unit GPI-PC w. PC

THOR PC system Intruder printer

Keypad GPI-Bridge

Access printer Modem I/F

Card reader INCOM

Intruder CU

Activation of the “Save” command button will store the bus configuration as areference base for the installation. The saved configuration is compared withactual configuration at each connection to the THOR bus. If the twoconfigurations differ, an advertising message or an alarm message is shown.

An advertising message or an alarm message may also appear if the busconfiguration is changing, while the PC is connected to the THOR Bus.

To close this dialog, you must activate the “OK” command button.

Page 55: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-9

4.3.1 The Bridge Interface 90T GPI BR

A THOR system may consist of several RS 485 busses. They are connected bymeans of a bridge interface 90T GPI BR. The maximum number of RS 485busses is 32.See also the system diagrams of Sections 1.4 and 1.5 for more information.

A bus connected to the main bus (the bus with the PC connected) is indicatedby the “GPI-Bridge” text. A double-click with the mouse on the Bridge icon willopen a new branch showing the bus devices from the bus below the GPI-bridge.

Page 56: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-10

4.4 “Remote sites” commandThe remote sites command are used for selection of communication with theremote sites and for setup of the communication with these sites.The availability of menu commands in the menu and the submenus will dependon whether the AIMS is connected to the system and whether the licenseincludes remote sites options.

The menus and submenus of the “Remote Sites” menu command with the system connected andon-line with the remote site.

The menu commands and their associated dialogs are described in detail inChapter 12.

Page 57: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-11

4.5 “Holidays” commandThe holiday periods will be common to the two systems: Intruder and AccessControl.

4.5.1 “Show Holidays” and “Edit Holidays” commands

With the “Show Holidays” and “Edit Holidays” commands, you can display the“Holidays”dialog, where it is possible to display (program) the 25 Holidayperiods in the system.

Example of the “Holidays” dialog.

In the “Holiday intervals” list box, all programmed periods are displayed, givinga complete overview of all periods and the related day type.

Each period must be programmed with a start date (“From”) and an end date(“To”). Please note that a period cannot include a month shift.The “Day type” (Monday - Sunday, + 2 special days) can be selected in thecorresponding drop-down list box among the week days or the 2 special days.Normally, 2 different special days can be programmed. A day specifying thecomplete closing for a holiday and another day specifying the opening forhalf-a-day, but any combination of the 9 days can be used.The holiday list is common for all week programs (local or global) using thesame day reference number from each week program.

Activation of the “Delete” command button will delete one holiday period.

To close this dialog, you must activate the “OK” command button.

If the modifications have been made in this menu the activation of the “OK”command button will store all modifications and open the “Select Intruder CU”dialog which makes it possible to select the Intruder central unit where theholiday periods should be sent to, see Section 4.9, Upload and Download ofholidays.After download to the selected Intruder central unit(s), all readers are updatedwith the programmed Holidays

If you are leaving this dialog with the “Cancel” command button, all new datawill be lost.

Upload and Download of holidays are described in Section 4.9.

Attention

Page 58: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-12

4.6 Selection dialogsThis chapter describes the dialogs that are used by the program to determine thesources and targets for the different kinds of programming, upload, anddownload.

4.6.1 Select Intruder CU

In this dialog, the operator can state the Intruder central he wants to work upon,the “Central Unit:” list box gives the possibility to choose between all existingcentral units in the system.

Example of the “Select Intrusion CU” dialog.

Checking the “All Central Units” check box permits the operator to validate thecommand in question (Upload and download only) for all the centrals in theinstallation.

Activation of the “OK” command button will bring a return to the dialog from wherethe command was issued (Printing, Report, Upload/Download etc.).

The name of each Intruder central unit has been programmed in the dialog“Edit Central Units”.

4.6.2 Select Readers

In this menu the operator can state the Card Reader(s) he wants to work upon,the “Select Reader(s)” list box gives the possibility to choose between all thereaders in the system.

Example of the “Upload Local Database” dialog.

Select with the command button “Select All” or select a single reader.

The reader is chosen in the drop-down list box, only those readers that are atdisposal on the bus are shown (communication OK).

CU name

Page 59: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-13

Activation of the “Cancel” command button will remove a (no longer wanted)multiple selection.

Each selected reader will be shown with its address on the bus.

After the selection has been validated by activation of the “OK” command buttona new “Transfer” dialog will be shown on the screen.

The name of each Reader has been programmed in the dialog “Edit Readers”.

4.6.3 Selection of Sites

In this dialog the operator can state which site(s) he wants to operate upon orsee informations about.

Example of the “Site Selection” dialog.

A multiple selection is possible, only those sites that are accessible to theoperator in session will be shown in this dialogue box.

The menus following this selection dialog (for instance “Door Control” dialog)will only show elements belonging to the selected site(s).

Reader name

Page 60: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-14

4.7 Upload and download of data.An upload means a copy of data from one or more centrals (readers) to the PC.A download means a copy of data from the PC to one or more centrals (readers).

4.7.1 Dialogs for confirmation

These dialogs make it possible to assure that the data transfer will be correct.From or towards the Intruder central (in the Intruder system). From or towards theCard Reader (in the Access Control system).

Examples of “Upload” and Download” confirmation dialogs for the Intrusion system.

Examples of “Upload” and Download” confirmation dialogs for the Access Control system.

When the “Yes” command button is activated the uploading (or downloading)starts and the execution dialog for the transfer (see Section 4.7.2) is shown.

If you leave this dialog by activating the “No” command button, the upload (ordownload) will not take place.

By the activation of the “Cancel” command button (in the execution dialogsdescribed on the following you not only stop the transfer of data BUT you alsocancel the ongoing programming on the PC. This programming is compulsory inorder to always have the database on the PC and on the system strictlyidentical.

Be very careful when using these menus, as several hours of work can be lostin a few seconds, in case of wrong handling.

Intrusion

Access Control

“Cancel” button

Caution

Page 61: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-15

4.7.2 Dialogs for execution

These dialogs make it possible to assure that the data transfer operations(upload or download) takes places as wanted.

Examples of “Uploading” and Downloading” execution dialogs for the Intrusion system.

Examples of “Uploading” and Downloading” execution dialogs for theAccess Control system.

The arrow and the icons indicate the direction of data transfer (upload ordownload).

The first line shows the particular part of the data that is being transferred at themoment (personnel groups, week programs etc.). The second line indicate thenumber of data blocks transferred and the source (or target) indicated by Number(address) of the central/reader as well as the Name of the element that isuploading (or downloading) at this particular moment.

If you leave this dialog by activating the “Cancel” command button, the upload (ordownload) will be abandoned.

By the activation of the “Cancel” command button you not only stop the transfer ofdata BUT you also cancel the ongoing programming on the PC. Thisprogramming is compulsory in order to always have the database on the PC andon the system fully identical.

Be very careful when using these menus, as several hours of work can be lostin a few seconds, in case of wrong handling.

The time needed to upload (download) a complete system depends on theprogrammed information, in particular of the amount of programmed addressesand the number of cards and readers used. This operation may last 15 minutesor more.

Intrusion

Access Control

“Cancel” button

Caution

Page 62: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-16

4.8 Upload and download for AccessControl SystemThis menu is used for selecting which part of the THOR Access Control systemdatabase that must be uploaded or downloaded.

Example of “Access Upload/Download” menu command with associated submenu.

On a configuration of the multi, local-site type, these menus will be preceded bythe “Site selection” dialog (Section 4.6.3) where the operator can state thesite(s) upon which she/he wants to perform download (upload).

4.8.1 Upload / Download of local data base

With this function it is possible to upload (download) all the informations in thedifferent local data bases in each reader.

The different types of information by this upload (download) are the following:

Personnel Groups

Local week programs

Reader Inputs

Reader Outputs

Reader Alarm Functions

Door Timers and Anti passback Zones

As the local data bases are different in each reader the “Select Reader” dialog isused to state the source (or target) for the upload (download) (Section 4.6.2).

Make selection in the “All readers” check box or select a single reader.

After selection the Confirmation dialog is shown (Section 4.7.1) and then theExecution dialog (Section 4.7.2).

Page 63: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-17

4.8.2 Upload and download of global data base

With this function it is possible to upload (download) all the informations in theglobal data bases in each reader. The different types of information by this upload(download) are the following:

Elevator Definitions

Global week programs

Holidays

Limitations in the Anti passback count

As the global data base is the same in all readers, the “Select Reader” dialog isused to state the target for the download (Section 4.6.2).Make selection in the “All readers” check box or select a single reader. Afterselection the Confirmation dialogs is shown (Section 4.7.1) and then theExecution dialogs (Section 4.7.2).

The global data base is the same in all readers, the “Select Reader” dialog isused to state the source for the upload (Section 4.6.2). Select a single reader -any of the readers will do. After selection the Confirmation dialogs is (Section4.7.1) and then the Execution dialogs (Section 4.7.2).

4.8.3 Upload and download of Cards database

With this function it is possible to download all the informations in the Cards database to all the readers.

Example of a dialog with a message.

As the cards data base is the same in all the readers (per site by multi, local-sitesystems), it is only necessary to select one of the readers which then will serveas reference for the download (Section 4.6.2). Select a single reader - any of thereaders will do. After selection the Confirmation dialog is shown (Chapter 5.7.1)and then the Execution dialog (Section 4.7.2).

It is not possible to select “All readers” in this operation.

This download takes place in two steps, first the program takes from thereference reader those elements that the program do not have in its own database (personnel codes, status, presence in an anti passback zone); theseelements are then associated to the cards present in the programs data base toform a transfer file.

Download

Upload

Download

Note

Page 64: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-18

Examples of the execution dialogs during a download.

After this is done the actual download starts onto the reference reader andsimultaneously onto all the other readers (on a sub-bus it is the interfacebridges that perform this operation). The new cards data base will not come intoeffect before the transfer has been completed. During the transfer each readercontinues to work with its old data base.

The cards are downloaded in packets of fifteen cards (seven for theprogrammable card format).It is not possible to stop a download once it has been started. Please note that adownload of 12000 cards can take up to 2 hours. The number of readers in yourinstallation has a very little influence on the download time.

With this function it is possible to upload the total information in the Cardsdatabase in the readers.

As the cards data base is the same in all the readers (per site by multi, local-sitesystems), it is necessary to select one of the readers which then will serve asreference for the upload (Section 4.6.2). Select a single reader (anyone of thereader will do). After selection the Confirmation dialog is shown (Section 4.7.1)and then the Execution dialog (Section 4.7.2).

It is not possible to select “All readers” in this operation.

The cards are uploaded in "packets" of fifteen cards (seven for theprogrammable card format).

After the selection has been validated by activation of the “OK” command buttona new “Transfer” dialog will be shown on the screen.

Example of an execution dialog during an upload.

Do not upload the cards data base from a reader having an incomplete orincorrect data base, this will destroy the (correct) programming on the PC.However, cards missing in the reader will not delete the corresponding carddata on the PC.

Upload

Note

Caution

Page 65: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-19

4.9 Upload and download of holidaysThis menu makes it is possible to upload (download) all holiday periods for thedifferent readers and Intruder centrals.

The menu opens automatically the “Select Intruder CU” dialog (Section 4.6.1)allowing the choice of the Intruder central to which the holiday periods shall beretrieved (sent). After that the “Upload/Download” Confirmation dialog from (to)the Intruder will be shown (Section 4.7.1).

Activation of the “Cancel” command button makes it possible to decide that theupload (download) shall not take place from (to) the Intruder and instead the“Upload/Download” confirmation dialog from (to) the Access Control is shown(Section 4.7.1).

It is not possible to select a particular reader because the holiday periods areidentical on all readers.

Note

Page 66: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-20

4.10 Upload and download for IntrusionSystemThis menu command is used to select which part of the THOR Intruder systemdata base should be up- or downloaded.

Example of “Intrusion Upload/Download” menu command with associated submenu.

Each of the menu commands requires the choice of the Intruder central uponwhich the operator wants to work (source or target); the “Select Intruder CU”dialog (Section 4.6.1) allows the choice between the centrals present in thesystem.

4.10.1 Upload and download of Auto Set Programs

With the “Upload Auto Arm Programs” and “Download Auto Arms Programs”commands, it is possible to upload (download) all the auto setting programs inthe Intruder system.

Please note that an Auto Arm program is not downloaded automatically if youchange the content of an existing program

4.10.2 Upload and download of User Nos./Codes

With thes commands “Upload User Nos./Codes” and “Download UserNos./Codes”, it is possible to upload (download) all user informations (UserNumbers, Codes, Priority, Areas associated) in the Intruder system.

4.10.3 Complete download

With the command “”Download All”, it is possible to download all the AIMS V6programmable parameters of the Intruder system.

The different types of information by this download are the following:

User Configuration

Auto Set Programs

Page 67: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-21

4.10.4 Upload Alarm functions

With the “Upload Alarm Functions” command, it is possible to upload all theAlarm Functions in the Intruder system.

After selection of one of the above mentioned menus the Confirmation dialog isshown (Section 4.7.1) and then the Execution dialog (Section 4.7.2).

4.10.5 Complete upload

With the “Upload All” command, it is possible to upload all the programming of theIntruder system, included the parameters that are not programmable by means ofthe AIMS V6.

The different types of information by this upload are the following:

User Configuration

Area Configuration

Zone Name Configuration

Detector (Circuit) Configuration

Output Configuration

Timer Configuration

Allocation for Output soft types/Timers

Auto Set Programs

Alarm Function Configuration

After selection of the above mentioned menu the Confirmation dialog is shown(Section 4.7.1) and then the Execution dialog (Section 4.7.2).

Page 68: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-22

4.11 “System Operators” commandIn this dialog and the following dialog, each operator can be defined andattributed user rights, corresponding to the wanted level of access to all systemmenus, by clicking in the “Specify Rights” command buttons.

Example of the “System Operators Configuration” dialog.

“Name:” - This name is used to identify the operator (it is logged at every operatoraction).

“Password:” - For security reasons, passwords are masked on the screen withasterisks (*). The program makes no distinction between capital and small letters.

By activation of the “Delete” command button an operator may be erased.

If you are leaving the “System Operators Configuration” dialog with the “Cancel”command button, the new operator just edited will not be created. You will leavethe menu with the existing operators.

To close this dialog you must activate the “OK” command button. This operationwill log all modifications.

Creating a new operator

A new operator can be created by placing the mouse on any operator (“Name”text box) and using the arrow keys. By doing so the operator's name will bedisplayed in inverse video, and a new name can be keyed in. All selected optionswill be erased, allowing you to make new entries.

The preceding operator is not erased, only the “Delete” command button can beused to erase an operator.

The default operator Hi Sec International will automatically be erased after thefirst logout. It is imperative that a new operator is created during the first loginsession.

The “System Operators Configuration” dialog has three check boxes for definingthe access rights to the different menu commands and dialogs; these are dividedinto three families: System (see Section 4.11.1), Access (see Section 4.11.2), andIntrusion (see Section 4.11.3).

Note

Attention

Page 69: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-23

4.11.1 System

In this dialog, the “System” menus accessible to the operator can be defined.

Example of the “System Operators Configuration” dialog

It is only necessary to click on a check box to give the operator access to theselected function (menu).

Each group of menus has a global check box allowing to select or deselect all thefunctions in the group at the same time, thus avoiding the need to click eachfunction separately.

Certain groups of menus give the possibility to limit the operation of validatedoptions.

All the check boxes correspond to different menus in the AIMS V6 program, theirfunctions being explained in the chapters concerned, except for four check boxesand one command button that have special functions. These are "Allowed toExit", "Auto Connect", "Exit with Password", "Operator/Site selection", and "AlarmReset". They are described in the following sections.

This option gives the possibility to decide that an operator will not be able to quitoperation from the PC (it will not be possible to use another program, to closedown or reduce the application, or to change the size of the window).

This option gives the possibility to let the PC perform an automatic connection tothe THOR system after the operator has performed a login procedure. When thefunction is not selected it gives the possibility to deprive certain operators of theright to use the Connect/Disconnect function.

If the operator has access to the graphic menus, this access will beautomatically validated following the automatic connection (provided theconnection was successfully completed).

This option gives the possibility to decide that an operator cannot exit from theAIMS program without performing a logout procedure (Name and Password).This lets the program be accessible for other users without the demand thateach user must close it down after use.

“Allowed to Exit”

“Auto Connect”

Note

“Exit withPassword”

Page 70: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-24

This option gives the possibility to associate the different system operator withlocal site(s). An operator will be associated only with the site(s) she/he isallowed to work with (programming of readers, cards etc.).

For instance, the person responsible for the cards in each building will only beable to operate upon the readers belonging to his own site.

See Section 2.8 for an explanation of the multi, local-site concept.

Example of the “Select Operator Sites” dialog.

Selectable Sites:The left side of the dialog will at the start (for a new operator) contain all sites inthe system.

The right side of the dialog will at the start (for a new operator) be empty.

It is necessary to click on each site in order to move it from one side of thedialog to the other.

When the “Add” button is activated the selected site is transferred to the rightside of the dialog.

When the “Rem.” button is activated the selected site is transferred to the left sideof the dialog.

When the “All Sites” check box is activated all the sites are transferred to the rightside of the dialog.

If this dialog is quitted by activation of the “Cancel” command button the newattribution will not be created, the existing attribution will still be valid.

To close this dialog, you must activate the “OK” command button. This will store(validate) all the modifications performed.

The definition of the sites (association with the bus) is the responsibility of theinstaller, in accordance with the site configuration and the needs of thecustomer. The site definition cannot be modified by means of the AIMSprogram.

Operator/Siteselection

Definition of sites

Page 71: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-25

By activation of the “All Alarms” option button it is defined that the operator isauthorized to perform all valid options for all possible alarms in the combinedsystem (Intruder and Access Control).

Activation of the “Selected Alarms” option button gives the possibility to definethe alarm categories (types) that the operator will be allowed to accept andclear. The option button will open a new dialog, where the alarm types can beselected.

For each operator, it is possible to define the alarms he can accept or reset.

The alarms can be divided into three types: Intruder, Access Control, and AIMSsoftware alarms.

Example of the “Alarm Reset” dialog.

A list box displays all the existing alarm types. You must make your selectionfrom this list. A multiple selection is possible.

The “OK” command button sends you back to the “ System OperatorsConfiguration” dialog.

4.11.2 Access

In this dialog the Access Control menus accessible to the operator can bedefined.

Example of the “Access Operators Configuration” dialog.

It is only necessary to click on a check box to give the operator access to theselected function (menu).

Alarm reset

Page 72: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-26

Each group of menus has a global check box allowing to select or deselect all thefunctions in the group at the same time, thus avoiding the need to click eachfunction separately.Certain groups of menus give the possibility to limit the operation of validatedoptions.

All the check boxes correspond to different menus in the AIMS V6 program, theirfunctions being explained in the chapters concerned, except for one pair of checkboxes and one pair of option buttons that have special functions. These are "EditCards", "Create & Delete" (cards), "All Cards", and "Selected Cards". They aredescribed in the following.

The “Cards” dialog has been divided into two different levels.

1st level: Edit CardOn this level the operator will have the possibility to change the personnel groupfor a card, to block a card etc. This level will be given to operators working withthe access on each site.

2nd level: Create & DeleteBesides the preceding rights this level gives the possibility to create and deletecards in the system (applicable on all sites). This level is reserved for the personresponsible for security or for the cards. The same person can also be the onlyone that is allowed to define new operators for the PC.

By activation of the “All Cards” option button it is defined that the operator isauthorized to perform all valid options for all the cards in the system.Activation of the “Selected Cards” option button gives the possibility to definethe card categories (numbers) that the operator will be allowed to handle (edit).

It is possible to limit the number of cards which can be shown to or edited byeach operator. It can work on 32 card groups with maximum 2000 cards in eachgroup. Group 1 contains the cards numbered from 1 to 1999, group 2 containsthe cards numbered from 2000 to 3999 and so on.

Example of the “Cards” dialog.

The total number of programmed cards in the system cannot exceed 12000.

The selection of card groups can be made by clicking on each group wanted. Amultiple selection is possible.

The “OK” command button sends you back to the “System OperatorsConfiguration” dialog.

Level of Cardediting.

Selection of CardGroups

Page 73: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-27

4.11.3 Intrusion

It is only necessary to click on a check box to give the operator access to theselected function (menu).

Example of the “Intrusion Operators Configuration” dialog.

The menu group has a global check box allowing to select or deselect all thefunctions in the group at the same time, thus avoiding the need to click eachfunction separately.

All the check boxes correspond to different menus in the AIMS V6 program,their functions being explained in the chapters concerned, except for onecommand button that has a special function that is described below.

Activation of the “Select CU-User” command button gives the possibility todefine for an operator a “User Category” in the Intruder system; it also gives thepossibility to define (correspondent with the programming of the Intrudersystem) the area, the zones, and the circuits upon which the operator will beauthorized to operate, likewise the priority level, stating the possible actions forthe User Category in the Intruder system, can be defined.

In case of a multi-central Intruder system it is possible to define for the operatora User Category on each central unit, the “Select Central Unit” drop-down listbox permits the choice of the specific central unit and the “Select User” drop-down list box permits the choice of a User Category for the specified centralunit.

In the following dialog is indicated the central units and the user category for theoperator during the selection procedure.

Example of the “Select CU-User” dialog.

Selected User

Page 74: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-28

When the user category is chosen to be "Supervisor" the operator will beauthorized to perform the validated options in all parts of the Intruder system (allareas, zones, circuits etc.).

If you are leaving this dialog by activating the “Cancel” command button, thenew operator just edited will not be created. You will leave the dialog with thesame existing operators as before.

The “OK” command button sends you back to the “System OperatorsConfiguration dialog.

Page 75: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-29

4.12 “Import” commandThis menu comprises three import categories accessible in the AIMS program.

Example of the “Import” menu command with associated submenu

Import of configuration files produced in AICS V6 (Not available).

Import of card files in a non-HI SEC format.

Import of graphic configuration files produced in GDT V5.

4.12.1 Import system configuration

This dialog is no longer available.

4.12.2 Import cards of special format

This function makes it possible to re-use files created in an external program(data bases or other sources), this way avoiding to repeat the work alreadydone elsewhere. Before importing the files, they must have been exported bythe original program.

The intent of this function is not to import the card numbers but alone thedescriptive files for each card.

You must state precisely the origin of the files (default C:\AIMS). Another path(or drive) can be indicated by the operator by a double click in the “Directories”list box on the wanted directory or drive.

Example of the “Import Cards – File Selection” dialog

The program indicates in the “File name” list box the files at disposal for thechosen directory. The selected file is shown at the top of the list box.

It is possible to state the wanted format for the imported file. This choice ismade in the drop-down list box “List of file types:” and may be one of two:

*.TXT = standard ASCII format

*.DBF = dBase IV format (Not available in all versions)

Attention

Page 76: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-30

The four “Select Import Function:” option buttons make it possible to state thetype of import wanted:

The import will serve to complete the present data base on the PC.

The import will serve to replace the present data base on the PC. The olddatabase will be destroyed, it is therefore necessary to use this option with thegreatest care.

The import will serve to complete the present data base and at the same timedownload the changes.

The import will delete the specified cards and download the changes to thereaders.

When on-line, the auto-create and auto-delete functions can handle max. 100cards.

When the “OK” command button is activated, the precise number of cards in thefile is shown. If you are sure that you want to import the file, the “Yes” commandbutton is activated and the import begins, the number of imported files isindicated by a percentage and a graphic bar. When the import has beensuccessfully performed a message is shown.

Example of confirmation and execution dialogs for import of Cards.

An import of cards modifies the data base on the PC. It is therefore imperativeto proceed with performing a download (of the new cards data base) by meansof the menu command “Download Cards” (see Section 4.8.3) in order to updatethe Access Control installation (- if “Append with auto create” or “Append withauto delete” has not been selected).

4.12.3 Import of graphics

This function makes it possible to import graphic files created by the graphicprogram GDT. Before importing the graphic files, they must have been exportedby the GDT program.

You must state precisely the origin of the files (default C:\AIMS). Another path (ordrive) can be indicated by the operator in the “Directories:” list box.

The program states the name of the graphic Project (drawing, circuit etc) foundin the directory (or diskette). It is not possible to have more than one graphicproject in the same directory (or on the same diskette).

Import functions

“Add Cards”

“Replace Cards”

“Append withauto create”

“Append withauto delete”

Note

Attention

Page 77: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-31

Example of the “Open” dialog used for importing graphics.

When the “OK” command button is activated, the import begins, and a graphicbar indicating the percentage of the import executed is shown in the dialoguebox.

Never attempt to import the graphic files directly from the directory of theGraphic Design Tool program, they must have been exported beforehand bythe GDT (to a diskette or a temporary directory).

Importing graphicsfrom GDT

Page 78: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-32

4.13 “Export” commandThis menu comprises two export categories accessible in the AIMS program.

Example of the “Export” menu command with associated submenu.

Export of configuration files to AICS (Not available)

Export of card files in a non-HI SEC format to another program

4.13.1 Export system configuration

This dialog is no longer available.

4.13.2 Export cards of special format

This function makes it possible to re-use files created by the AIMS program in anexternal program (data base or other), this way avoiding to repeat the workalready done.The intent of this function is not to export the card numbers but alone thedescriptive files for each card.

You must state precisely the destination of the files (default C:\AIMS). Anotherpath (or drive) can be indicated by the operator by a double click in the“Directories” list box on the wanted directory or drive.

Example of the “Export Cards – Ascii Format” dialog.

The program indicates in the “File name” list box the files at disposal for thechosen directory. The selected file is shown at the top of the list box. If export iswanted to a not yet existing file name, the wanted file name and its extensionmust be entered.A single format for the file to be exported is at disposal in the drop-down list box

*.TXT = Standard ASCII format

Attention

“Directories”

“List of file types”

Page 79: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-33

By two option buttons “All Cards” and “Specify Cards”, the wanted option can beselected. If the option “Specify Cards” is selected you must state specifically thenumber of the first card (“From”) and the number of the last card (“To”) in thecorresponding text boxes.

When the “OK” command button is activated, the precise number of cards in thefile is shown in a new dialog.

Example of confirmation and execution dialogs for export of Cards.

If you are sure that you want to export the file, the “OK” command button isactivated and the export begins, the number of exported files is indicated by apercentage and a graphic bar. When the export is successfully performed amessage is shown.

If you have the Image Badging Module 95T IBM installed, all photos will beexported in .JPG format.

“Select ExportFunction”

Page 80: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-34

4.14 “Backup” commandIn this dialog, it is possible to save the complete system configuration in a file.The operator can specify a directory on the hard disk or a drive by a doubleclick in the list box.

Example of the “AIMS Backup” dialog.

It is possible to save onto an already existing file; In that case, click directly onthe directory, the existing (old) file will be removed and will then be replaced bythe new file when the backup starts.

The saving of the logs can be included in the backup by clicking in thecorresponding check box.

When the “OK” command button is activated, the saving begins and a newTransfer window is displayed, indicating the percentage with a graphic bar.

Example of the “Backup” transfer window.

The program may require several diskettes depending of the configuration, it istherefore advisable to have a sufficient supply of formatted diskettes at hand.

No. of diskettes

Page 81: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-35

4.15 “Restore” commandIn this dialog, it is possible to restore a complete system configuration from anearlier made backup file.The purpose of the restore is to reinstall old backup files in case you experienceproblems with the existing data base.

Example of the “AIMS Restore” dialog

The operator must specify where the backup file can be found by a double clickon the directory concerned on the hard disk or on a diskette drive.

The logs can be included in this restore by clicking in the corresponding checkbox.

When you have made your choices in the “AIMS Restore” dialog and clicked the“OK” button, you are prompted for inserting inserting the first diskette of thebackup file.if you have specified a patch with the diskette drive

Example of the dialog prompting for inserting the first diskette of the backup file.

When the “OK” command button is activated, the restore begins and a newtransfer dialog is displayed, indicating the percentage with a graphic bar.

Example of “Restore” transfer dialog.

At the end of the restore operation the program indicates the restore has beenperformed and demands to exit the AIMS program. This is obligatory due to the

Page 82: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-36

fact that the files that are going to be restored already are used in the currentsession.

Example of and error message.

The restore of a backed-up configuration will destroy your current configuration(and eventually your log) and will replace your configuration with the configurationfrom the backup. Before any restore, it is (in principle) imperative to save thecurrent configuration, as this may be used in the future.

Attention

Page 83: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-37

4.16 Print Access Control configurationThis menu allows printing of the AIMS Access Control data base configuration.

The operator can demand the printing of the following data categories:

Example of the “Access Print-outs” menu command with associated submenu.

For most of the menu commands, a dialog will be opened where the range canbe specified. Where this type of dialog is not available, a new “Printing” dialog(Section 4.20) is displayed, allowing the selection of fonts and printer drivers.

The “All” menu command allows the printing of the total data base for the AIMSAccess Control system.

4.16.1 “Holidays” command

By means of this command all 25 holiday periods programmed in the systemcan be printed. Please note that only the holiday periods programmed areprinted.

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of printout of holidays

05/0194 11:07 Holidays Page 001

Defined Holiday Intervals : 01/01 – 01/01 : Sunday 04/04 – 04/04 : Sunday 12/05 – 12/05 : Special 1 23/05 – 23/05 : Sunday 14/07 – 14/07 : Sunday 01/08 – 15/08 : Sunday 24/12 – 24/12 : Special 2 25/12 – 25/12 : Sunday

Page 84: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-38

4.16.2 “Personnel Groups” command

By means of this command you can print all or selected parts of the (up to 250)personnel groups programmed in the access control system. Please note thatonly the personnel groups programmed are printed.

When this command is activated, a “Select” dialog is displayed. Select thegroups to print and click “OK”. A new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of printout of personnel groups

05/0194 11:16 Personnel Groups Page 001

Personnel Group No. : .................... 006Personnel Group Name : ................. EDP StaffMax. Time (min) inside each zone :OUTSIDE BUILDING ....................... 000ADMINIST. BUILDING .................... 000Computer room ................................ 0002nd floor ........................................... 000Stock................................................. 010Service department........................... 000Canteen ............................................ 000Not used........................................... 000Not used........................................... 000Not used........................................... 000Not used........................................... 000Not used............................. ............. 000Not used........................................... 000Not used........................................... 000Not used........................................... 000Not used........................................... 000

4.16.3 “Departments” command

By means of this command all the Departments programmed in the system canbe printed. Please note that only the Departments programmed are printed.

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of printout of personnel groups

18/01/95 15:13 Departments Page 001

Department : ..................... AdministrationDescription : .....................

Department : ..................... E. D. P.Description : ......................

Department : ..................... ProductionDescription : ......................

Department : ..................... R & DDescription : ......................

Page 85: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-39

4.16.4 “Cards” command

This command displays a dialog that gives you the possibility to select printingof either all cards or just a specific range.

Example of “Select Cards” dialog for selecting cards to print.

Two drop-down list boxes give the possibility to choose the wanted option. Youstart in the left “Card Selection” drop-down list box, and the choices might be:

All cards will be selected.

Click in the “No.: / Name:” list box (a multiple selection is also possible).

Select the required Department in the “Specify Selection” drop-down list box.

Select the required Permanent Personnel Group in the “Specify Selection” drop-down list box.

Select the required Temporary Personnel Group in the “Specify Selection” drop-down list box.

By the two option buttons the wanted format of the print-out can be chosen. The“Full print” option button will give a print-out of all informations for each card,while the List Print” option button gives a print-out with short form data for eachcard (number, initials, priority, and personnel group) as shown below.

When the “OK” command button is activated, a new “Printing” dialog (Section4.20) is displayed, allowing the selection of fonts and printer drivers.

“All Cards”

“Select card(s)”

“Department”

“PermanentPersonnel Grp.”

“TemporaryPersonnel Grp.”

Page 86: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-40

Example of print-out with the “Full print” option.

05/01/94 10:49 Cards Page 001

Card No.: .......................... 00005Priority : ............................ 0Name :............................... John SmithInitials : ............................. SmithAddress : .......................... Coventry Road 85Employer No.: ................... 123456Department : ..................... SecurityTel. No. : ........................... 070 854 321Car reg. No.: ..................... 234HN432Sex : ................................. MaleSoc. Sec. No.: ................... 3445 223 331Date of birth ...................... 12 01 53Nationality.......................... BritishContact Per. ...................... Mrs. SmithBlood Gr. ........................... BPermanent Personnel Group : (003) Security manager Valid Period : ................. “Unlimit”Temporary Personnel Group : (003) Security manager Valid Period : ................. “Unlimit”

Example of print-out with the “List” option.

05/01/94 10:48 Cards Page 001

Card No. Initials Priority Personnel Group

00005 Smith 0 (003) Security manager00006 Wayne 0 (004) R & D Staff00007 Johnson 0 (004) R & D Staff00008 Berry 0 (005) Production Staff00009 Warner 0 (002) Directors00010 Brown 0 (002) Directors00011 Armstrong 0 (006) E D P Staff00012 0 (005) Production Staff

4.16.5 “Messages” command

By means of this command all (up to 31) messages programmed in the systemcan be printed.

Three message categories will be printed:

Standard messages (01 to 10)

Individual messages for cards (11 to 25)

Individual messages for personnel groups (26 to 31)

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Page 87: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-41

Example of print-out Messages.

05/01/94 10:56 Messages Page 001

Standard Messages ... 01 : CONTACT PERSONNEL DEPT. 02 : CONTACT YOUR HOME 03 : CONTACT SECURITY 04 : CONTACT RECEPTION 05 : IMPORTANT PHONE MESSAGE 06 : CONTACT YOUR MANAGER 07 : HAPPY BIRTHDAY ! 08 : CALL HEAD OFFICE PLEASE 09 : CONTACT R & D PLEASE 10 : CONTACT SALES DEPARTMENT

Induvidual Messages for cards ....11 : CALL MR. FORD, IBM12 :13 :14 :15 :16 :17 : 18 :20 :21 :22 :23 :24 :25 :

Individual Messages for Personnel Groups ....26 : MEETING AT 2:30 IN MEETING ROOM27 :28 :29 :30 :31 :

4.16.6 “Anti Passback Zones” command

This command displays a dialog that gives you the possibility to select of eitherall anti passback zones or just a specific anti passback zone.

Example of the “Select” dialog with antipassback zones.

Each anti passback zone is displayed with its number and name.

The “Selection” drop-down list box allows selection of two options: “Select All”or “Unselect All”.

Page 88: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-42

The zones may also be selected one by one by clicking in the “No.: / Name:” list box (amultiple selection is also possible).

The option button “Print Reader(s) in Zone” makes it possible to select a print-out with the readers included in the zone.

When the “OK” command button is activated, a new “Printing” dialog (Section4.20) is displayed, allowing the selection of fonts and printer drivers.

Example of print-out of Anti Passback zones.

05/01/94 11:18 Anti PassBack Zones Page 001

Zone No.: .......................... 01Zone Name : ..................... ADMINIST. BUILDINGDescription :....................... This zone covers the main buildingAnti PassBack Level : ....... No Anti PassBackEntry Readers : (02) MAIN ENTRANCE ENTRY

Exit Readers : (03) MAIN ENTRANCE EXIT

Inside Readers : (04) R & D ENTRANCE (05) E D P ENTRANCE

4.16.7 “Week programs” command

This command displays a dialog that gives you the possibility of printing ofeither all week programs or just a specific part.

Example of the “select” dialog with week programs.

Each week program is displayed with its number and name.

The “Selection” drop-down list box allows selection of two options: “Select All”or “Unselect All”.

The week programs may also be selected one by one by clicking in the “No.: /Name:” list box (a multiple selection is possible).

When the “OK” command button is activated, a new “Printing” dialog (Section4.20) is displayed, allowing the selection of fonts and printer drivers.

Page 89: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-43

Example of print-out of Week Programs.

05/01/94 11:01 Week Programs Page 001

Week Program No.: ......................... 01Week Program Name : .................... Normal staff week prg.Day : Monday From To Function 00:00 07:00 No Access 07:00 16:00 Access without PIN-code 16:00 19:00 Access with PIN-code 19:00 24:00 No AccessDay : Tuesday From To Function 00:00 07:00 No Access 07:00 16:00 Access without PIN-code 16:00 19:00 Access with PIN-code 19:00 24:00 No AccessDay : Wednesday From To Function

4.16.8 “Readers” command

This dialog gives you the possibility to select printing of either all readers, of aspecific group of readers or just one specific reader.

Example of the “Select” dialog readers.

Each reader is displayed with its number and name. To select one or morereaders, click in the “No.: / Name:” list box

The “Selection” drop-down list box give the possibility to choose other options;the choices are:

All readers will be selected

The current selection of Readers is canceled

Selects all readers associated with an exit zone in a system with anti passback.This displays the ” Specify Selection” drop-down list box , where you can selecta specific reader in the exit zone.

Selects all readers associated with an entry zone in a system with antipassback. This displays the ” Specify Selection” drop-down list box , where youcan select a specific reader in the entry zone.

“Select All”

“Unselect All”

“Exit Zone”

“Entry Zone”

Page 90: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-44

If you check the “Option” box, the print-out will also include Personnel Groups.

When the “OK” command button is activated, a new “Printing” dialog (Section4.20) is displayed, allowing the selection of fonts and printer drivers.

Example of print-out of Readers.

05/01/94 11:11 Readers Page 001

Reader No.: ............................. 02Reader Name : ........................ MAIN ENTRANCE ENTRYDescription :.............................Reader Group : ........................ (002)Week Program for log : ............ (31) Log normalWeek Program for Door :.......... (63) Door normalWeek Program for Output 1 :.... (95) Output OffWeek Program for Output 2 :.... (95) Output OffDoor Definitions : Striking Plate Duration time : ............... 15 Doort open time before warning : ......... 30 Warning period before Door Held : ...... 10 Time to enter Pin-Code : ...................... 20 Max number for retry Pin-Code : .......... 10

4.16.9 “Elevator Definitions” command

By means of this command all the elevator definitions programmed in thesystem can be printed. Please note that only the elevator definitionsprogrammed are printed.

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of print-out of Elevator Definitions.

05/01/94 11:32 Elevator Definitions Page 001

Elevator Prg. No.: .............. 03Elevator Prg. Name : ......... Service department floorsDescription :....................... This definition covers floor 0 and 3.Elevator Definitions ( 1=include 0=exclude ) : Ground floor..................... 1 not used....................... 0 Floor 1.............................. 0 not used....................... 0 Floor 2.............................. 0 not used....................... 0 Floor 3.............................. 1 not used....................... 0 Floor 4.............................. 0 not used....................... 0 Floor 5.............................. 0 not used....................... 0 Floor 6.............................. 0 not used....................... 0 Floor 7.............................. 0 not used....................... 0 not used........................... 0 not used....................... 0 not used........................... 0 not used....................... 0 not used........................... 0 not used....................... 0 not used........................... 0 not used....................... 0 not used........................... 0 not used....................... 0 not used........................... 0 not used....................... 0 not used........................... 0 not used....................... 0

Page 91: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-45

4.16.10 “Guard tours” command

By means of this command all the guard tours programmed in the system can beprinted. Please note that only the guard tours programmed are printed.

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of print-out of Guard Tours.

05/01/94 11:45 Guard Tours Page 001

Guard Tour No.: .............. 01Guard Tour Name : ......... Week-end tourDescription :....................... This tour must be made each hour during the week-ends. Seq. No. Reader Name Time (min) 00 Time to first reader 005 01 MAIN ENTRANCE ENTRY 005 02 R & D ENTRANCE 005 03 E D P ENTRANCE 010 04 MAIN ENTRANCE EXIT 010

Page 92: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-46

4.17 Print Intrusion configurationThe “Intrusion Print-outs” command gives access to printing of the AIMS Intrudersystem data base configuration.

The operator can demand the printing of the following data categories:

The “Intrusion Print-outs” menu command with associated submenu.

All menu commands will automatically call the “Select Intrusion CU” dialog(Section 4.6.1) onto the screen. In this dialog the operator can select theIntruder central for which the data shall be printed.

After selection of the CU, a dialog will be opened where the range can bespecified. Where this type of dialog is not available, a new “Printing” dialog(Section 4.20) is displayed, allowing the selection of fonts and printer drivers.

The “All” menu command allows the printing of the total data base for the AIMSIntruder system.

4.17.1 “Auto Arm Programs” command

This menu command gives you the possibility to print out all the Auto Set Areasprogrammed in each Central Unit of the Intruder system.

Example of the “Select” dialog with auto-arm programs.

The “Select” dialog opens so you can choose which auto arm program(s) youwant to print.

Each program is displayed with its number and name. To select one or moreprograms, click in the “No.: / Name:” list box

Page 93: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-47

The “Selection” drop-down list box give the possibility to choose other options;the choices are:

All programs will be selected.

The current selection of programs is canceled.

Each area with automatic setting will be printed with the following parameters:

Designation for the Central Unit chosen

No. of the Program

Description

Contents

When the “OK” command button is activated, a new “Printing” dialog (Section4.20) is displayed, allowing the selection of fonts and printer drivers.

Example of print-out of Auto Set Time Programs.

18/01/95 16:06 Auto Set Time Programs Page 001

Week Program No.: ......................... 4-01Week Program Name : .................... Auto Set ProductionDay : Monday From To Function 00:00 06:30 Set at start 06:30 18:00 No change 18:00 22:00 Set at start – at end, if delayed 22:00 24:00 Set at startDay : Tuesday From To Function 00:00 06:30 Set at start 06:30 18:00 No change 18:00 22:00 Set at start – at end, if delayed 22:00 24:00 Set at startDay : Wednesday From To Function 00:00 06:30 Set at start

4.17.2 “Zones” command

The menu command gives you the possibility to print out a list of all Zonesprogrammed in the Intruder system.

Each Zone will be printed with the following parameters:

Designation for the Central Unit chosen

Zone No.

Zone Name

Description

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

“Select All”

“Unselect All”

Page 94: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-48

Example of print-out of Intrusion Zones.

05/01/94 11:33 Intrusion Zones Page 001

Zone No.: .......................... 01Zone Name : ..................... HALLDescription :....................... This zone includes all doors going to the hall.

Zone No.: .......................... 02Zone Name : ..................... EDP ROOMDescription :.......................

Zone No.: .......................... 03Zone Name : ..................... R + DDescription :.......................

4.17.3 “Areas” command

The menu command gives you the possibility to print out a list of all Areasprogrammed in the Intruder system.

Each Area will be printed with the following parameters:

Designation for the Central Unit chosen

Area No.

Area Name

List of zones included in the area

Description

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of print-out of Areas.

05/01/94 11:35 Areas Page 001

Area No.: ........................... 001Area Name : ...................... Service areaDescription :.......................Type : ................................ PhysicalZones in area :

(01) HALL (02) EDP ROOM (03) R + D (04) PRODUCTION (05) ADMINISTR. (06) STOCK (16) TECHNIC.

Area No.: ........................... 002Area Name : ...................... Hall, Prod., Admin.Description :....................... This area must be set, when the last persons have left.Type : ................................ LogicalZones in area :

Page 95: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-49

4.17.4 “User Nos./Codes” command

The menu command gives you the possibility to print out a list of all Users in theIntruder system.

Each User will be printed with the following parameters:

Designation for the Central Unit chosen

User No.

User Name

Priority for the user

Description

Area controlled by the User and Area Type

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of print-out of Intrusion Users.

05/01/94 11:35 Intrusion Users Page 001

User No.: ........................... 001User Name : ...................... System ManagerPriority :.............................. (2)-Master ManagerArea : ................................. 001 Service area

Physical

User No.: ........................... 002User Name : ...................... Normal staff codePriority :.............................. (0)-Normal OperatorArea : ................................. 002 Hall, Prod., Admin.

Logical

4.17.5 “Input Addresses” command.

The command gives you the possibility to print out a list of all Inputs programmedin the Intruder system. Please note that only programmed inputs are printed out.

Each Input will be printed with the following parameters:

Designation for the Central Unit chosen

Input No.: (address)

Input Name

Logical soft type for the input

Zone to which the input belongs

Page 96: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-50

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Example of print-out of Intrusion Inputs.

05/01/94 11:36 Intrusion Inputs Page 001

No. Name Input Type Zone

032 MAIN ENTRY DOOR04 Entry Route HALL033 MAIN ENTRY DOOR04 Entry Route HALL034 R +D ENTRY DOOR 01 Normal Night R +D035 DOOR EDP ROOM 01 Normal Night EDP ROOM076 PC CON. FAULT 16 Sys. Fault 4 (Mains) TECHNIC.077 INCOM HW FAULT 15 Sys. Fault 3 (CPU Reset) TECHNIC.078 TRANS BLOC INCC 14 Sys. Fault 2 (Service Mode, tlp.) TECHNIC.079 PHONE LINE FAULT14 Sys. Fault 2 (Service Mode, tlp.) TECHNIC.080 INCOM 3 F CODES 13 Sys. Fault 1 (Bat. Mains 1h) TECHNIC.081 BATTERY FAULT 13 Sys. Fault 1 (Bat. Mains 1h) TECHNIC.082 MAINSPOWER 16 Sys. Fault 4 (Mains) TECHNIC.083 S-ART POWER 15 Sys. Fault 3 (CPU Reset) TECHNIC.084 MAINS POWER 1H 13 Sys. Fault 1 (Bat. Mains 1h) TECHNIC.085 SERVICE MODE 14 Sys. Fault 2 (Service Mode, tlp.) TECHNIC.086 RAM CHECKSUM 15 Sys. Fault 3 (CPU Reset) TECHNIC.

4.17.6 “Output Addresses” command

The command gives you the possibility to print out a list of all Outputsprogrammed in the Intruder system. Please note that only programmed outputsare printed out.

Each Output will be printed with the following parameters:

Designation for the Central Unit chosen

Output No.: (address)

Logical soft type for the output

Zone to which the output belongs

When this command is activated, a new “Printing” dialog (Section 4.20) isdisplayed, allowing the selection of fonts and printer drivers.

Page 97: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-51

Example of print-out of Intrusion Outputs.

05/01/94 11:37 Intrusion Outputs Page 001

No. Output Type Zone Timer

100 01 : Common Alarm Common 07101 21 : Fire Alarm Common 02102 07 : Holp-up Alarm Common 02901 45 : 1h Mains Fault Common 00902 48 : CPU-Reset Common 00903 44 : Trouble Common 00904 47 : Isolation Common 00910 46 : Fire Alarm Common 00920 39 : Hold-up/Duress Common 00930 34 : Tamper Common 00940 33 : Intrusion Common 00950 38 : Set/Unset Zone (isolations allowed) Common 00960 32 : Set/Unset Area (isolations allowed) Common 00970 41 : Technic 1 Common 00980 42 : Technic 2 Common 00990 43 : Transmission Test (Minitel) Common 00

4.17.7 “Alarm functions” command

The dialog gives you the possibility to print out a list of all Alarm Functionsprogrammed in the Intruder system.

Each Alarm Function will be printed with the following parameters:

Designation for the Central Unit chosen

Alarm Function No.: (address)

Contents of the Alarm Function

Output controlled and Timer associated

When this menu is activated, a new Printing dialog (Section 4.20) is displayed,allowing the selection of fonts and printer drivers.

Example of print-out of Alarm Functions.

05/01/94 11:40 Alarm Functions Page 001

No. Function Out, Tim. .851 : 100+101+102+103+000+000+000+000+000+000+000 = 103 , 02852 : 102+000+000+000+000+000+000+000+000+000+000 = 104 , 02853 : 100+000+000+000+000+000+000+000+000+000+000 = 105 , 02854 : 000+000+000+000+000+000+000+000+000+000+000 = 000 , 02

Page 98: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-52

4.18 “Remote Print-outs” commandThe “Remote Print-outs” command gives access to a submenu with the range ofprint-out commands shown in the figure below

“Remote Print-outs” command with associated submenu.

For most of the commands, a dialog will be opened where the range can bespecified. Where this type of dialog is not available, a new “Printing” dialog(Section 4.20) is displayed, allowing the selection of fonts and printer drivers.

The commands of the submenu are described in the following Sections 4.18.1to 4.18.7.

4.18.1 “Local Modems” command

This function is not yet implemented

4.18.2 “Remote Sites (List)” command

The “Remote Sites” command enables the printing of the configuration of theremote sites with number, name, primary and secondary call number and level.

When the command is selected, the presented dialog gives access to otherdialogs for selection of fonts and setup of the used printer. See Section 4.20.

Example of the “Printing...: Remote Sites List” dialog.

If selection of fonts and setup of printer are already performed, you can click the“OK” button of the “Printing…:” dialog to perform the printing. See the examplebelow.

Page 99: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-53

Example of printout of Remote Sites List.

12/07/98 11:35 Remote Sites List Page 001

No. Name Primary No. Secondary No. Level

01000 Ballerup 4486050501001 Valby 3253878901002 Hellerup 3456789001003 Copenhagen C 45678901

4.18.3 “Remote Sites” command

This function is not yet implemented.

4.18.4 “Remote Modems”

This function is not yet implemented.

4.18.5 “Routine Call Week programs” command

This function is not yet implemented.

4.18.6 “Routine Call Setup” command

This function is not yet implemented.

4.18.7 “All” command

This function is not yet implemented.

Page 100: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-54

4.19 “Real Time Alarm Printing” commandThis menu gives the possibility to activate the real time alarm printing - function,thereby it permits a real time printing of the alarms in the installation directly tothe PC, without the need to go via the “Reports” menu.

Example of the “Real Time Printing Setup” dialog.

The format is identical to that obtained on a printer directly connected to theTHOR system.

The printer connected to the PC must be a matrix printer (printing on each line)and it must work in compressed mode (132 characters per line).Please note that It is not possible to select font or character size for the print-out.

Please note that the HI SEC Alarm Printer must be selected as WindowsDefault Printer when using “Real Time Alarm Printing” command.

If a report printer is connected permanently to the PC, the real time printer mustbe connected to a supplementary printer port.

When the “Enable Real Time Printing” check box is activated, the real timeprinting function is validated and the validation is stored in memory and staysactive until turned off again.

The three check boxes in the “Specify” field make it possible to route thealarms for the real time printer through the wanted type of alarm filter (Section9.2).

With the “Printer LPT:” drop-down list box the output port from the PC to theprinter can be chosen.

Printer

Printer port

Page 101: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-55

4.20 PrintingBy this dialog can be selected if you wish to change the fonts and to set up theprinter before starting a print-out.

Example of the “Printing… :” dialog.

The two corresponding command buttons open two new dialogs.

When the “OK” command button is activated, a new “Printing” dialog isdisplayed, allowing you to stop the print-out.

4.20.1 “Font” dialog

By this dialog the “Font” and “Style” can be selected and also the “Size” of thecharacters.

Example of the “Fonts” dialog.

Each parameter has its drop-down list box selection of the wanted value.Please note that the fonts and sizes available are linked to the printer you haveinstalled under Windows.

When the “Ok” command button is activated, the ”Printing” dialog (Section 4.20)is displayed again.

Page 102: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-56

4.20.2 “Printer setup” dialog

By this dialog the parameters in the printer configuration can be changed.

Example of the “Print Setup” dialog.

The default selected printer in Windows can be replaced by another byselecting it from the corresponding “Specific Printer” drop-down list box.

To have a choice between different printers in the “Specific Printer” list box, youmust have configured several printers when installing Windows connected todifferent communication ports. If you have installed just one printer, this list boxwill contain the default printer.

The “Orientation” option buttons allow selection of the printing direction (Portraitor Landscape).

The “Paper” drop-down list boxes allow selection of the paper size and source ifyour printer allows it.

The “Options” command button opens a new dialog, which allow you to changethe printer configuration. This dialog is different for each printer.

Example of a printer configuration dialog.

When the “OK” command button is activated, the “Printing” dialog (Section 4.20)is displayed again.

Printers

Page 103: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-57

4.21 NetworkThese menus (available on server only) make it possible to view the differentstates for the communication server and the clients connected to the server.

Example of the “Network” menu command and associated submenu

4.21.1 Status for Communication Server.

In this dialog the clients on the communication server will be shown.

Example of the “Network Server Status” dialog.

The address used by the network protocol for the exchange of messages anddata packets.

This shows the number of clients connected to the server at the moment. Thefollowing dialog will show further informations about the clients connected.

Status for the connection towards the server and the THOR system (Bus 485).

The PC address (95T GPI COM interface address) on the THOR system. Thetwo first digits represent the address on THOR and the two last digits representthe address on the server.

4.21.2 Client connections to Network

In this dialog the clients on the communication server will be shown. Each Clientis shown with THOR system address as well as with IP address (See 4.21.1above) and the operator in session at the moment at the client position.The THOR address will be from 01 and upwards, depending on the number ofclient connections. The client address on the server will always be 01.

Example of the “Network Client Connections” dialog.

“IPX Address”

“Number of PCClients connected”

“MMP Status”

“THOR Address”

Page 104: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-58

4.22 “About” commandThis command displays the “About” dialog where the the program author andthe version number can be displayed. Also the Site code for the program isshown.

If you hold down the CTRL key while clicking the “About” command, all optionalprograms installed will also be displayed.

Example of the “About” dialog.

Page 105: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

92000701 4-59

4.23 “Exit” commandThis command quits the program and the PC returns to the main program group(Windows).

The “Exit” command signals to the program that the communication is about tobe cut, therefore the program logs the configuration (stop point) in all readers, inthis way making it possible (at some later time) to restore all events have takenplace between the disconnection and the next connection.

Page 106: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“System” menu

920007014-60

This page is intentionally left blank.

Page 107: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 5-1

5555

“Status” menu“Status” menu“Status” menu“Status” menuThis chapter provides a detailled description of the “Status” menu.

The chapter contains the sections listed in the following table.

Section Page

Alarm status 5-3

Master Area status 5-6

Status for Intrusion Central Units 5-7

Symbols and buttons in Intrusion Status dialogs 5-8

Area status 5-9

Zone status 5-11

Circuit status 5-12

Setting fault 5-14

Door status 5-15

Door control 5-16

Show event log 5-17

Show operator log 5-18

Show log status 5-19

Introduction

This chapter

Page 108: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-2

Overview of the “Status” menuThe commands of the “Status” menu depends on whether the system isdisconnected or connected as shown in the figure below.

Example of the “Status” menu with the system disconnected and connected.

The various menu commands and their associated dialogs are described in thefollowing sections.

A description of the dialogs and the facilities of the “Graphics Presentation”menu command is provided in Chapter 14.

Disconnected orconnected

GraphicPresentation

Disconnected Connected

Page 109: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-3

5.1 Alarm statusThe “Alarm Status” window gives an overview of the alarm situation in thesystem.The dialog can be obtained in two ways: manually, validating the function withthe “Alarm status” menu command or automatically, whenever an alarmprogrammed as a "pop-up" type is detected in the system (Online).

Example of the “Alarm status” window.

The size of this dialog can be enlarged (to full screen) to display more alarms asdescribed in Section 3.2.

This window works in multi-task mode. It can be reduced to an icon (or closed)and will open again automatically with each new alarm, leaving it connected andusing another Windows program (text editor, etc).

The following information is displayed in the header of the dialog:

Total number of alarms - Accepted and not accepted - (Total number ofalarms in the dialog).

Number of not accepted alarms.

A scroll bar will automatically appear, if the “Alarm status” window containsmore alarms than can be displayed in the dialog area.

The drop-down list box displays (by default) the information about the last 3 to 4alarms. The alarm handling status is indicated in different colours (red = newalarm, yellow = alarm accepted but not erased). The access to the other alarmscan be made by the scroll bar.

Alarms are identical in the “Alarm status” window and in the “Alarm and eventlog” dialog. They are presented in a line with the following parameters:

Alarm number (=in the log). Event date.

Event time.

Alarm type description with:

- Card number if cards are involved in the alarm situation.- Reader number if readers are involved in the alarm situation- Description of the alarm cause

Page 110: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-4

Description of the alarm source with:

- Reader number if the origin is a reader.- AIMS element number if the source is this.- THOR AIMS No. XXYY- XX = GPI-PC interface address on RS 485 bus- YY = PC address on the GPI-PC interface bus (normally 00)

All the alarms specific to the AIMS program are described in Section 15.2.

The alarm handling dialog has three command buttons with the followingfunctions:

The selected alarm will remain present in the alarm list in the “Alarm status”window, but the text will change from red to yellow (the alarm line will also beindicated in yellow in the dialog in the Alarm log together with the name of theoperator, who has executed the action).

The alarm is erased from the Alarm status list. The counter is decreased by 1(the alarm line will be indicated in green in the dialog in the Alarm log togetherwith the name of the operator, who has executed the action).

This command button opens a dialog allowing to see the Procedure (Instruction)(Section 9.3) programmed to the selected alarm.

Some alarms (of the type Door Forced) can be accepted locally and directly onthe reader (a forced door is automatically accepted when the door closes).These alarms can be displayed several times in the alarm list.

5.1.1 Alarm procedures

This dialog is displaying the procedure (instruction) attributed to each alarm.

Example of the “Alarm Procedure” dialog.

“Accept”

“Clear”

“Procedure”

Note

Page 111: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-5

For the selected alarm, the following information is given:

Alarm date and time.

Alarm received date and time by the PC.

Alarm description

Alarm source (PC or reader)

Alarm status (accepted or not).

The text of the procedure is displayed in the corresponding text box.

The alarm event time and the alarm received time (by the PC) can be different,depending if the PC is online at the moment the alarm event happens.

The alarm source is indicated with its name and number.

The “Handling Report” text box gives the operator on duty the opportunity toenter a small "on the spot" report concerning the alarm (operation affected,cause for the alarm, decisions taken etc.)

The “Delete” button, deletes any content of the “Handling Report” text box.

When the “OK” command button is activated, the “Alarm status” window isdisplayed again.

Procedure texts are edited via the dialogs of the “Edit Alarm Procedures” menucommand (Section 9.3).

Note

Page 112: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-6

5.2 Master Area statusIn this dialog, the status for all the Master Areas in the Intruder system can beseen.

Example of the “Master Area Status” dialog.

A Master Area is an association of areas belonging to different central units.

The concept of Master Areas is exclusively used on the PC and does not existon the Intruder centrals themselves.

The Master areas are defined by means of the “Edit Master Areas” dialog (seeSection 8.1).

Each “Master Area” is displayed on a line with its Number and Name, and its“Status” – “Set” or “Unset” - indicated with different background colours asfollows:

Red Set

Yellow Partly set

Green Unset

With the “Set” and “Unset” command buttons the selected Master area can beset or unset.

If the operator has been programmed with a specific User No. in the “SystemOperator Configuration” dialog it will not be possible for him to unset all theareas. That depends on the User No. for the area programmed.

If one (or several) detectors (circuits) are in alarm (ACTIVE) at the moment theoperator tries to set the Main area, the “Setting Fault” dialog (see Section 5.8)will automatically open. This gives the possibility to isolate the circuit.

You can leave the “Master Area Status” dialog by activating the “OK” or the“Cancel” command button.

Page 113: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-7

5.3 Status for Intrusion Central UnitsIn this window, the status for all the Intruder central units in your system can beseen.

Example of window for display of the status of the Central Units.

It is possible to open one dialog per central, the call on the menu willautomatically bring the “Select Intrusion CU” dialog (Section 4.6.1) on thescreen, and the central unit can be selected.

The list boxes may be placed anywhere on the screen and they are updated inreal time.

The Address and Name of the central unit are shown in the heading line.

The Name has been programmed by means of the dialog of the “Edit CentralUnits” menu command( Section 8.2).

In order to close each list box you must double-click on the System Menu of thewindow.

Page 114: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-8

5.4 Symbols and buttons in Intrusion Statusdialogs

5.4.1 Symbols

Different graphic symbols are used in the status dialogs, they make it possiblequickly to see if the line displayed is for area(s), zone(s), circuit(s) etc.

Intruder Central Unit (branching closed): Only the name and address of theIntruder central are shown, but not the contents.

Intruder Central Unit (branching open): The contents of the central are shown -areas, zones, circuits.

Area: The name of the area is shown, the opening of the branching (by a double-click) shows the zones, circuits.

Zone: The name of the zone is shown, the opening of the branching (by adouble-click) shows the circuits.

Circuit: - Detectors, inputs, contacts etc. -; no branching possible.

5.4.2 Command Buttons

This button is used to set the Area, the Zone, and the Circuit selected.

This button is used to unset the Area, the Zone, and the Circuit selected.

This command is used to print the contents of the status dialog on the screen.

This button is used to isolate a circuit in order to prevent it from taking part in thesetting procedure.

This command button is used for delaying the autosetting of the selected area.The delaying can only be done 10 minutes before the autosetting.

Page 115: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-9

5.5 Area statusIn this dialog, the status for all the Areas in the Intruder system can be seen(and modified).

Example of the “Area Status” dialog.

Each area is displayed on a line with its Number and Name, and its “Status” –“Set” or “Unset” - indicated with different text colours like this:

Red Set

Yellow Partly set

Green Unset

In a Multi-central configuration the areas will be separated by the name of eachcentral and its address. See Section 2.7 for an explanation of the addresses forthe elements.

If the operator has been programmed with a specific User No. in the “SystemOperator Configuration” dialog, it will not be possible for him to unset all theareas. That depends on the User No. for the area programmed.

Only a Supervisor user can perform unsetting on any area.

In a multi, local-site system the operator can only work with the areas belongingto the centrals in her/his own site.

If one (or several) detectors (circuits) are in alarm (ACTIVE) at the moment theoperator tries to set the Area, the “Setting Fault” dialog (see Section 5.8) willautomatically open. This gives the possibility to isolate the circuit. The circuitsthat it is possible to isolate have all been defined at the time of installation of thesystem, and this cannot be changed by means of the AIMS program.

Page 116: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-10

A double click on any one of the areas will open the branching of Zones anddisplay all the zones in that particular area.

A double click on any one of the zones will open the branching of Detectors anddisplay all the detectors in that particular zone.

You can leave the “Area Status” dialog by activating the “OK” or the “Cancel”command button.

Page 117: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-11

5.6 Zone statusIn this dialog, the status for all the Zones in the Intruder system can be seen(and modified).

Example of the “Zone Status” dialog.

Each zone is displayed on a line with its Number and Name, and its “Status” –“Set” or “Unset” - indicated with different text colours like this:

Red Set (an alarm in the zone will be indicated by an ALARM message)

Green Unset

In a Multi-central configuration the zones will be separated by the name of eachcentral and its address.

See Chapter 3.7 for an explanation of the addresses for the elements.

If the operator has been programmed with a specific User No. in the “SystemOperators Configuration” dialog, it will not be possible for him to unset all thezones. That depends on the User No. for the area (where the zone belongs)programmed.

Only a Supervisor user can perform unsetting on any zone.

In a multi, local-site system the operator can only work with the zones belongingto the centrals in his own site.

If one (or several) detectors (circuits) are in alarm (ACTIVE) at the moment theoperator tries to set the Zone, the “Setting Fault” dialog (see Section 5.8) willautomatically open. This gives the possibility to isolate the circuit.The circuits that it is possible to isolate have all been defined at the time ofinstallation of the system, and this cannot be changed by means of the AIMSprogram.

A double click on any one of the zones will open the branching of Detectors anddisplay all the detectors in that particular zone.

You can leave the “Zone Status” dialog by activating the “OK” or the “Cancel”command button.

Page 118: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-12

5.7 Circuit statusIn this dialog, the status for all the Circuits (Detectors) in the Intruder systemcan be seen (and modified).

Example of the “Circuit Status” dialog.

In a Multi-central configuration the circuits will be separated by the name ofeach central and its address. See Section 2.7 for an explanation of theaddresses for the elements.

Each circuit is displayed on a line with its Number (address) and Name, and its“Status” – “Set” or “Unset” - indicated with different text colours like this:

Red Set

Green Unset

Yellow = Isolated (the circuit has been put out of action temporarily)

Each circuit (that is defined) is displayed with the following supplementaryinformations:

State “ACTIVE” - the circuit is activated (alarm)

“QUIET” - the circuit is at rest (normal)

Context “ALARM” - the circuit has caused an alarm situation in theIntruder system; this message will remain until the alarm isaccepted by means of the “Alarm status” window (on thecondition that the circuit status is (at this time) QUIET)

If the operator has been programmed with a specific User No. in the “SystemOperator Configuration” dialog it will not be possible for him to unset all thecircuits. That depends on the User No. for the area programmed.

Only a Supervisor user can perform unsetting of any circuit.

In a multi, local-site system the operator can only work with the circuitsbelonging to the centrals in her/his own site.

Page 119: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-13

With the “Set” and /Unset command buttons a selected circuit can be set orunset.

With the” Isolate” command button a selected circuit can be isolated, whichmeans that it will not be included in the next setting procedure. If an isolatedcircuit is selected and the command button “Unset” is activated, the circuit is nolonger isolated and will be included in future setting procedures.

If the circuit is set, the command button “Isolate” can not be used.

You can leave this dialog by activating the “OK” or the “Cancel” commandbutton.

Attention

Page 120: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-14

5.8 Setting faultThis dialog will display, automatically, any detector (circuit) that is in an alarmstate (ACTIVE) at the moment a Main area, an Area, or a Zone is being set.

Example of the “Setting Fault” dialog.

In a Multi-central configuration the addresses (detectors, circuits) will beseparated by the name of each central and its address. See Section 2.7 for anexplanation of the addresses for the elements.

Each circuit is displayed on a line with its Number (address) and Name, and its“Status” and the status of the input (unset and ACTIVE).

With the “Isolate” command button a selected circuit can be isolated, whichmeans that it will not be included in the next setting procedure.

The “Set” and “Unset” command buttons cannot be used in this dialog.

By activating the “OK” command button or the “Cancel” command button youcan exit this dialog and will return to the “Master Area Status” dialog, the “AreaStatus” dialog or the “Zone Status” dialog.

Page 121: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-15

5.9 Door statusIn this dialog, the status for all the Doors in the installation will be shown. It will bedisplayed with the following information:

Number of doors forced

Number of doors held

Number of doors blocked

Number of doors permanent open

Number of doors emergency blocked

In a multi, local-site system it is necessary to choose the site(s) by means of the“Remote Sites” dialog (Section 4.6.3) before the operator gets access to thismenu.

Example of “Door Status” dialog.

By pressing the “Door Status” command button, a dialog is shown where thereaders are displayed with the possibility of directly controlling and changingtheir status.

Page 122: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-16

5.10 Door controlIn this dialog, the individual status for each door in the installation will be shownand it will be possible to control and change the door status (e.g. to open thedoor).

Example of the “Door Control” dialog.

Each reader is displayed with its Number and its Name as well as the “Doorstatus” (“1” and “2”) for the doors that it controls. The door status may be one ofthe following:

Forced

Held

Permanent open

Blocked

After having selected a reader by clicking in the list box and after havingselected the door to be controlled (door 1 or door 2) by means of the optionbuttons, you can control the reader outputs by activating one of the commandbuttons (icons). The command buttons have the following functions:

This commands the striking plate to open the door in the same way as a validcard or an exit push button.

This puts the door back to normal condition again (absolutely necessary after ablockage or a permanent opening of a door).

This blocks the reader (nobody can pass through this door).

This opens the door permanently (the access becomes free at this door).

You can leave this dialog by clicking the “Ok” command button.

Page 123: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-17

5.11 Show event logIn this dialog, you can see all events that took place in the installation. Eventsare all the actions made on/by a reader or a Central unit, including those eventsconsidered as alarms (they will also be logged in the alarm log). Excepted areall alarms generated by the AIMS program, these will be logged in the alarm logonly.

Example of the Event Log” dialog.

The list box shows all events chronologically listed (the newest event isdisplayed in the bottom of the list).

Each event is presented on two lines with the following parameters:

Event date and time.

Event reception date and time by the PC.

Event source: Reader number or Intruder Central (CU).

Event message (description).

When the “Online event status” check box is checked, all new events willautomatically be displayed and cause the screen picture to scroll upwards. If acloser consultation of the list is wanted, the scrolling may be stopped for a shorttime by unchecking the “Online event status” check box thereby getting asteady picture. Normally the check box should be checked in order to get apermanent update of the list.

Activation of the “OK” command button quits the dialog.

Page 124: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-18

5.12 Show operator logIn this dialog, it is possible to consult all the operations performed by the systemoperators.

Example of the “Operator Log” dialog.

The list box shows all events chronologically listed (the newest event isdisplayed in the bottom of the list).

Each event is presented on two lines with the following parameters:

Event reception date and time by the PC.

Event description (Note).

Name of the Operator that has performed the action.

In case of actions performed on the alarms, the number also included in thedescription of the event is the No. of the event in the Alarm log.

“Acceptance of alarm No. 0027”

“Clearing of alarm No. 0029”

Activation of the “OK” command button quits the dialog.

Example

Page 125: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-19

5.13 Show log statusIn this dialog, it is possible to display how much space the 3 logs are usingcompared to the reserved space. The space reserved for the logs is determinedwhen installing the program, independently for each log.The number of events can be set to max 1,000,000 for each log.

Example of the “Log Status” dialog.

Each log is described with:

“Log” name (“Event log”, “Alarm log”, “Operator log”).

Maximum “Size” (Set during the installation of the AIMS program).

Current “No. of entries”.

Graphic bar (representing the space used).

The space used is represented by 3 graphic bars, indicating the occupiedpercentage and the bar colour indicates the log status.

Green less than 70% used.

Yellow 70-90% used.

Red more than 90% used.

A warning will be indicated by a pop-up message on one of the dialogs when90% of one of the logs is reached. This will pop up each time a login isperformed to remind the operator.

Please note that you must move the logs before they reach 100 %.

Three command buttons “Move Event Log”, “Move Alarm Log”, “Move OperatorLog” allow to move the logs to another destination (file or diskette). See also thefollowing sections: Move event, Move alarm log, Move operator log.When one of these command buttons is activated, the “Move log” dialog isdisplayed.

Activation of the “OK” command button quits the dialog.

Page 126: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-20

5.13.1 Move log

This dialog makes it possible to select the file (or disk) where the log will besaved.

Example of the “Move Log” dialog.

You must state precisely the destination directory in the corresponding list box,the directory (or the disk) can be selected in the list box. If you do not make aselection, the log is by default saved in the directory where AIMS has beeninstalled (i.e. C:\AIMS).

It is possible to place the log in a directory with an already existing file. In thatcase the old file will be erased and replaced by the new file. This operation issimply done by clicking on the directory containing the (log) file. Please notethat no warnings will be given.

If a log is moved directly to a diskette it must be taken in consideration thatapproximately 70/80 events can be transferred per minute. A 1,44 Mb disketteis able to store about 7000 events.It is therefore recommended to move the log to another directory on the harddisk, for instance a temporary directory, and then copy it with a DOS orWindows command onto a diskette.

Move event log

The time period with events that you want to move from the event log can bespecified in this dialog.

Example of the “Move Event Log” dialog.

The “Destination” (disk and path) is displayed, as well as the “Space” availableon the support selected as target. The start date (by default, that of the oldestevent) will be determined, as well as the end of the wanted period (by default,the current date).

When the “OK” command button is activated, the “Moving Log” dialog isdisplayed, it indicates the beginning and the end of the moved period, and alsothe moved information counter.

Destinationdirectory

Existing log file

Saving on diskette

Page 127: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

92000701 5-21

The selected period being moved will automatically be erased from the log onthe hard disk.

Move alarm log

The number of alarms you want to move from the alarm log can be specified inthis dialog.

Example of the “Move Alarm Log” dialog.

The “Destination” (disk and path) is displayed, as well as the “Space” availableon the support selected as target.

The first alarm number (“Start From”) to move will be shown (by default 00001,the oldest one) as well as the last (“End”).

You can use the “Show Alarm Log” dialog to see which alarms the alarm no.correspond to.

When the “OK” command button is activated, the “Moving Log” dialog isdisplayed and indicates the start and the end of the moved period and themoved information counter.

The selected period being moved will automatically be erased from the log onthe hard disk.

Move operator log

The period you want to move from the operator log can be specified in thisdialog.

Example of the “Move Operator Log” dialog.

The “Destination” (disk and path) is displayed, as well as the “Space” availableon the support selected as target. The start date (by default the oldest event)will be determined as well as the end date of the wanted period (by default thecurrent date).

When the “OK” command button is activated, the “Moving Log” dialog isdisplayed, and it indicates the start and the end of the moved period and thecounter of moved information.

Page 128: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Status” menu

920007015-22

The selected period being moved will automatically be erased from the log onthe hard disk.

Moving log

This dialog displays the execution of the move. It indicates the start and the endof the moved period and the counter of moved information, as well as the disknumber when saved on diskettes.

Example of the “Moving Log” dialog.

The selected period being moved will automatically be erased from the log.

When the “OK” command button is activated, the transfer begins, and the logsize is displayed in real time in the “Log Status” dialog behind.

Page 129: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 6-1

6666

“Cards” menu“Cards” menu“Cards” menu“Cards” menuThis chapter provides a detailled description of the “Cards” menu.

The chapter contains the sections listed in the following table.

Section Page

Show list of cards 6-3

Show and edit cards 6-5

Show and edit Visitors cards 6-13

Show and edit messages 6-15

Edit department 6-18

Person counting 6-19

Parking counting 6-21

Anti passback control 6-22

Introduction

This chapter

Page 130: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-2

Overview of the “Cards” menu

The commands of the “Cards” menu depends on whether the system isdisconnected or connected as shown in the figure below.

Example of the “Cards” menu with the system disconnected and connected.

The various menu commands and their associated dialogs are described in thefollowing sections.

Disconnected orconnected

Disconnected Connected

Page 131: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-3

6.1 Show list of cardsIn this dialog, it is possible to display all the programmed Cards in theinstallation.

Example of the “Card List” dialog.

The cards are displayed in the form of a sorted list, each card described on twolines by the following information:

Card Number

Name

Department

Priority

Permanent Personnel Group

Temporary Personnel Group

In the drop-down list box “List Order”, you can choose the parameter after whichthe cards should be sorted (Card number, Name, Initials, Department,Personnel Group).

In the drop-down list box “Site”, you can choose the site for which you want tosee the list of cards. Do not forget that on a multi-site configuration a card canhave completely different programming for each site.

The display colour for personnel groups indicates the status for the personnelgroup; If it is green the personnel group is active (on the validation dates) for thecard, and if the colour is red the status is inactive for the card (outside validationdates).

The text box “Number of Persons” shows the total number of cards existing inthe installation.

Page 132: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-4

A double-click on any of the cards allows for direct access to the “Cards” dialog(see Section 6.2) with a detailed display for the card selected in the “Card List”dialog.

By activation of the “Last Reader used” command button the last reader usedby the bearer of the selected card will be displayed as a dialog.

Example of the “Last Reader Used” dialog.

This dialog displays the following informations:

Card No.

Date and Time for the last use of the reader

Name of the card bearer

Address and Name of the Reader

No. and Name of the Zone the card has entered (if programmed).

You can quit this dialog by activating the “OK” command button and will then goback to the “Card List” dialog.

Activation of this command button gives a print-out of the complete file for theCard selected (see Section 4.16.4).

Page 133: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-5

6.2 Show and edit cardsThe “Cards” dialog gives the possibility to program (Edit) the PC card database(Personal data file) and the global card database (programming file) on thereaders and to show cards.

This dialog shown will depend on the whether your system is a single site or amulti-site system.

6.2.1 General information.

The card can be selected directly by entering the card number in the “Card No.”text box or by using the two arrow buttons.

This command button is used to get the next (existing) card.

This command button is used to get the previous (existing) card.

This command button is used to get to the first free card authorized for creation (amuch faster method than using the arrow buttons).

This command button allow the creation of a new card, it sends the programming(that is going to be done now) to the Access Control system.

This data file has two types of fields: Predefined fields and fields for parametersdefined at the installation. The contents of the two field types are programmablefor each card

Personal no.

Initials

First name

Name

Address

Department

The labels for Department must have been created in the dialog of the “EditDepartment” command before they can be used here. The use of the Personal no.field - programmable format - is described in Chapter 7.2.5. If the programmableformat is not used, this field is available for example for Employee No.

The customer can define the label for these fields such as:

Telephone number

Car number

These fields shall be defined during the installation phase and later they cannotbe changed, except by means of a special HI-SEC program. Default text is “Mytext 0”, “My text 1”, up to “My text 7”.

Selection of cards

Personal data files

Predefined fields

Installation definedfields

Page 134: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-6

6.2.2 Single-site system

In this configuration each card belongs to a single Personnel Group(permanent) and perhaps to one other temporary Personnel Group.

Example of the “Cards” dialog for a single site system.

The Programming file for cards has the following four parameters:

Each card can be attributed to two personnel groups – a permanent and atemporary which are each associated with validity periods.

The permanent personnel group will give a card a validity period without timelimits, but with the possibility to state a start date for the validity.The temporary personnel group will give a card a validity limited to aprogrammed time period.

The access rights should not be defined unless the card will be temporary orpermanent. However, it is allowed to assign two validity periods to a card usedfor two different personnel groups, f. inst. one personnel group for the standarddays and another for the holiday periods.The personnel group used as temporary one will always have priority over thepermanent (during the validity period, of course).

The priority for the card can be individuallly set to either 0. 1, 2, or 3.

For each card you select one (or two) personnel groups in the “PersonnelGroup” drop-down list box.The personnel groups must have been created in the “Personnel Groups” dialog(see Section 7.2) before they can be used here.

The duration of the validity period for the permanent and the temporarypersonnel group (for the card) is defined by a start date and an end date.

The week programs are associated with personnel groups through the dialog“Personnel Group – Edit Reader” of the “Access” menu.See Section 7.5.1).

Access rights

Priority

Personnel group

Validity period

Space forphoto

Space forsignature

Page 135: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-7

6.2.3 Multi-site system

In this configuration each card belongs to a different Personnel Group on eachsite with the possibility on each site for one permanent Personnel Group and atemporary Personnel Group.

Example of the “Cards” dialog for a multi-site system.

The list box displays for each Site the personnel groups attributed to the cardpresent in the file.

Each card can be attributed to two different personnel groups per site, these areassociated with validity periods, f. inst. one personnel group for the standarddays and another for the holiday periods.

The permanent personnel group will give the card a validity period without timelimits, but with the possibility to state a start date for the validity.The temporary personnel group will give a card a validity period limited to theprogrammed time period.The text colour of a personnel group indicates its validity.

Red Not valid at the moment

Green Valid at present

The duration of the validity period for the permanent personnel group is definedby a start date and for the the temporary personnel group (for the card) by astart date and an end date.

The priority for the card can be individuallly set to either 0. 1, 2, or 3.

The “Personnel Group” command button is used to allow the attribution of apersonnel group (permanent and temporary) per site to each card.

Site

Personnel group

Validity period

Priority

Space forphoto

Space forsignature

Page 136: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-8

Example of the “Define Personnel Group To Card”.

The “Site” list box displays all the sites present in the system, only the sitesauthorized to the operator appear in this list box (see Chapter 5.6.3)

Each card can be attributed to two personnel groups – a permanent and atemporary which are each associated with validity periods.

The permanent personnel group will give a card a validity period start time.The temporary personnel group will give a card a validity limited to aprogrammed time period.

The access rights should not be defined unless the card will be temporary orpermanent. However, it is allowed to assign two validity periods to a card usedfor two different personnel groups, f. inst. one personnel group for the standarddays and another for the holiday periods.The personnel group used as temporary one will always have priority over thepermanent (during the validity period, of course).

The priority for the card can be individuallly set to either 0. 1, 2, or 3.

The command buttons “Copy”and “Paste” gives the possibility to copy theprogramming for a card to a clipboard and then paste it (move it) to anothercard; this is convenient if the programming for two cards should be identical forall sites.

The personnel groups must have been created in the “Personnel Groups” dialog(see Section 7.2) before they can be used here.

The week programs are associated with personnel groups through the dialog“Personnel Group – Edit Reader” of the “Access” menu.See Section 7.5.1).

Access Group Module

The Access Group Module 97T AGM changes the operating procedure for cardprogramming. The module allows individual cards to be programmed to individualreaders. The module is designed for use in sites with changing day-to-day accessneeds. To optimize the use of the module, the system design must be tailored tothe particular installation.

The AGM module cannot be used if you are using the integration with a ThorIntruder Central Unit in the Personnel Group programming.

Access rights

Priority

Note

Page 137: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-9

6.2.4 Single-Site & Multi-Site systems

This command button can be used to make a search between all the parametersin the Personal data or Card programming file.

When this command button is activated, the “Initials” text box is checkered toindicate the search parameter.

Example of the top left part of the “Cards” dialog.

It is possible to choose any field as basis for a search by simply clicking in anyof the text boxes. After that the search text must be keyed in.

The search starts when the “Search” command button is activated. A messagebox indicating the field and the search parameter is displayed in the bottom ofthe screen:

Example of “Search Information” message box”..

The card with the lowest number corresponding to the search criteria will bedisplayed.

This command button is activated to get access to the next card having thesame search criteria; this will then be displayed.

This command button is activated to get access to the previous card having thesame search criteria; this will then be displayed.

By activating the “Cancel” command button the search stops and a return to the“Cards” dialog takes place.

This command button is activated to delete a card. The card is removed from thedata base and will be suppressed on all the sites; a confirmation dialog will beshown each time this button is activated.

This command button (as well as the “Create” command button) can beattributed (or not) to each operator in the “System Operator Configuration”dialog.However, not every operator is allowed the right to delete cards, even if he hasaccess to edit cards. This is absolutely necessary in Multi-site mode becausehere an operator cannot delete a card not knowing if it is used on the othersites. Only the person responsible for the cards has the possibility to create anddelete cards.

If you have several thousands cards programmed in your system, the “Delete”command can take several minutes. In this period of time the computer will workon the hard disk and not be able to perform other commands.

Page 138: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-10

To avoid this, a "temporary delete" function is performed by the databaseprogram and the real delete will first take place at midnight, if the PC is left online. If not it will take place after deletion of 100 cards. Please be aware of thisand do not turn off your PC during the resizing of the card file as this can destroyyour card database.

When the “Status” command button is activated, a new dialog is displayed withthe following information concerning the card. When this button is used the PCasks the reader for information and the result is displayed when it is received.

Example of the “Card Status” dialog.

Reader database

From the reader database, the following information is available:

It is possible to change the card status to either Card Blocked or Card Active byclicking on the corresponding option button.

The zone where the card is present when the menu is demanded will bedisplayed.

It is possible to select another zone in the “APB Zone” drop-down list box tomove the card to another zone in the installation.

The “Set Free” option button can be used to set the card into a anti passback-free status. The anti passback check will be restarted at the next cardtransaction (on any reader).

If the card has a message waiting, it will be displayed in the “Msg waiting” textbox. The “Accept” check box can be used to erase the card message (f.inst. oldmessages not needed anymore).

The “Send” command button demands the program to send the modifications inthis dialog to the readers. Please note that the “Send” command button must beused after any change in the dialog.

When the “OK”command button is activated, the “Cards” dialog is displayedagain.

Visitor Cards

The “Visitor Card” check box gives the possibility to define cards that will serveas visitors cards on the installation.

A visitor card has no personal data, no programming, but only its number andfor instance a Personal No. (programmable format).

This dialog gives only the possibility to create the visitors cards, the validationfor use takes place in the “Visitors Cards” dialog (See Section 6.3).

Dynamic Cardstatus

Card status

Presence in antipassback zone

Message waiting

Page 139: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-11

6.2.5 Image badging

The Image Badging Module enables the insertion (import) of existing imagesand signatures on cards and the storage of the images and the signatures in theCard Database of the AIMS.The module will also handle the exchange of data from the Card Database ofAIMS and the formatting of data to be printed and encoded on the cards. A carddesign tool is also included.

The Camera Support Module enables you to grab a picture from a CCD ColourVideo Camera, insert it on the card and store it in the AIMS Card Database.The Camera Support Module requires that the PC Frame Grabber Board (95TCFG) and the Colour Video Camera (95T BCA) or a similar type of camera hasbeen installed.

Example of the “Cards” dialog with grabbed photo inserted.

The Signature Support Module enables you to scan a signature, insert it on thecard and store it in the AIMS Card Database.The Signature Support Module requires that the Logitech PageScan Color Proor a similar scanner with a TWAIN interface has been installed.

Example of the “Cards” dialog with grabbed signature inserted.

Detailled information about the Image Badging can be found in the Usersmanual, Image and Video badging for AIMS, reference number 92000301.

Insertion of photo

Insertion ofsignature

Page 140: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-12

6.2.6 The programmable format

If the system has been defined for use of the programmable format the cards nolonger will be recognized on the reader by their card No. but by the real contentson the readable stripe (magnetic, wiegand, bar codes etc.).

The contents of the stripe is programmable in the Personal no. field.

This field must be filled out for each card in the data base, two methods are canbe used:

Enter manually the registration for the card (from 1 to 16 numeric characters)according to the installation configuration.

If the installation has been defined with a reader in the function as ProgrammingUnit it is possible to read directly the card, that shall be programmed, on theProgramming reader that displays the stripe contents automatically i the Personalno. field.

When the dialog is opened the programming reader is lighted with the message"READ CARD". This message will be displayed during the whole duration of theoperation. The reading for a card displays the stripe contents in the Personal no.field and on the display of the Programming reader.

Even if the operation takes place via Programming reader it will always bepossible to use Method 1.

The program verifies the contents of the Personal no. for each card, the reasonsfor a possible refuse are one of the following:

- The Personal no. has already been used for another card.

- The Personal no. entered does not correspond to the characteristics of the site (number of characters).

Use of Personal no. instead of Card No.

It is possible at the time of configuration to declare that the system works withpriority put upon the Personal Nos. and not upon the Card Nos. This makes itpossible for certain dialogs to display only the Personal no. for the card. See theexample below.

Example: Visitors cards

Method 1

Method 2

Note

Refusal of card

Page 141: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-13

6.3 Show and edit Visitors cardsIn this dialog, it is possible to see, attribute and program the Visitors cards in thesystem. It is the dialog for putting the visitors cards into use (activate it).

Please note that in this dialog it is not possible to create visitors cards but only toissue them (activate them). For creation of these cards, see Section 6.2.

Example of the “Visitor Card” dialog.

The cards defined as visitors cards in the “Cards” dialog (Section 6.2) aredisplayed in the upper left list box.

To define a visitors card it is only necessary to select it and attribute to it apersonnel group and a validity period (default the actual date).

It is possible to determine a period (a week, a month, others) in the text boxes“Validity period” and “To”, which determines the validity start date and the enddate.

The “Site” drop-down list box gives the possibility to choose the site to which apersonnel group shall be a attributed. The validity period can be different foreach site.

The “Visitor Group” drop-down list box gives the possibility to choose thepersonnel group that shall be associated with the card.

Only personnel groups defined as Visitors will be displayed in the drop-down listbox (see the “Personnel Groups” dialog - Section 7.2.

The right part of the dialog gives possibility to define the name of the visitor, theperson receiving the visit, the company, and possible remarks).

The “Personnel No.” text box displays the card No., if you operate with cardNos. as priority. In the case you operate with Personal Nos. as priority, the textbox will display the Personal No. (see Section 6.2.6).

This command button is used to validate the visitor card, it gives the order to theprogram to send the programming to the Access Control system.

Page 142: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-14

The “Copy” and “Paste” command buttons are used for copying theprogramming for a visitor card and then "paste" it to another card that shall havethe same rights.

The “Delete” command button is used for deleting the programming for a visitorcard. The card will always exist but will no longer have any rights.

You can leave this dialog by activating the “OK” command button. This willregister all the modifications performed.

If you quit the dialog by activation of the “Cancel” command button the lastmodification performed will not be registered.

Page 143: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-15

6.4 Show and edit messagesIn this dialogue box, it is possible to see, attribute and program the 31programmable messages in the system.

These messages are stored in the Global data base in each reader.

Each message is made out of 2 lines each 16 characters.

The 31 messages in the readers are divided into 3 types:

10 standard messages.

15 individual messages or special messages for cards.

6 messages for personnel groups or all cards.

The Edit Messages” menu command and associated submenu.

In this dialog, the user can select if the message is for a card or all cardsbelonging to a personnel group.

General information:

If an individual message is required the PC will interrogate the reader andremove the individual messages that have already been accepted, thenauthorize the user to enter the new message, if a free message is at disposal.

It is possible to remove a message from the readers after it has been accepted.

It is possible only to attribute one message per card. If more than one messagehave been attributed to a card only the last attributed message will bedisplayed.

6.4.1 Messages for cards

The message is destined for one card only.

Example of the “Message for Cards” dialog.

Page 144: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-16

The “Card No. – Name” list box displays the card holders in the system andmakes it possible to choose the card.

An attributed message text (if existing) will be displayed in the two text boxes“First line” and “Second line”.

For each message concerned, you must state if it is a standard message or anindividual message by means of the corresponding option buttons.

The activation of the option button will display in the corresponding list box the10 standard messages. A selection can be made directly by clicking on thewanted message.

The modification of a message will be valid for standard messages in allreaders.

The activation of the option button will display in the corresponding list box the15 individual messages (if programmed). A selection can be made directly byclicking on the wanted message or reenter a new message that will be part thelist when this is updated.

The message can be entered (or modified) in the “First line” and “Second line”text boxes.

Activation of the “Send” command button causes the program to send theprogramming made in this dialog to the readers.

Activation of the “Delete” command button erases the displayed message.

You can leave this dialog by activating the “OK” command button. This willregister all the modifications performed.

If you quit the dialog by activation of the “Cancel” command button the lastmodification performed will not be registered.

6.4.2 Messages for personnel groups or zones

The message is destined for a Personnel group, for the cards in an Antipassback zone or for a Personnel group in a zone.

Example of the “Messages for Personnel Groups or Zones” dialog.

Standard message

Individual message

Page 145: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-17

The option buttons in the middle of the dialog are used to state if the messageis destined for all persons in the same personnel group, to all persons presentin the same anti passback zone (if used), or to a personnel group in a specificanti passback zone.

You must select a Personnel group in the corresponding drop-down list box.

If anti passback zones are used, you can select a Zone in the correspondingdrop-down list box. Only personnel groups and anti passback zones alreadyprogrammed are displayed.

The message concerned (if existing) will be displayed in the two text boxes:“First line” and “Second line”.

For each message concerned, you must state if it is a standard message or anindividual message by means of the corresponding option buttons.

The activation of the option button will display in the corresponding list box the10 standard messages. A selection can be made directly by clicking on thewanted message.

The modification of a message will be valid for standard messages in allreaders.

The activation of the option button will display in the corresponding list box the15 individual messages (if programmed). A selection can be made directly byclicking on the wanted message or reenter a new message that will be part thelist when this is updated.

The message can be entered (or modified) in the “First line” and “Second line”text boxes.

Activation of the “Send” command button causes the program to send theprogramming made in this dialog to the readers.

Activation of the “Delete” command button erases the displayed message.

You can leave this dialog by activating the “OK” command button. This willregister all the modifications performed.

If you quit the dialog by activation of the “Cancel” command button the lastmodification performed will not be registered.

Standard message

Individual message

Page 146: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-18

6.5 Edit departmentAll the labels for Department used in the “Cards” dialog must have been createdin this dialog below.

Example of the “Department” dialog.

To create a new Department it is sufficient to rewrite the name on top of analready existing name in the “Name” list box and then activate the “Add”command button.

Each Department can be attributed a short Description in the corresponding textbox.

To remove a Department it is sufficient to select it and activate the “Delete”command button.

You can leave this dialog by activating the “OK” command button. This willregister all the modifications performed.

If you quit the dialog by activation of the “Cancel” command button the lastmodification performed will not be registered.

It is impossible to delete a Department if it is already in use for the cards. Beforean operator will be able to delete a Department it is necessary to place all thecards using it into another Department.If you change the name of a Department, you must create all cards again usingthe new Department.

Note

Page 147: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-19

6.6 Person countingIn this dialog, the number of persons present in each anti passback zone isdisplayed.

Example of “Person Counting” dialog.

Different graphic symbols are used in this dialog, they make it easier todetermine whether the line displays a site or a zone.

Site: (branching closed): only the name and the address of the site is shown butthe contents is not displayed.

Site: (branching open): the contents of the site - zones - are shown.

Zone: the name of the zone is shown.

Each Site is displayed with the following parameters:

The “Persons created” column shows the total number of cards in the system,all sites included.

The “Persons present on Site” column shows the total number of cards on thesite.

The “Persons present other Sites” shows the total number of cards present onthe other sites in the system.

Each Zone is displayed with number of Persons present in this Zone.

The counter - the text box “Present (all sites)” - displays the total number ofpersons present inside (on) the premises.

The text box “PC time” shows (currently) the real time in the PC, this gives theopportunity to compare the validity of the last update.

The text box “Update Time” shows the time for the last update in this dialog(default opening time in the dialog), an activation of the “Update” commandbutton will give the new status for the installation.

Symbols

Page 148: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-20

Activation of the “Show Person(s)” command button gives a list of all the cardspresent in the selected anti passback zone. See below for more information.

It is not possible to see a list of persons present in Zone 00, i.e. outside thepremises.

The “Site” and “Zone” text boxes show constantly the selection performed in thedialog and display the corresponding data.

You leave this dialog by activation of the “OK” command button.

6.6.1 Persons in Zone

In this dialog a list with all cards present in an anti passback zone is displayed.

Example of the “Persons in Zone” dialog.

Different graphic symbols are used in this dialog, they make it easier todetermine whether the line displays a site or a zone.

Site: (branching closed): only the name and the address of the site is shown butthe contents is not displayed.

Site: (branching open): the contents of the site - zones - are shown.

Zone: the name of the zone is shown.

Each card is displayed with its No., the card holder's Name, the Entry time inthe zone and the Alarm time (if a maximum time of presence inside the zonehas been programmed).The entry time is not displayed for people who are in a zone where an alarmtime has not been programmed.

This dialog is not updated in real time. It will only display the card holder namesat the moment, when the dialog was called. This is why the tittle bar of thedialog always shows the time of request as well as the requested zone.

This command button will start printing of the list shown in the dialog above.When the “Print” command button is activated a new “Printing” dialog isdisplayed, allowing selection of fonts and configuration of the printer.

When the “OK” command button is activated, the “Person counting” dialog(Chapter 8.6) is displayed again.

Note

Symbols

Note

Page 149: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

92000701 6-21

6.7 Parking countingIn this dialog, a list of all cards present in the Zones defined as Parking Zonesare displayed.

Example of the “Parking Counting” dialog.

The “Persons” column shows the number of persons (cars) present in the zone.

The “Update” button will update the number of persons as the number is comingfrom the readers.

The correct number of persons can be used to correct the number of persons(cars) in the zone if an error has occurred.

Page 150: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Cards” menu

920007016-22

6.8 Anti passback controlIn this dialog it is possible to control the anti passback on the whole installation,to move a person from one anti passback zone to another. It is also possible tochange the level of anti passback for the complete system and to give all cardsan anti passback-free status.

Example of the “Anti Passback Control” dialog.

In the “Card No. – Name” list box a card can be selected by clicking directly inthe list.

In the “Zone” drop-down list box it is possible to choose the zone where theoperator wants to place the card.

The option buttons are used for the following purposes:

The “Change of zone for Selected person” button places the cards selected inthe list box in a specified zone (Zone 00 f.inst.)

The button “Set All persons in the same zone” places all card in the installationin the same zone (Zone 00 f.inst.)

The “Set all persons Free” button gives all cards an anti passback-free status.The anti passback registration will start at the next transaction for the card (onany of the readers).

Activation of the “Send” command button causes the program to send theprogramming made in this dialog to the readers.

You can leave this dialog by activating the “OK” command button.

Page 151: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 7-1

7777

“Access” menu“Access” menu“Access” menu“Access” menuThis chapter provides a detailled description of the “Access” menu.

The chapter contains the sections listed in the following table.

Section Page

Show and edit week programs 7-3

Show and edit personnel groups 7-8

Show and edit anti passback zones 7-9

Show and edit elevator definitions 7-12

Show and edit readers 7-13

System overview 7-20

Door control 7-25

Service mode 7-28

Introduction

This chapter

Page 152: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-2

Overview of the “Access” menu

The commands of the “Access” menu depends on whether the system isdisconnected or connected as shown in the figure below.

These dialogs available from the “Access” menu are used for the programming ofmost of the functions necessary for the operation of the Access Control system.

The “Access” menu with the system disconnected and connected.

The various menu commands and their associated dialogs are described in thefollowing sections.

Disconnected orconnected

Disconnected Connected

Page 153: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-3

7.1 Show and edit week programsIn these dialogs available through these menu commands, all Week programsavailable in the system can be displayed and programmed.

Example of the submenu for showing and editing Personnel groups.

You can show the programs when the system is disconnected and show and editthe programs when the system is connected.

The week programs are divided in two categories:

The 30 week programs (per site i multi local-site systems) for Personnel groups(cards) being part of the Global data base in the readers are common for allreaders (per Bus).

Week programs for log control, door control, control of output types 76 & 77 areall Local week programs. Each reader can have different local week programs foreach function. For this reason, it is possible to create 250 different weekprograms in the PC for each function category.

The same week program no. - in the same group of functions - can be used ondifferent readers if several readers use the same time tables during the week.They could also be programmed freely without keeping track of which readeruses which week program no.

7.1.1 Week program functions for personnel groups

The week programs for the Personnel Groups are placed in the Global Data basein the readers and the programming for the week programs will be common to allthe readers (per Bus in a multi local-site system).

The functions at disposal are:

The personnel group will have no access during this period.

The personnel group will have access during this period by entering a PIN-code.

The personnel group will have access during this period without entering a PIN-code.

The personnel group will have access by entering a PIN-code, the door will beopen permanently by the first transaction and will be closed by the next one, etc.

As for the above Toggle function, but the PIN-code is not needed

Week programs forpersonnel groups:

Week programs forreaders:

No access

Access with code

Access withoutcode

Toggle function

Toggle functionwithout PIN-code

Page 154: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-4

7.1.2 Week program functions for readers

The following list provides the week program numbers and the correspondingfunctions.

Week programs for control of Event logs

The week programs for the event log control are all local week programs. Eachreader may therefore have local week programs different for each function, andso it is possible to create 250 different week programs on the PC for eachfunction category.

The following functions are at disposal:

The reader will not log any events during this period.

The reader will log only alarm events during this period.

The reader will log all events except the door passages.

The reader will log all events except door passages without using the PIN-code.

The reader will log all events except those limitations made in the personnelgroups (Function: log normal access in personnel groups).

The reader will log all events.

Week programs for door control

The week programs for the door control are all local week programs. Eachreader may therefore have local week programs different for each function, andso it is possible to create 250 different week programs on the PC for eachfunction category.

The following functions are at disposal:

The cards will have free access during this period.

The door will be always locked during this period.

The door will be in normal mode during this period.

The door can be opened simply by entering a 6-digit PIN-codeduring this period (no card needed - max. 100 different codes).

No log

Log only alarms

Log all but door

Log all but doorwithout code

Log all, but person-nel group limit

Log all

Door always open

Door alwaysblocked

Door in normalmode

PIN-code withoutcard

Page 155: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-5

Week programs for Output control

The week programs for the output control (of the logical output types 76 & 77,also called softtypes 76 & 77) are all local week programs. Each reader maytherefore have local week programs different for each function, and so it ispossible to create 250 different week programs on the PC for each functioncategory.

The following functions are at disposal:

The output programmed with the softtype 76/77 will be passive during thisperiod.

The output programmed with the softtype 76/77 will be active during this period.

7.1.3 Week program dialog description

Example of the “Week Time Programs for :”.

The week program can be selected by keying in the number in the “No.” textbox or by using the arrow buttons. All dialogs for week programs are similar.The only difference is the functions illustrated by different colours in the optionbuttons placed in the right side of the dialog.

The “Site” drop-down list box is not at disposal on a single site configuration ofthe program and will always be attributed to local Site.

In the “Site” drop-down list box the operator can state precisely the site thatshould be programmed with the Global week program (each site can have 30global week programs).

Each week program is described by a “Name” in the text box. This name will bedisplayed in all dialogs using the week programs (f.inst. personnel groups).

Each week program is defined for each week “Day” (Monday-Sunday and 2special days). Each day can be divided into max. 8 time “Period”s (numbered 1to 8).

Passive

Active

Page 156: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-6

The “From” and “To” times of each period for the specified day are displayed inthe corresponding text boxes. The selected function for the period is displayedby a option box and can be changed by clicking in the wanted box.

An overview of each week program is displayed in the left side of the dialog withcolours corresponding to the functions.

By activation of the “Delete” command button it is possible to erase the weekprogram displayed. A Confirmation dialog will be shown at each activation ofthis button.

If you leave this dialog by activating the “Cancel” command button, all new datafor this week program will be lost.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all new modifications.

7.1.4 Programming method

The programming of these different periods in the week programs can be madewith the mouse, using the following method:

1. Click with the mouse on the first week day.

2. Select the required Function for the first period from the “Function” optionbox. The period colour changes according to the selection.

3. Pull up the end of the period (24:00) with the mouse, not releasing the leftmouse button, to the end of the first period

4. Increment the Period in the list box or click with the mouse on the next period.

5. Select the Function from the option boxes for the next period.

6. Pull up the end of the period (24:00) with the mouse, not releasing the leftmouse button, to the end of the second period.

7. Increment the Period in the list box or click with the mouse on the next period.

8. Select the Function from the option boxes for the next period.

9. Continue as described until completing the day (the last period must end at24:00).

To change the time between two periods, you must use this method:

1. Click with the mouse on the period to be modified.

2. Press the 2nd mouse button, and not releasing it, move the mouse to the newtime.

3. Release the 2nd mouse button.

Page 157: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-7

It is possible to copy the programming of one day to another day, using the“Copy” and “Paste” command buttons.

1. Click with the mouse on the day to copy (source).

2. Activate the “Copy” command button.

3. Click with the mouse on the day to where the copy must be done.

4. Activate the “Paste” command button, the programmed day will be copied tothe new day.

Automatic Download of programming

The download towards the readers is performed automatically at eachmodification of the programming of a week program.

The download towards the readers will only be performed (automatically) if areader is already using the week program that is going to be created ormodified.

Global WeekPrograms

Local WeekPrograms

Page 158: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-8

7.2 Show and edit personnel groupsIn the “Personnel Groups” dialog, the names of the different personnel groupsused in the Access Control system can be displayed (programmed).

The”Site” drop-down list box is not at disposal on a mono-site configuration ofthe program and will always be attributed to local Site.

In the “Site” drop-down list box the operator can state precisely the local sitethat should be programmed with the Personnel Groups (each site can have 250personnel groups).

Example of the “Personnel Groups” dialog.

The personnel group can be selected directly by keying in the number in the“No.” text box or by using the arrow buttons.

Each personnel group can be described by a name in the “Name” text box. Thename will be shown in all dialogs using the personnel group (readers, cards etc).

When a personnel group is programmed, it is displayed in the list box belowwith its number and name, giving a complete overview of all personnel groupsin numerical order.

In the “Visitor Group” check box the operator can define if this personnel groupwill be used for visitor cards (see Section 6.3 for the functioning of visitorscards). The groups for the visitors will be shown in the list box with a checkmarkon the line describing them.

To suppress a Personnel Group it is sufficient to select it and activate the“Delete” command button.

It is impossible to delete a Personnel Group if this is still using the cards. Before adelete can be performed it is necessary to place all the cards using this group inanother Personnel Group.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all modifications made.

If you are leaving this dialog with the “Cancel” command button, all new datawill be lost.

The rights of each Personnel Group in each reader must be programmed in thedialog “ Personnel Groups for Reader (Section 7.5.1).

Note

Note

Page 159: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-9

7.3 Show and edit anti passback zonesIn the “Anti Passback Zone” dialog it is possible to create Anti passback Zones foruse in the Access Control system and to see the readers that make up the zone.

This dialog cannot be used to program the configuration of the anti passbackzones. That programming must take place using the “Edit Reader” menucommand (and its dialog) (Section 7.5).

Example of the “Anti Passback Zones” dialog.

The Zone is chosen by entering its number in the ”Zone No.” text box or byusing the arrow buttons.

The “Bus No.” drop-down list box indicates the bus corresponding to this zone.

Up to 16 anti passback zones can be programmed per bus. The readers on Bus00 use the Zones 00 to 15, the readers on Bus 1 use the Zones 16 to 31 etc.

Each zone is displayed with a name and a short description in the “Name” and“Description” text boxes.

See also Section 1.4, Description of large capacity HI SEC systems.

Please note that Zone 00 represents the outside of the system (off thepremises).

The “Zones” list box displays all the Anti Passback Zones and the maximumnumber of persons allowed present in the zone.

Activation of this command button gives the possibility to see (edit) the TimeLimits for the personnel groups in each anti passback zone (Section 7.3.1).

Activation of this command button gives the possibility to see the Readers usedfor the anti passback zone in question (Section 7.3.2).

The “Zone Count Limit” text box gives the possibility to program the number(maximum) of persons authorized inside each anti passback zone.

Page 160: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-10

The “Parking function” check box selects if this zone must work as a ParkingZone. This means that only readers going to Zone 00 will decrease the countingof the zone. Cards going to another zone will not decrease the parking counting.

Activation of the “Delete” command button erases the anti passback zonedisplayed, a Confirmation dialog will be displayed by each action on this key.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all modifications made.

If you are leaving this dialog with the “Cancel” command button, all new dataare lost.

7.3.1 Show & Edit Time Limits for Zone

This dialog gives the possibility to see (program) for each Personnel Group themaximum time (in minutes) that the card holders belonging to the personnelgroup can be present inside each Anti Passback Zone.

Example of the “Time Limit Zone :” dialog.

In the text box “Time (min)” the operator can program the maximum timeauthorized in this Zone for the “Personnel Group” selected. This text box is notaccessible in the display dialog.

Activation of the “Set time To All” command button will apply to all personnelgroups the same maximum time as defined in the text box “Time (min)”. The“Set time To All” command button is not at disposal in the display dialogs.

When the “OK” command button is activated the “Anti Passback Zone” dialog isdisplayed again.

Page 161: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-11

7.3.2 Show Reader in Anti Passback Zone

This dialog gives the possibility to see for each Anti Passback Zone all thereaders used in that zone. Each reader is displayed in a list box corresponding toits function.

Example of the “Readers using Zone :” dialog.

The reader gives permission to enter the anti passback zone.

The reader gives permission to leave the anti passback zone.

The reader is located inside the zone and does not participate in the antipassback control.

This dialog cannot be used to program the configuration of the anti passbackzones. That programming must take place through the “Reader” menucommand and its dialog (Section 7.5).

When the “OK” command button is activated the “Anti Passback Zone” dialog isdisplayed again.

“Entry Readers”

“Exit Readers”

“Internal Readers”

Note

Page 162: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-12

7.4 Show and edit elevator definitionsIn this dialog the Elevator definitions can be displayed (programmed).

Example of the “Elevator Definitions” dialog.

The elevator definition can be selected by keying in the number in the “No.” textbox or by using the arrow buttons.

Up to 250 elevator definitions can be created including different elevator levels.Each definition can be programmed with a name and a short description in the“Name” and “Description” text boxes.

A field with check boxes gives the possibility to select all the wanted (andaccessible) floors for this definition.

By the “Select all” command button all floors can be attributed to this definition.

The “Unselect all” command button deselects all floors in this definition.

The “Delete” command button erases the displayed elevator definition. AConfirmation dialog will be displayed by each action on this button.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all modifications made.

If you are leaving this dialog with the “Cancel” command button, all new datawill be lost.

The name labels for each floor can be programmed only during the installationof the AIMS program. By default, the name labels are “Floor 0” to “Floor 29”.

Note

Page 163: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-13

7.5 Show and edit readersThis dialog gives the possibility to program the readers with the local weekprograms, with the door control timing, and to display inputs and outputs. It alsoallows for the definition of the role each reader has in a system using antipassback.

On top of this, the dialog gives the possibility to associate for each reader thepersonnel groups with the week programs, in order to define the access throughthis door.

in this dialog, it is not possible to create a reader, but just to program its contents.Creating a reader requires the AICS program or an upload of the installation.

Example of the “Reader – Site:” dialog.

The reader can be selected among the programmed readers in the “Readers”drop-down list box.

The No. of the Reader corresponding to the address will automatically bedisplayed.

The name and a short description of each reader can be modified in the “Name”and “Description” text boxes.

In this dialog it is possible to attribute the Local Week Programs used by thereader.

Each reader can be controlled by 4 week programs with different functions:

“Log control”, “Door control”, “Output 1” (soft type 76), and “Output 2” (soft type77).

The names of the week programs used are displayed in the correspondingdrop-down list boxes.

The functions and the programming of the different week programs are definedthrough the “Edit Week Programs” menu command and its dialog (Section 8.1).In this dialog it is possible to attribute the Anti Passback Zones used by thereader.

Note

Page 164: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-14

The anti passback zones must beforehand be created by the “Edit AntiPassback Zones” menu command and its dialogs (Section 7.3).

The reader is located inside the anti passback zone displayed in the drop-downlist box.

The reader gives permission to enter the anti passback zone displayed in thedrop-down list box.

A reader having the same zones indicated for these two parameters isconsidered as an Internal Reader in the zone.

The Anti Passback Level for each reader can be programmed by means of thecorresponding drop-down list box.

“No Anti Passback”No anti passback control at all.

“Anti Passback reset each hour”The anti passback is set to a free status once each hour.

“Anti Passback reset each day”The anti passback is set to a free status once each day (at midnight).

“Always Anti Passback”Anti passback control all 24 hours (may be overruled by a high priorityoperator).

This command button opens a new dialog “Personnel groups for reader”(Section 7.5.1).

This command button opens a new dialogue box: “Reader Inputs”(Section 7.5.2).

This command button opens a new dialogue box: “Reader Outputs”(Section 7.5.3). reader.

This command button opens a new dialogue box: “Door parameters” on thereader (Section 7.5.4).

To close this dialogue box, you must activate the “OK “command button. Thisoperation will store all modifications made.

If you are leaving this dialog with the “Cancel” command button, all new datawill be lost.

Note

“Location Zone”

“Entry Zone”

Note

“APB level”

Page 165: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-15

7.5.1 Edit personnel groups for reader

In this dialog it is possible to program, for each reader, the different PersonnelGroups that will be using this reader.

All the personnel groups shall be programmed in the drop-down list box one byone and will be displayed with the informations in the text box “ProgrammingPersonnel Groups”.

Example of the dialog “Personnel Groups” for readers

As all the personnel groups are displayed in the corresponding drop-down listbox they can be selected directly in the box or they can be brought in to the boxusing the command buttons “Next” or “Prev.”.

The data that shall be programmed for each personnel group are the following:

The Week Program used by the personnel group on that reader.

If the system is of the integrated type (comprising at the same time AccessControl and Intruder) an Intrusion User No. must be programmed.

If the system uses Elevator Control the Elevator Definition must beprogrammed (stated).

The “Door Control” option buttons give the possibility to attribute the doors ofthe reader that are commanded by the personnel group.

This personnel group will activate the first door of the reader only.

This personnel group will activate the second door of the reader only.

This personnel group will activate the two doors of the reader.

The activation of two doors by the same reader may cause failures in thelogging, as well as in the anti passback control, f.inst. in the case where severalpersons arrive together and use their cards in the classical way (one after theother); it is evident that the two doors validate the entries but that it is not clearwhich person has entered and at what door.

“Primary Door”:

“Secondary Door”

“Both Doors”

Note

Page 166: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-16

Three check boxes give the possibility to attribute the options for the personnelgroup to the reader as follows:

The cards belonging to this personnel group will be authorized to operate theIntruder system (integrated systems only).

The card holders in this personnel group will be authorized to use the hold-upcode. The hold-up code is defined as the PIN-code + 1.

The reading of a card opening the door in the normal way will/will not beregistered in the event log.

The the option buttons of the field “Guard Tour identification to PC” are used toprogram the options for the guard tour management for this personnel group onthe reader. The following are available:

This personnel group will not send a message to the Guard tour managementsoftware on the reader.

This personnel group will send a message to the Guard tour managementsoftware on the reader after the reading of the card and opening of the door.

This personnel group will send a message to the Guard tour managementsoftware on the reader after the reading (and acceptance) of the card.

When you check the “Lock privileges” box, the option buttons “Group 1” to“Group 8” are enabled so that you can assign Lock Priveleges (Access rights) -for the selected personnel group - to one group of up to 8 groups of VaultControllers.

The “Copy” command button is used to copy the contents (programming) for apersonnel group to a "clipboard".

The “Paste” command button is used to paste (place) the contents of theclipboard into the personnel group displayed on the screen.

The “Copy all the personnel groups from Reader” command button is used forcopying all the programming for personnel groups from some other reader (thesource) to the reader being edited at the moment (the target).

If you are leaving this dialog with the “Cancel” command button, all the new datafor this reader will be lost.To close this dialog, you must activate the “OK” command button. This operationwill store all modifications made.

“Operation ofIntrusion system”

“Hold-up Codeallowed”

“Log door entry”

” No message”

“After opening of thedoor”

“After acceptance ofthe card”

“Lock priveleges”

Page 167: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-17

7.5.2 Show reader input

In this dialog can be displayed all inputs programmed in the reader.

Example of “Reader Input” dialog.

All S-ART Input addresses (00 to 31) will be displayed in the list box.

For each programmed address an Input softtype number and its Denominationwill be displayed.

The empty addresses correspond to inputs not programmed.

For each displayed address you will have a short description. The descriptionof each address can be modified in the “Description” corresponding text box.

When the “OK” or the “Cancel” command button is activated, the “Reader –Site:” dialog (Section 7.5) is displayed again.

Page 168: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-18

7.5.3 Show reader output

In this dialog all outputs programmed in the reader can be displayed.

Example of the “Reader Output” dialog.

All S-ART Output addresses (00-31) will be displayed in the list box.

For each programmed address, an Output softtype number and theDenomination will be displayed. The “Activating type” is the type of signal from thecorresponding output.

The empty addresses correspond to undefined outputs.

For each displayed address you will have a short description. The descriptionof each address can be modified in the “Description” corresponding text box.

If an output is programmed with a softtype no. between 90 and 99, a new part ofthe dialog will be displayed, indicating the Output function programming.

The contents of the “Output function” controlling the output will be displayed in thefollowing way:

The first text box displays the equation formula, the left part is the selected outputsofttype number and the right part consists of the input soft type numbers,separated by mathematical operators (* represents the function AND, +represents the function OR).

A list box displays all the existing “Input Softtypes” to make it easier to read theequation.

When the “OK” or the “Cancel” command button is activated, the “Reader –Site:” dialog (Section 7.5) is displayed again.

Page 169: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-19

7.5.4 Show and edit door parameters

In this dialog can be displayed all door parameters programmed on the reader.

All parameters can be changed if necessary by rewriting the new required values.Two new parameters are programmable in the reader standard version, themaximum time between the card reading and the PIN-code entry, as well as thenumber of false codes before activating an invalid code fault.

Example of “Door Timing” dialog

Example of door timing parameters.

The following door parameters can be set:

“From Activation to Time-out”. This is also called the striking plate activationtime. It is set in secondss.

“From Door-open to Warning”: This is the period in which the door may stayopen with out warning. It is set in seconds.

“Duration of Warning period”: This is the duration of the open door warningsignal. It is set in seconds.

“Time to enter PIN-code”: This is the max. time (in seconds) allowed betweenthe reading of a card (valid) and the entry of the PIN-code.

“Number of PIN-code faults before misuse”: This is the number of times ofallowed attempts to enter the card PIN-code before generating an alarm.

When the “OK” or the “Cancel” command button is activated, the “Reader –Site:” dialog (Section 7.5) is displayed again.

Page 170: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-20

7.6 System overviewBy means of these two menu commands it is possible to get a schematicoverview of the programming for the Access Control system. No programmingcan take place but the dialogs will be a help in the understanding and theexplanation of the programming done on the system.

The “SystemOverview” menu command with associated submenu.

Programming of Personnel Groups Programming of Anti Passback Zones

Site Access Control (branching closed)

Site Access Control (branching closed)

Site Access Control (branching open)

Site Access Control (branching open)

Personnel group (branching closed)

Anti passback control (branching closed)

Personnel group (branching open)

Anti passback control (branching open)

Access Control reader Access Control reader (branching closed)

Door Access Control reader (branching open)

A double-click on one of the lines containing these symbols will open (or close)the branching according to the former state.

The symbols forAccess Controlmenus

Page 171: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-21

7.6.1 Personnel groups overview

In this dialog the programming of personnel groups on the readers is shown. Adouble-click on a site displays the branching of all personnel groups for the site. Adouble-click on a personnel group displays all the readers authorized for thispersonnel group. Each reader is displayed with the week program associated tothis personnel group and the function used at the moment (the time shown at thebottom of the dialog) in the week program. A double-click on the reader displaysthe door of the reader and the program for Automatic door control that the readercontrols, also displayed is the door function used at the moment (the time shownat the bottom of the dialog).

In a single site configuration of the program, a single site will be displayed and willalways be attributed to Local Site.

For an explanation of the Week Programs and the Access Functions associated,see Section 7.1. For an explanation of the association of Week Programs withPersonnel Groups, see Section 7.5.1.

Example of the “Access System Overview” dialog.

The text boxes at the bottom of the dialog will display the Site selected and thePersonnel group. The time displayed is the PC time at the moment the menuwas called, it is also the time upon which is based the displays of the accessfunctions.

The colours used for the access functions correspond to those used in theprogramming dialogs for the week programs.

Activation of this command button will give a print-out of the contents of thestatus dialog presented on the screen.

Activation of the “OK” command button will close this dialog.

Note

Page 172: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-22

7.6.2 Anti passback zones overview

In this dialog the programming of anti passback zones on the readers is shown.

Each zone is shown with its No. and Name and the “Person Limit” for the numberof persons in the zone. For an explanation of Person Limit see Chapter 8.3.

A double-click on a site displays the branching of all the anti passback zones onthe site. A double-click on an anti passback zone displays all the readersconnected with this anti passback zone.

In a single site configuration of the program, a single site will be displayed and willalways be attributed to Local Site.

Each reader is displayed with its function in the anti passback zone: “ENTRY”,“EXIT” or “INSIDE”. For an explanation of the Anti Passback Functions, seeSection 9.5.

A double-click on the reader displays the personnel groups to which the timelimits in the zones are attributed, and the also value of the “Time Limit” is shown(in minutes). For an explanation of the Time limits, see Chapter 8.3.1.

Example of the “Access Zone System Overview” dialog.

The text boxes in the bottom of the dialog will display the “Site”, the “Zone”, andthe “Reader” selected.

Activation of this command button will give a print-out of the contents of thestatus dialog presented on the screen.

Activation of the “OK” command button will close this dialog.

Page 173: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-23

7.6.3 “Reader - Card” menu command

The “Reader - Card” menu command displays the “Card(s) with access toReader” dialog.

The top list box (Readers) shows the readers present in the system while thelist box below (Cards) shows the cards that can access the reader currentlyselected in the top list box.

The “Number of Persons” box shows the number of persons (cards) withaccess to the selected reader.

In the “Order” drop-down list box you can select various criterias for listing thecards with access. The criterias are set in the AIMS.INI file.

By clicking the “Print” button, you can get a print-out of the content of the Cardslist box.

Example of the “Card(s) with access to Reader” dialog.

Page 174: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-24

7.6.4 “Card - Reader” menu command

The “Card - Reader” menu command displays the “Reader(s) with access forcard” dialog.

The left list box (Cards) shows all cards present in the system while the list boxto the right (Readers) shows the readers to which a a card selected in the Cardslist box, has access.

The “Number of Persons” box shows the number of persons (cards) withaccess to the selected reader.

In the “Order” drop-down list box you can select various criterias for listing thecards with access. The criterias are set in the AIMS.INI file.

By clicking the “Print” button, you can get a printout of the content the “Readers”list box.

Example of the “Reader(s) with access for card” dialog.

Page 175: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-25

7.7 Door controlIn this dialog, it is possible to see the door status of all doors, to open a door, goback to door normal functioning after using a card with the toggle function andpermanently open or block a door.

On a Multi-site configuration it is necessary to choose the site(s) by means of the“Site Selection” dialog (Chapter 5.6.3) before this menu can be accessed.

Example of the “Door Control” dialog.

Each reader is displayed with its “Reader name” (Number and Name) as well asthe “Door 1 status” and “Door 2 Status” for the doors 1 and 2 that the reader cancontrol.

Forced.

Held.

Permanent open.

Blocked.

After having selected a reader by clicking in the list box and after havingselected the door to be controlled (door 1 or door 2) by means of the optionbuttons, you can control the reader door by means of the command buttons inthe bottom of the dialogue box.

This command button activates the striking plate to open the door in the sameway as a valid card or an exit push button.

This command button sets the door back to normal function again(indispensable after a door has been blocked or after a permanent open statusfor a door).

This command button blocks the reader (nobody can pass through this door).

This command button opens the door permanently (the access becomes freefor this door).

When the “OK” command button is activated, the main menu is displayed again.

Page 176: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-26

7.8 Vault ControlIn this dialog, it is possible to see the lock mode and the lock status of of the vaultlock together with the site and any messages. You may also unlock the vault,stop the unlocking and perform an emergency opening of the vault lock.The “Vault Control” dialog is available in the AIMS version 6.06 and newer.

Example of the “Vault Status” dialog.

The “Lock mode” column shows the current lock mode that can be:

Locked

Unlocked

If you double-click the status for the selected lock, the “Information” column willdisplay the countdown of the timer currently running, provided you are allowedto do that.

The update time of the timers is programmable and is set in the AIMS.INI file inthe Lock Status time line of the group [VAULT].

The “Lock Status” column shows the current lock status that can be:

Normal

Open

Alarm

Sabotage

Page 177: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

92000701 7-27

The “Information “ column provides messages regarding the timers controllingthe lock. The following may be shown:

Unlocking – Wait

Unlock timer running

Open timer running

Closing

Warning.

The “Site” box shows the number and the name of the site where the selectedVault Controller is situated.

The “Messages” box may display messages regarding the operation

When you have selected a Vault Controller and lock , the three commandbuttons in the lower right corner of the dialog are enabled.

When you click the Unlocking button, the unlocking of the selected lock starts,provided that no other lock in the group is being unlocked.

When you click the Stop Unlocking button, the unlocking of the selected lock isstopped.

When you click this button the Emergeny Unlocking button, the normal waitingtime is cancelled and the lock is unlocked immediately.

More information about the Vault Controller can be found in the Users manual,Thor System Vault Controller 95T ACM, Ref. No. 92000201.

“Site”

“Messages”

Page 178: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Access” menu

920007017-28

7.9 Service modeIn this dialog it is possible to authorize access to the installation for a Servicecard by means of a reader. It is also possible to block the use of Service cards.

Example of the “Access Service Mode” dialog.

Each Bus present in the system is displayed on a line with the actual service(maintenance) status:

Green Service authorized

Red Service blocked

See the Technical Manual or the AICS program descriptions for detailedinformation about the functions authorized for the service technician.

The “Allow Service” and the “Block Service” command buttons make it possibleto change the service status for each Bus.

Only the busses having at least one reader can be given a valid status in thisdialog.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all modifications made.

Note

Page 179: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 8-1

8888

“Intrusion” menu“Intrusion” menu“Intrusion” menu“Intrusion” menuThis chapter provides a detailled description of the “Intrusion” menu.

The chapter contains the sections listed in the following table.

Section Page

Show and edit Master areas 8-3

Show and edit Central units 8-4

Testing 8-12

Service mode 8-14

Introduction

This chapter

Page 180: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

920007018-2

Overview of the “Intrusion” menu

The commands of the “Intrusion” menu depends on whether the system isdisconnected or connected as shown in the figure below.

The dialogs accessible through the “Intrusion” menu commands are used for theprogramming of user codes and of automatic settings. Three menu commandsgive access to dialogs for system testing.

The “Intrusion” menu with the system disconnected and connected.

The various menu commands and their associated dialogs are described in thefollowing sections.

Disconnected orconnected

Disconnected Connected

Page 181: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

92000701 8-3

8.1 Show and edit Master areasIn this dialog the Master Areas can be defined (programmed). The areas aredisplayed as well as the Central units to which these areas belong.

Example of the “Master Areas” dialog.

A Master Area is an association of areas belonging to different central units.This concept is intended solely for the PC, it does NOT exist in the Intrudercentrals themselves, but the concept allows a simple way of handling thesetting/unsetting of a selection of areas belonging to different central units.

For the use of Master areas, see the “Master Area status” dialog (Section 5.2).

The Master area is chosen by clicking directly on its “No.” in the correspondinglist box. Each area is described by its Name.

The areas included in the Master area are displayed in the “Selected CU Areas”list box preceded by the central unit to which they belong. The selection of oneof the areas will automatically be displayed (in the lower part of the dialog) thecentral unit (“CUs:”) and all the”Areas” belonging to it; the associated area willbe shown highlighted.The maximum number of Master areas is 250.

Activation of the “Add Area” command button will add the area selected in theIntruder central in the lower part of the dialog. The area added will automaticallyadded also to the “Selected CU Area” list box.

Activation of the “Remove Area” command button will remove the area selectedin the “Selected CU Area” list box.

Activation of the “Delete” command button will delete the Master area displayed,a Confirmation dialog will be shown at each activation of this button.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all modifications made.

If you are leaving this dialog with the “Cancel” command button, all new datawill be lost.

Page 182: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

920007018-4

8.2 Show and edit Central unitsIn this dialog it is possible to show (and edit) the Intruder system central units.

The central unit is chosen by clicking directly in the “Intrusion CU” drop-downlist box.

Example of the “Intrusion Central Units” dialog

Note: in this dialog, it is not possible to create an Intruder central, but just to edit(program) its contents. Creating a central unit requires the AICS program or anUpload of the Intruder installation.

Each central unit is described by its name in the “Name” text box.

A short Description can be shown (edited) for each Intruder Central Unit in the“Description” text box.

The command buttons in the bottom of the dialog give the possibility to see (andedit, if authorized) all the parameters for each Intruder central (see the followingparagraphs).

You can leave this dialog by activation of the “OK” or the “Cancel” commandbutton.

8.2.1 Show and edit user numbers/codes

In this dialog it is possible to program the Codes corresponding with users andto see the corresponding priorities and areas.

Example of the “Users” dialog

Page 183: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

92000701 8-5

After selection of number in the “User No.” box, the code is programmed in the“Code” text box by entering six digits.

For reasons of security the entered Code is masked on the screen and is shownwith asterisks (*).

The name of the person (or personnel group) can be programmed in the“Name” text box.

For each user number the associated Area will be shown in the “Area” list boxwith an indication of the area type (“Logical” or “Physical”). The area can bechanged.

The priority level for the code (corresponding to the beforehand programmedaccess level) can be seen or changed in the option box field on the left side ofthe screen.

The Service Code and Priority cannot be changed.

If you quit this dialog by activating the “Cancel” command button all themodifications performed will not be registered.

By activation of the “Delete” command button the user shown on the screen willbe removed from the Intruder system.

If you leave this dialog by activating the “OK” command button, all modificationsperformed will be registered.

8.2.2 Show and edit auto setting programs

In these dialogs all Week programs, available for Auto Setting in the Intrudersystem, can be displayed (programmed).

The 8 week programs for auto setting must be programmed for areas. It ispossible to automatically set/unset up to eight areas per Intruder central (Area 1to 8). An independent week program can be effected for each area.

Week program functions for automatic setting

The usable functions are the following:

Setting the area at the beginning of the period or setting at the end of the period,if delay has been demanded from one of the Remote keypads.

Setting the area at the beginning of the period.

Setting the area at the beginning of the period and enabling of manual unsettingat the end of the period.

Unsetting the area at the beginning of the period.

No changes, in relation to actions performed by the preceding function.

The status of the area is verified during the period and a message is given if thearea is unset.

Service Code

“Set at Beg. or End ifDelayed”

“Set at Beg.”

“Set at Beg. + enableMan. Unset”

“Unset at Beg.”

“No Change”

Area Set Test

Page 184: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

920007018-6

Week program dialog

Example of the “Week Time Program for :” for autosetting.

The week program can be selected by keying in the number in the “No.” textbox or by using the arrow buttons.

The “Site” list box displays automatically which site the central unit belongs to, itis not possible to select in this list box.

Each week program is described by a name in the “Name” text box. This namewill be displayed in all dialogs using the week programs.

Each week program is defined by each week Day (Monday-Sunday and 2special days). Each day can be divided into max. 8 Periods.

The From and To times of each period for the specified day are displayed in thecorresponding text boxes. The selected function for the period is displayed by aoption box and can be changed by clicking in the wanted box.

An overview of each week program is displayed in the left side of the dialog withthe colours corresponding to the functions.

If you quit this dialog by activating the “Cancel” command button all themodifications made for the displayed week program will not be registered.

To close this dialog, you must activate the “OK” command button. Thisoperation will log all new modifications.

You must make a manual download after changing one or more of thesprograms.

Note

Page 185: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

92000701 8-7

Programming method.

The programming of these different periods in the week programs can be madewith the mouse, using the following method:

1. Click with the mouse on the first week day.

2. Select the required Function for the first period from the “Function” optionbox. The period colour changes according to the selection.

3. Pull up the end of the period (24:00) with the mouse, not releasing the leftmouse button, to the end of the first period.

4. Increment the Period in the “Period” list box or click with the mouse on thenext period.

5. Select the Function from the option boxes for the next period.

6. Pull up the end of the period (24:00) with the mouse, not releasing the leftmouse button, to the end of the second period.

7. Increment the Period in the list box or click with the mouse on the nextperiod.

8. Select the Function from the option boxes for the next period.

9. Continue as described until completing the day (the last period must endat 24:00).

To change the time between two periods, you must use this method:

1. Click with the mouse on the period to be modified.

2. Press the 2nd mouse button, and not releasing it, move the mouse to thenew time.

3. Release the 2nd mouse button.

It is possible to copy the programming of one day to another day, using the“Copy” and “Paste” command buttons.

1. Click with the mouse on the day to copy (source).

2. Activate the “Copy” command button.

3. Click with the mouse on the day to where the copy must be done.

4. Activate the “Paste” command button, the programmed day will be copied tothe new day.

Page 186: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

920007018-8

8.2.3 Show areas

In this dialog it is possible to see - for each Area - the zones comprising the areaand also if it is a logical or a physical area.

Example of the “Areas” dialog.

The area can be chosen by clicking directly on its name (and number) i the“Area” text box.

The zones included in the area are shown in the check box field “Zonesincluded”; an included zone is represented by a check box. All zones aredisplayed with their name. The selected zones cannot be changed.

A short description for each area can be entered in the “Description” text boxwhen the area is selected. The selected zones cannot be changed.

When an area is selected the numbers and names of the Users associated withthe area can be seen in the “Users in area” text box.

The required autoarm week program for the area can be selected in the“Autoarm Week Programs list box.

You can leave this dialog by activating the “OK” command button.

Page 187: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

92000701 8-9

8.2.4 Show zones

In this dialog the current configuration of each Zone will be shown, f.inst. thename of each zone.

Example of the “Zones” dialog.

The zone can be chosen by clicking directly on its name i the “Zone” text box.

A short description for the selected zone can be entered and later displayed inthe “Description” text box.

In the “Circuits included” text box are listed all the Circuits (detectors) includedin the selected zone with their number (address) and name.

You can leave this dialog by activating the “OK” command button.

8.2.5 Show input addresses - Intruder

In this dialog all the Input addresses (circuits) programmed in the Intrudersystem can be shown.

Example of the “Circuits” dialog

Each input is described by its Number (address), Name, Input soft Type(logical) (number and description), and the Zone to which the input belongs.

You can leave this dialog by activating the “OK” command button.

Page 188: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

920007018-10

8.2.6 Show output addresses - Intruder

In this dialog all the Output addresses programmed in the Intruder system canbe shown.

Example of the “Outputs” dialog.

Each output is described by its Number (address), Output soft Type (logical)(number and description), the Zone that activates the output, and the Timerfunction that defines the functional mode for the output.You can leave this dialog by activating the “OK” command button.

8.2.7 Show alarm functions - Intruder

In this dialog all the Alarm Functions programmed in the Intruder system can beshown.

Example of the “Alarm Functions” dialog.

Each alarm function is described by its Number, its Content, and by the Outputthat might be activated and the Timer function that controls the output.A short description of each alarm function can be given in the “Description” textbox.

You can leave this dialog by activating the “OK” command button.

Page 189: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

92000701 8-11

8.2.8 Show timers – Intruder

In this dialog all defined Timers of the Intruder Central are displayed.

Example of the “Show timers” dialog.

Each timer is described by its Number, a Delay, a Duration, and a Polarity .

You can click a timer to select it and enter a name for this timer in the “Name”text box.

You can leave the dialog by clicking the “OK” button.

Page 190: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

920007018-12

8.3 TestingTesting of certain parts of the Intruder system can be performed by means ofthe menu commands “Seismic/Walk Test”, “Battery Test” and “Bell Test”.

The command buttons used for the dialogs of the Intruder system test menusare:

Activation of this command button starts the test.

Activation of this command button stops the test.

This command button gives the possibility to quit the “Test” dialog, but it is notaccessible during the test. If it is wanted to interrupt an ongoing test, this can bedone by first activating the “Stop” command button and then the “Cancel”command button.

8.3.1 Test seismic and infrared detectors

The “Seismic/Walk Test” command gives the possibility to test the correctfunctioning of Infrared and Seismic detectors.

Examplse of the “Seismic/Walk Test” dialog

The selection of the command opens automatically the “Select Central Unit”dialog (Section 4.6.1) thus permitting the choice of the central unit desired.

The test output (output soft type 19) is activated in order to verify the reaction ofthe infrared detectors by means of their built-in test lamp (if available).

You may also test the reaction for seismic TL 02 detectors by activation of theoutput (output soft type 19) by means of a built-in test generator (the test outputsoft type must for this use be programmed to an address that already has aseismic input soft type 02 programmed onto it, and with the same zone numberas the input address).

You can leave this dialog by activating the “Cancel” command button.

Page 191: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

92000701 8-13

8.3.2 Test batteries

The ”Battery Test” command gives the possibility to test the batteries via thePC. To perform the test the operator must have at least a manager priority level(P1).

Examples of the “Battery Test” dialog.

The selection of the command opens automatically the “Select Central Unit”dialog (Section 4.6.1) thus permitting the choice of the central unit desired.

When the test is started, the battery charging circuit is disconnected for 15seconds, and the power for the complete installation is supplied by the battery.One second later the battery condition is displayed in the” Result” text box(“BATTERY OK” or “BATTERY FAULT”). This procedure is repeated every 16seconds, until the display auto-clear (2 minutes) is activated or until the “Stop”command button is activated.

A battery fault message can not be reset until a (renewed) battery test givesthe result “BATTERY OK”.

You can leave this dialog by activating the “Cancel” command button.

8.3.3 Test sirens

The “Bell Test” command gives the possibility to test the sirens via the PC.

Examples of the “Bell test” dialog.

The selection of the command opens automatically the “Select Central Unit”dialog (Section 4.6.1) thus permitting the choice of the central unit desired.

The siren output types are activated - soft output types 01 and 29.

Only the 'common' siren outputs - Zone 00 - and the siren outputs for a Zonebelonging to the area for the operator are activated.

You can leave this dialog by activating the “Cancel” command button.

Page 192: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Intrusion” menu

920007018-14

8.4 Service modeIt is possible to authorize access to the installation for a Service Code by meansof a reader or a terminal.

Example of the “Service Mode – Status” dialog.

Each Central Unit present in the system is displayed on a line with the actualservice (maintenance) status:

Green System in Service mode

Yellow Service authorized

Red Service blocked

Only the service technician can set the system into service mode, an operatorcan alone allow or block service by means of the command buttons “AllowService Mode” or “End Service Mode”.

Do not forget to select the Central Unit you want to work on by clicking in the“CU´s Status” list box.

The “Allow Service mode” permits the service technician (P4) to enter his codeone time.

To close this dialog, you must activate the “OK” or “Cancel” command button.

Note

Page 193: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 9-1

9999

“Alarms” menu“Alarms” menu“Alarms” menu“Alarms” menuThis chapter provides a detailled description of the “Alarms” menu.

The chapter contains the sections listed in the following table.

Section Page

Show alarm log 9-3

Edit alarm filters 9-5

Edit alarm procedures 9-6

Edit alarm functions 9-8

Introduction

This chapter

Page 194: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

920007019-2

Overview of the “Alarms” menu

The commands of the “Alarms” menu are the same independent on whether thesystem is disconnected or connected as shown in the figure below.

The “Alarms” menu.

The various menu commands and their associated dialogs are described in thefollowing sections.

Disconnected orconnected

Page 195: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

92000701 9-3

9.1 Show alarm logIn this dialog, it is possible to consult all alarms that occurred or are occurring inthe installation.

The newest alarms are displayed first (at the bottom of the list) and the alarmpriority is not indicated. The alarm handling status is indicated with the samecolours as used in the “Alarm status” window (Section 5.1).It is possible to consult all the events from the complete log but please note,that it can take some time to go from the start of the log to the end of the log(oldest event).

Example of the “Alarm Log” dialog.

The list box shows all alarms chronologically listed (the newest alarms aredisplayed first), each alarm is presented in two lines with the followingparameters:

Alarm date and time.

Date and time for reception of the alarm at the PC.

Event source: Reader number - Intruder Central No. or AIMS program.

Alarm status: Not accepted or accepted by (operator).

Event description.

The text colour of each alarm indicates the alarm handling status.

Red new alarm.

Yellow alarm accepted but not cleared from the “Alarm status” window.

Green alarm cleared from the “Alarm status” window.

Blue alarm has been accepted directly on a terminal (or Minitel) in theinstallation (not by means of the PC). This applies for Intruder systemonly.

Activation of the “Show handling report” command button opens a dialog withthe operator's report concerning the alarm selected (see Section 9.1.1).

To close this dialog, you must press the “OK” command button.

Page 196: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

920007019-4

9.1.1 Show alarm handling report - Intruder and AccessControl

In this dialog the operator's report concerning any of the alarms listed in theAlarm log can be displayed.

Example of the “Alarm Handling Report” dialog.

For the alarm selected in the alarm log the following information is displayed:

Alarm date and time.

Date and time for reception of the alarm at the PC.

Description of the alarm

Event source (Reader number, Intruder Central No., PC).

Alarm status (Not accepted or accepted).

The “Handling Report” text box gives the possibility to consult the report fromthe operator in session at the moment the alarm appeared (operation affected,cause of alarm, decisions etc.).

Activation of the “OK” or the “Cancel” command button will bring the “AlarmLog” dialog on the screen.

Page 197: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

92000701 9-5

9.2 Edit alarm filtersIn this dialog it is possible to specify the filters for all existing alarm types in theAIMS program.

Example of “Edit Alarm Filter” dialog.

These filters determine the system reaction for the different alarm types.

The following reactions are available:

The alarm will automatically be displayed in a pop-up window and the newalarm will be indicated in the bottom of the “Alarm status” window in red. Thealarms with the highest priority level will be displayed first if more alarms arriveat the same time. All new alarms will be displayed in the bottom of the “Alarmstatus” window.

The alarm is not displayed in the “Alarm status” window and goes directly to thelog, it needs no handling. It can be displayed on demand in the alarm log or in areport.

The alarm is ignored by the program, it needs no handling and is not logged.

To close this dialogue box, you must activate the “OK” command button. Thisoperation will store all modifications made.

If you are leaving this dialog with the “Cancel” command button, all new datawill be lost.

“Pop-up”

“No Pop-up”

“No Reg.”

Page 198: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

920007019-6

9.3 Edit alarm proceduresThis dialog allows programming of the procedures to be taken in case of alarm.

A procedure is a dialog, accessible when the “Procedures” command button isactivated for a selected alarm in the “Alarm status” window (Chapter 6.1).

Example of the “Edit Alarm Procedure” dialog.

The “Alarm Source” drop-down list box allows selection of the bus device(unit/element), generating the alarm, which will use the procedure going to beedited.

All readers and central units programmed in the system are displayed in thedrop-down list box.

If the procedure must be the same for all readers, you can select “All devices”.

The “Alarm Type” drop-down list box allows selection of the alarm type whichwill use the procedure going to be edited.

The “Alarm Input” drop-down list box allows selection of the addresscorresponding to the alarm type for which the alarm procedure should beedited.

In the “Alarm Procedure” text box, the required alarm procedure text can nowbe written.

If you click the Print command button you will get a print-out of the the alarmprocedure of the dialog. When the “All” check box is checked you will get aprinout of all alarm procedures.The “Setup” command button will display a dialog for setting up the printer,while the “Font” command button provides a dialog for selecting fonts.

By activating the “Copy” command button the alarm procedure (programmed) isstored in the Clipboard.

By activating the “Paste” command button the contents of the Clipboard can bepasted into another alarm procedure selected onto the screen.

Page 199: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

92000701 9-7

By activating the “Delete” command button the displayed alarm procedure maybe completely removed from the system. Each time this button is activated aConfirmation dialog is brought on the screen.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all modifications made.

If you are leaving this dialog with the “Cancel” command button, all new data forthe procedure displayed at the moment will be lost.

Page 200: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

920007019-8

9.4 Edit alarm functionsWhen you select the “Edit Alarm Functions” menu command, the “AIMS AlarmFunction” dialog is displayed.

You can use this dialog for programming new alarm functions or for editing ordeleting existing alarm functions for individual readers and Central units.

Before the AIMS alarm functions can be put into operation, it must be enabledin the AIMS.INI file. Enabling of the function is described later in this section.

Example of the “AIMS Alarm Functions” dialog.

When the dialog is displayed, it contains the data of the alarm function for theprevious time, the dialog was used.

The name of the alarm function is shown in the “Alarm functions” list box aswell as in the “Name” text box.

A description, if any, will be shown in the “Description” text box.

The Functions field shows, in one or more of the seven list boxes, the name(s)of the individual functions making up the current function. The “OR” or “AND”options that can be selected, relates the individual functions to each other.

The Output field shows the device, output and timer in the corresponding listboxes and the selected type of output.

All functions presented in the dialog can be edited either by selecting otherfunctions in the list boxes and other options using the “OR” and “AND” optionbuttons and the output type option buttons. When editing is completed, click the“OK” button.

After you have selected a function in the “Alarm functions” list box, it can bedeleted by clicking the “Delete” button.

Note

“Alarm functions”“Name”

“Description”

Functions field

Output field

Editing a function

Deleting a function

Functions field

Output field

Page 201: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

92000701 9-9

A new function can be programmed by clicking the “New” button. This will clearall current data in the dialog.

Type a new name in the “Name” text box. The name you have typed istransferred to the “Alarm functions” list box. If needed, you can type a shortdescription of the new function in the “Description” text box.

The Function field below the “Description” box contains seven list boxes inwhich you can select the functions to use in the new function.List boxes that should not be included in the new function should be left blank.

You can relate the individual functions to each other by means of the “OR” or“AND” options, selected by clicking the appropriate button.

In the “Device” list box, you must select the device to which the alarm functionshould be applied. The output device can be a reader or an Intrusion CentralUnit.

The outputs available in this list box depend on the device selected in the“Device” list box.

The timers available in this list box depend on the device selected in the“Device” list box.

The type of output you select with the option buttons “Local output type” or“External output type”– affects the way in which the alarm can be reset asfollows:

If you select this type of output, it can be reset by accepting the alarm in the“Alarms” window

If you select this type of output, it can be reset by deleting the alarm in the“Alarms” window

9.4.1 Enabling the AIMS Alarm Function facility

Before the AIMS alarm functions can be put into operation, you must changethe AIMS.INI file, save the file and start the AIMS, if this operation has not beenperformed earlier.

As default, the [AIMS Alarm Function] section appears as follows:

[AIMS Alarm Function] Parameter valuesEnable Alarm Functions=0 0 = disabled 1 = enabledTime between Calculations=10 10 to 32767 (seconds)Calculate after each alarm=0 0 = disabled 1 = enabled

To enable the AIMS Alarm Function, the parameter value of the line:

Enable Alarm Functions= must be changed from 0 to 1.

Programminga new fuction

“Device”

“Output”

“Timer”

“Local output type”

“External output type”

AIMS.INI file

Page 202: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Alarms” menu

920007019-10

To change time between calculations of any alarm function from the defaultvalue of 10 (seconds) to another value, the parameter value of the line:

Time between Calculations= must be changed from 10 to any suitable value up to 32767 ( 9h, 6 min., 7 s).

To select calculation of any alarm function after the occurence of any alarm, theparameter value of the line:

Calculate after each alarm= must be changed from 0 to 1.

Please note that when you enable this function, instances with many alarmsmay slow down the operation of the AIMS program considerably.

Page 203: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 10-1

10101010

“Reports” menu“Reports” menu“Reports” menu“Reports” menuThis chapter provides a detailled description of the “Reports” menu.

The chapter contains the sections listed in the following table.

Section Page

Operator, Alarm, Event report 10-3

Edit report 10-4

Generate report 10-7

Event screen report 10-10

Operator screen report 10-11

Alarm screen report 10-12

Presence time report 10-13

Introduction

This chapter

Page 204: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

9200070110-2

Overview of the “Reports” menu

The commands of the “Reports” menu are the same independent on whetherthe system is disconnected or connected as shown in the figure below.

The “Reports” menu.

The various menu commands and their associated dialogs are described in thefollowing sections.

Disconnected orconnected

Page 205: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

92000701 10-3

10.1 Operator, Alarm, Event reportIn these dialogs one of the reports “Operator”, “Alarm”, or “Event” can beselected (to be modified or created). All the three types of reports are working inthe same way. Only the types of events are different in the different reporttypes.

Example of the Event Report” dialog.

The “Report” list box displays all existing reports. Each report may have addeda short description in the corresponding text box.

To create a new report it is sufficient to move to an existing report in the list andclick upon it. The name of the report is displayed in reverse video and now theBACKSPACE button on the PC keyboard is pressed.The “Report” dialog widens itself and the selected report and its description (ifany) disappears giving space for entering the informations for a new report.

The report that disappeared was NOT deleted, only the activation of the“Delete” command button can destroy a report.

For each report a short Description can be programmed.

Activation of the “Edit” command button automatically opens the “Edit Report”dialog (Section 10.2) where the contents of the report can be defined.

Activation of the “Generate” command button automatically opens the“Generate Report” dialog (Section 10.3) where the execution of the report canbe started.

The “Delete” command button makes it possible to erase the displayed report. AConfirmation dialog will be displayed by each action on this command button.

If you leave this dialog with the “Cancel” command button, all new data for thereport will be lost.

To close this dialog you must activate the “OK” command button. This operationwill store all modifications made.

Note

Page 206: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

9200070110-4

10.2 Edit reportIn this dialog it is possible to create (modify) one of the reports beforehanddefined in the “Operator”, “Alarm”, or “Event” dialogs.

Example of the “Edit Report” dialog.

The “Report Name” is displayed at the top of the dialog; The dialog can bedivided into two distinct parts:

The left side of this part of the screen comprises all the sources possible for areport (readers and Intruder central units) - but NOT included in the report.

The right side of this part of the screen comprises all the sources selected(readers and Intruder central units) - Included in the report.

The left side of this part of the screen comprises all the possible types of eventsfor a report (alarms, events, and operations on the PC) - but NOT included inthe report.

The right side of this part of the screen comprises all the selected types ofevents (alarms, events, and operations on the PC) - Included in the report.

When the “Add” command button is activated, the source (or the type of event)selected is transferred to the right in the dialog - Included in the report.

When the “Remove” command button is activated, the source (or the type ofevent) selected is transferred to the left in the dialog - Removed from the report.

When the “All ->” command button is activated, the sources (or the types ofevent) selected are transferred to the right in the dialog - Included in the report.

When the “<- All” command button is activated, the sources (or the types ofevent) selected are transferred to the left in the dialog - Removed from thereport.

If you leave this dialog with the “Cancel” command button, all new data for thereport will be lost and the “Report” dialog is displayed again.

Selectable sources

Types of selectableevents

Page 207: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

92000701 10-5

When the “Ok” command button is activated the “Report” dialog is displayedagain.

The “Show list” command button makes it possible to define an interval insidethe list of a type of events or alarms. For certain types of events (alarms) aparameter will automatically be displayed beside the command button, theactivation will automatically open a “Selection” dialog. This applies for:

Select Cards

Select Areas

Select Detectors

Select Zones

Select Users

Select Master Areas

See examples on the following pages.

Example: Select Cards

In this dialog it is possible for the operator to state if the total amount of cards(All cards) is wanted or just a specific part of the cards.

Example of the “Select Cards” dialog.

Two option buttons give the possibility to choose the option wanted:

All cards will be selected.

Click in the list (a multiple selection is possible).

The “Number of selected” text box displays the exact number of cards selected.

The “Unselect all” command button gives the possibility to deactivate theselections made (reset).

“All Cards”

“Select Cards”

Page 208: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

9200070110-6

The “Auto selection” field gives the possibility for the operator to require that theprogram automatically performs the listing after certain parameters.

The “Category” drop-down list box gives the possibility to choose the subject tobe listed (Department f.inst.). The “OR Items” check box gives the possibility tochoose in the “Items” drop-down list box several subjects belonging to thecategory.

If you leave this dialog with the “Cancel” command button, all new data for thereport will be lost and the “Report” dialog is displayed again.

When the “OK” command button is activated the “Report” dialog is displayedagain.

Example: Select Main areas, Areas, Zones, Users, Intrusioninputs

In this dialog it is possible for the operator to state if the total amount of asubject (f.inst. Users) is wanted or just a selection.

Example of “Select CU – Users” dialog.

In the “Central unit” drop-down list box the operator can state the central unit forwhich the subjects should be selected (this drop-down list box does not exist forMain areas).

Two option buttons give the possibility to choose the option wanted. If the option“Select Users” is chosen the operator must click on the areas wanted in the listbox.

Each user is displayed with his Number and Name.

All the dialogs for the different subjects are similar, except for the list ofelements displayed.

If you leave this dialog with the “Cancel” command button, all new data for thereport will be lost and the “Report” dialog is displayed again.

When the “OK” command button is activated the “Report” dialog is displayedagain.

Page 209: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

92000701 10-7

10.3 Generate reportIn this dialog one of the reports previously defined in the “Operator”, “Alarm”, or“Event” dialogs can be executed (generated).

Example of the”Generate Report” dialog.

The “Report Name” is displayed at the top of the dialog.

The operator must state precisely the Time limits for the report, “From” definesthe date and time for the start of the report, “To” defines the end.

As default, the report is made on the current log.

It is possible to select an “External source” as the origin of the log for which areport is wanted. This function gives the possibility to generate reports for oldlogs saved on disks or diskettes. The activation of the option button opens anew dialog “External log” giving the possibility to state the “Disk” and “Path” forthe log (see Section 10.3.1).

In the “Types” list box all the elements contained in the report are displayed.

The “Show list” command button makes it possible to define an interval insidethe list of a type of events or alarms. For certain types of events (alarms) aparameter will automatically be displayed beside the command button, theactivation will automatically open a Select dialog. See Section 10.2. One of thefollowing dialogs is shown:

“Select Cards”

“Select Areas”

“Select Detectors”

“Select Zones”

“Select Users”

“Select Main Areas”

If you leave this dialog with the “Cancel” command button, the request for thereport will be abandoned and the “Report” dialog is displayed again.

Page 210: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

9200070110-8

10.3.1 External log

In this dialog, one of the external logs (previously saved on a disk or diskette)can be selected, it is necessary only to select the the path from the “Path”listbox.

External logs are logs which have been moved from the working directory tomake space for new events.

Example of the “External Log” dialog.

The “Disk” and the “Directory” describes the “Path” from where you want to takethe log file needed for the report.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all selected parameters.

If you leave this dialog with the “Cancel” command button, all new data will belost. See also Section 5.13.1.

10.3.2 Destination of report

This dialog gives the possibility to define the destination to which the reportshould be generated: the Screen, the Printer or to a File on the PC hard disk.

Example of the “Generate Report” execution dialog and the “Report Output” dialog.

The report will be generated to the screen of the PC, a “Report” dialog willautomatically be opened to show the resulting report.See also Sections 10.4, 10.5, 10.6, and 10.7

The report is destined for the printer, two option buttons give the possibility tochoose the Fonts and the Printer Setup (configuration).

The report will be sent to a file on the PC to be used externally (i.e. spreadsheet,statistics, etc). A “Specify Report File” dialog (Section 10.3.2) will be opened,giving the possibility to specify the disk and the path wanted for the report.

“Screen”

“Printer”

“Text File”

Page 211: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

92000701 10-9

The report will be sent to a file on the PC to be used externally in a data baseprogram compatible with DBase IV. A “Specify Report File” dialog (Section10.3.2) will be opened, giving the possibility to specify the disk and the pathwanted for the report.

Please note that not all AIMS versions are able to generate DBase IV files.

To close this dialog, you must activate the “OK” command button. This operationwill start the execution of the report.If you leave this dialog with the “Cancel” command button, the request for thereport will be abandoned and the “Report” dialog is displayed again. See alsoSections 5.11, 5.12, and 9.1.

Specify report file

This dialog gives the possibility to enter the report File name. The name mustfollow the rules for DOS files: max. 8 characters, no spaces, etc.

Example of the “Specify Report File” dialog.

The list boxes “Drives” and “Directory”, you can select to where the reportshould be sent (among the existing choices). In the “List Files of Type” drop-down list box the report format wanted can be selected:

Means that the report will be logged in a specific HI-SEC format and can beused only in HI-SEC programs. (Only when Text file has been specified in the“Report Output” Dialog).

Means that the report will be logged in a standard ASCII text format, allowing itto be used by an external program (database, statistics, etc). (Only when Textfile has been specified in the “Report Output” Dialog).

Means that the report will be logged in a DBase data base format, allowing it tobe used by an external program (database). (Only when DBASE IV - File hasbeen specified in the “Report Output” Dialog).

Example of the “Report file” execution dialog.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all programmed parameters.If you leave this dialog with the “Cancel” command button, all new data will be lost.

“DBase IV File”

“*.REP”

“*.TXT”

“*.DBF”

Page 212: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

9200070110-10

10.4 Event screen reportThe report is displayed on the screen with the most recent event shown first - inthe bottom of the list. The scroll bar arrows or the position button in the list boxgive the possibility to move to other events in the report.

The title bar of the dialog indicates the type of the report.

Example of “Event Report Output” dialog.

For further details concerning the contents of the dialog, consult the dialog“Events Log” in Section 5.11.

To close this dialog, you must activate the “OK” command button.

Page 213: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

92000701 10-11

10.5 Operator screen reportThe report is displayed on the screen with the most recent event shown first - inthe bottom of the list. The scroll bar arrows or the position button in the list boxgive the possibility to move to other events in the report.

The title bar of the dialog indicates the type of the report.

Example of the “Operator Event Report Output” dialog.

For further details concerning the contents of the dialog, consult the dialog“Operators Log” (Section 5.12).

To close this dialog, you must activate the “OK” command button.

Page 214: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

9200070110-12

10.6 Alarm screen reportThe report is displayed on the screen with the most recent event shown first - inthe bottom of the list). The scroll bar arrows or the position button in the list boxgive the possibility to move to other events in the report.

The title bar of the dialog indicates the type of the report.

Example of “Alarm Report Output” dialog.

The “Alarm handling report” text box gives the possibility to consult the reportfrom the operator that was in session at the moment the alarm appeared(operation performed, cause of alarm, decisions etc.).

For further details concerning the contents of the dialog, consult the dialog“Alarms Log” (Section 9.1).

To close this dialog, you must activate the “OK” command button.

Page 215: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

92000701 10-13

10.7 Presence time reportIn this dialog, a report of the time a person has been present on the installationcan be generated. The calculation is done for each weekday and the programcalculates the time from the first transaction performed until the last transactionof the day

Possible intermediary exits are not taken into consideration.

Example of the “Presency Report”.

You must select if the report is for all cards or a selection of cards by means ofthe option buttons “All Cards” or “Selected Cards”. In the last case you mustclick on the cards displayed in the corresponding list box where each card isshown with its “No.” and “Name”.

The two option buttons give the possibility to choose the option wanted:

All the cards will be selected.

Click in the list (a multiple selection is possible)

The “Number of selected” text box shows the exact number of selected cards.

The “Unselect all” command button gives the possibility to deactivate all theselections made (reset).

The “Auto selection” field gives the possibility for the operator to require that theprogram automatically performs the listing after certain parameters.

The “Category” drop-down list box gives the possibility to choose the subject tobe listed (For instance “Department”). The “OR Items” check box gives thepossibility to choose in the “Items” drop-down list box a subject belonging to thecategory (for instance Information for the category Department). The cardsbelonging to the Item will be added to the already selected cards.

Note

“All Cards”

“Selected Cards”

Page 216: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Reports” menu

9200070110-14

You must specify the “Report period”. In the field “From”, the start date isspecified and in “To”, the end date. By default, the report period is the currentmonth.

It is possible to define the “Day time”, meaning the start and end time of thenormal working day for the selected card holders. By default, the day isstandard - from 00:00 to 23:59. If workers have different timetables, it ispossible to enter another “Start” and “End” time. In this way the calculations willbe exact even if people have timetables, which overlap two days (i.e. 20:00 -04:00).

To close this dialog, you must activate the “OK” command button. Thisoperation will store all programmed parameters and start the execution of thereport (in the “Destination of report” dialog).

If you are leaving this dialog with the “Cancel” command button, all specifieddata will be lost.

10.7.1 Presence time screen report.

The report for presence time displayed on the screen is calculated for each cardbased on the events log.

Example of the “Show Presency Report” dialog.

The “Presence Time Report” calculates the difference between the time for thefirst entry and the last exit of the day.

Each card is displayed with its “Number”, and the user's “Name”, and for eachday, the “Date” and the “Time Present.

The presence time calculated do not take into consideration any possibleintermediary absences inside the period.

To close this dialog, you must activate the “OK” command button.

Note

Page 217: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 11-1

11111111

“Guard Tour” menu“Guard Tour” menu“Guard Tour” menu“Guard Tour” menuThis chapter provides a detailled description of the “Guard Tours” menu.

The chapter contains the sections listed in the following table.

Section Page

Show and edit guard tours 11-3

Guard tour management 11-5

Introduction

This chapter

Page 218: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Guard Tour” menu

9200070111-2

Overview of the “Guard Tour” menu

The commands of the “Guard Tour” menu depends on whether the system isdisconnected or connected as shown in the figure below.

The “Guard Tour” menu with the system disconnected and connected.

The various menu commands and their associated dialogs are described in thefollowing sections.

Disconnected orconnected

Disconnected Connected

Page 219: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Guard Tour” menu

92000701 11-3

11.1 Show and edit guard toursThe guard tour is defined by a “Tour no.” corresponding to the guard tour planyou want the guard to make.

This dialog is only useful to program the guard tours. For management of guardtour, you must use the “Guard tour management” menu command.See Section 11.2.

The guard tour can be selected by typing the number directly in the “Tour No.”text box, or by using the arrow buttons.

Example of the “Guard Tour” dialog.

Each guard tour can be described by a “Name” and a short “Description” in thecorresponding text boxes.

The guard tour is divided into Sequences, corresponding to the time to go fromone specific reader to another. The sequence can be selected by typing thenumber in the “Sequence” text box or by using the arrow buttons.

A reader is selected from the “Reader” drop-down list box and in the “Tour time(min)” text box the time to go to the selected reader can be programmed. Whenchanging the sequence no. by the arrow buttons the sequence data (justentered/edited for the selected reader) will be stored.

It is possible to use the following command buttons:

It erases the sequence displayed in the dialog.

It moves the selected sequence to the next tour sequence.

It moves the selected sequence to the previous tour sequence.

The list box in the right side of the dialog displays the complete guard tour with allthe times to get to each reader.

The “Status” text box displays the current status of the guard tour .

The guard tour is not in use.

“Delete sequence”

“Sequence down”

“Sequence up”

“Free”

Page 220: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Guard Tour” menu

9200070111-4

The guard tour is in use, a guard is on patrol.

The guard tour is in use and has caused an alarm.

The “Delete” command button erases the displayed guard tour. A Confirmationdialog will be displayed by each action on this command button.

To close this dialog, you must activate the “OK” command button. This operationwill store all modifications made.

If you leave this dialog with the “Cancel” command button, all new data will belost.

“Running”

“Alarm”

Page 221: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Guard Tour” menu

92000701 11-5

11.2 Guard tour managementThis dialog allows you to manage the guard tours. Managing means to start theguard tour and to stop the guard tour when the guard comes back. The programcalculates the time used by the guard between each reader on the tour, andgenerates an alarm if the time is too long.

Example of the “Guard Tour Management” dialog.

At the top of the dialog all guard tours are displayed with the followingparameters:

The guard tour name is displayed.

The initials for the guard patrolling (if running) are displayed (the initials aredefined using the “Edit cards” menu command. See sSection 6.2).

Guard tour start time (if running).

Last reader where the guard has passed (if running).

Guard tour status

The “Status” can be:

The guard tour is not in use.

The guard tour is in use, a guard is patrolling.

The guard tour is in use and has caused an alarm.

The bottom of the dialog is for the guard tour controller. You must select aguard tour from the list box. The selected tour is displayed in the “Tour name”text box.

A “Card number” for the guard or the “Guard Name” can be chosen in thecorresponding list box.

This command button starts the guard tour.

This command button stops the guard tour.

“Tour name”

“Guard initials”

“Start time”

“Last Reader, Time”

“Status, Time”

Status types

“Free”

“Running”

“Alarm”

Page 222: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Guard Tour” menu

9200070111-6

If an alarm has occurred from a tour, the tour must be stopped before the tour canbe restarted again. The alarm will be displayed in the “Alarm status” window andmust be treated as all other types of alarms.

Clicking twice on any guard tour automatically opens the “Show Guard tour”dialog, if you want to consult the guard tour programming.

To close this dialog, you must activate this “OK” command button. This operationdoes not stop the monitoring of the guard tour.

Page 223: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 12-1

12121212

“Remote Sites”“Remote Sites”“Remote Sites”“Remote Sites”commandcommandcommandcommand

This chapter provides a detailled description of the dialogs available through the“Remote Sites ” command and its submenus.

The chapter contains the sections listed in the following table.

Section Page

“Select” command 12-3

“Upload Events” command 12-4

“Upload Alarms” command 12-5

“Remote Broadcast” command 12-6

“Local Modem Set-up” command 12-8

“Site Setup” command 12-11

“Routine Call Week Programs” command 12-14

“Routine Call Set-up” command 12-17

“Routine Call Status” command 12-19

“Program Modems” command 12-20

Introduction

This chapter

Page 224: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-2

Overview of “Remote Sites” commandThe commands of the “Remote Sites” menu depends on whether the system isdisconnected or connected or connected and remote on-line as shown in thefigure below.

Example of menus and submenus of the “Remote Sites” menu command with the systemdisconnected and connected and connected and on-line.

The various menu commands and their associated dialogs are described in thefollowing sections.

Disconnected

Connected and remote off-line

Connected and remote on-line

Page 225: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-3

12.1 “Select” commandThe “Select” command displays the “Remote Site” dialog from which you canselect the remote site to which you want to connect. It has a list box showingthe number and name of the remote sites and a status box below. This lineindicates the progress of the connection process.Two command buttons enables connection and disconnection to the remotesites.

Example of the “Remote Site” dialog before connection to a remote site.

From this dialog the remote sites can be selected and called via the PSTN orX.25 network.

When you click the Call command button you start the connection to the remotesite selected in the list box displaying the remote sites by their number andname. The status box below indicates the status of the connection process.

If the remote site does not answer the call immediately, let the PC call the siteagain after the timeout time programmed for the local modem.

When the PC is on-line, the dialog is automatically closed. The previouslyunavailable commands are now available. The commands will work directly onthe remote site and not on the local site.

Example of the “Remote Site” dialog during connection to a remote site.

If the “Select” menu command is clicked when you are on-line with a site, thissite is highlighted in the dialog and the Hangup command button becomesavailable. By activating the Hangup button, the site is disconnected and thedialog is automatically closed.

Page 226: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-4

12.2 “Upload Events” commandThis function is not yet implemented.

Page 227: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-5

12.3 “Upload Alarms” commandThis function is not yet implemented.

Page 228: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-6

12.4 “Remote Broadcast” commandThe “Remote Broadcast” command displays the “Broadcast Commands” dialogfrom which you can start a sequence where each included remote site is calledand the selected command is executed.

Example of the “Broadcast Commands” dialog.

You can select between the following commands:

Correct clock

Change autoarm program

Download remote modem setup

The “Destination” list box displays a list of remote sites when the “Remote Sites”option button is clicked. Currently only the “Remote Sites” option is available.From the list, click the the remote sites to be included in the broadcast. If youwant to include all remotes sites, click the Select All button. To cancel allselections you have made, click the Deselect All button.

After you have selected a command and one or more sites and set an executingtime (Date button), you must click the Send button to transfer the command tothe command queue.

This box shows the current number of commands not yet broadcasted. If youwant to see a detailled view of these commands, click the Show button. See thedescription on the following page.

The execution time for the command is selected in the “Select Time and Date”dialog, displayed when you click the Date button. When done, click the “OK”button. This sets the time and displays it in the “Executing time for command”box.

“Command”

“Destination”

Send button

“No. of commands inqueue”

“Executing time forcommand”

Select All button

Deselect All button

Currently not enabled

Date button

Send button

Show button

Page 229: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-7

Example of the “Select a Date and Time” dialog.

When you click the Show button, the “Remote Commands Queue” dialog isdisplayed.

You can select a command in the queue by clicking it. When selected, you can seta new time and date for execution or you can discard the command. See below.

Example of the “Remote Commands Queue” dialog.

For every command, the list box shows the following:

“Site no.” Number of the site to which the command should be sent.

“Entry time” Date and time at which the command is entered.

“Exe. time” Date and time at which the command should be executed.

“Command” Name of the command

“Status” Current status of the command (Pending, In progress,Completed, or failed).

You can delete a selected command by clicking the Delete button.

You can change the execution time for a selected command by clicking theDate button. This displays the “Select Time and Date” dialog where you can seta new time and date. See the previous page.

The “Command states” list box shows the progress of the transmission of acommand on up to five modems. If no commands are being sent, the text <Idle>is shown.

Show button

Delete button

Date button

“Command states”

Date button

Dielete button

Page 230: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-8

12.5 “Local Modem Set-up” commandThe “Local Modem Setup” dialog is used for the configuration of the localmodems situated at the control centre.

Example of the “Local Modem Setup” dialog.

Modems currently configured are shown in the upper list box with name andnumber.

In the “Name” text box you can enter a name for the modem

In the “Modem” list box you can select between a number of types. You cannotcreate a new type of modem.If the exact modem type does not exist in the list of modems, all modemcommands can be changed in the “Modem commands” dialog by activating the“Modem commands” button.

When the “Reset Modem” button is clicked, the modem is reset to the defaultconfiguration.entered in the “Initialization” text box ofs the “Modem Commands”dialog See the paragraph “Default” button of Section 12.5.1

The “Modem Commands” button gives acces to the “Modem Commands” dialogthat are used for setting the various commands used by the modem. SeeSection 12.5.1

The “Function” field contains the following four option buttons:

The modem can only be used as an alarm receiver.

The modem can only be used as an alarm receiver and as a routine callmodem.

The modem can be used as an alarm receiver and as a dial-up modem.

The modem can be used as an alarm receiver and as a routine call and dial-upmodem.

“Name”

“Modem”

“Reset Modem”button

“Modem Commands”button

“Function” field

“Alarm receiver only”

“Routine Call”

“Remote dial-up”

“Routine call andremote dial-up”

Page 231: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-9

In the “Own Call number” box you must enter the alarm receiver number for thePC alarm receiver.

Please note that it is not the own modem call number but the alarm receivernumber which must be typed here.This number is compared with the alarm number programmed for the site whencalling a site and if an alarm occurs during the call, the connection will not beinterrupted but the alarm will be sent directly as the site knows that it is alreadyin connection with the alarm receiver.

12.5.1 Modem commands

The “Modem Commands” dialog is used for setting other commands than thedefault commands in local modem interfaces connected to the local system.

Please note that all changes in modem data must be downloaded to the remoteor local modem. This is not done automatically.

Example of the “Modem Commands” dialog.

In the “Modem”: and “Type” boxes, the modem type selected in the “LocalModem Setup” dialog is shown. If you must change this, you must activate theOK” command button to return to the “Local Modem Setup” dialog.

The following parameters can be changed in the modem commands for aHayes compatible modem or for a X28 PAD:

The string of Hayes commands typed in this box will be sent to the modemwhen power is connected to the modem interface.The string is also sent when the “Reset Modem” command button is used in the“Local Modem Setup” dialog. After this a hang-up modem command is sendout. The modem must then answer back OK. If X28 is selected a DLE (10H) issend out when using the Reset Modem command button.

The string of characters written here will be sent out to the Modem or X28 PADbefore the call number to the site.

Special commands: ^M : CR (Carriage return)^J: LF (Line feed)

Please note that a CR is always performed after the dial number.

“Own call number”field

Note

“Commands” field

“Initialization”

“Dial”

Page 232: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-10

After dialling to a site, the response back is verified with the string printed here.

Modem: Pause 1 sec. +++ Pause 1 sec. followed by the string specified in the“Hangup” text box (normally ATH0).X28: DLE followed by the string specified in the “Hangup” text box (normally CLR).

After disconnection from a site, the response back is verified with the stringtyped in the box.

The baud rate for the communication between the modem interface and themodem / PAD is selected here.

The baud rate can be selected between 1200 to 9600. Please note that thebaud rate on the telephone lines can be different and must be specified in thestring typed in the “Initialization” text box.Please note that if the baud rate is changed a power reset must be made on themodem interface before the change will take place.

The communication format is selected in this box. The following are available:

Modem: 8 bit, No parity, 1 stop.

X28: 8 bit, Even parity, 1 stop

In the “Options” field you can specify number of retries, interval between retries,and blocking of the modem.

In this text box you can be specify how many times the modem should try to calla site/PC before a fault message should be generated.

The time specified in this text box is the time between each retry. Therecommended timeout for a Hayes modem is 30 s and for X28, 5s.

If you check this box, the modem will be blocked after being called the specifiednumber of retries.

If you click the “Default” command button, the default data of the modem will beinserted in all fields of the dialog.The default data is taken from the file named MODEM.INI in the AIMS directory.This file can be edited by using NOTEPAD.EXE, so that the standardconfiguration for your modem will be displayed when you press the “Default”command button.

“Dial response”

“Hangup”

“Hangup response”

“Communication”

“Baud rate”

“Communicationformat”

“Options” field

“Retries”

“Retry repeat Time”

“Blockade option”

“Default” button

Page 233: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-11

12.6 “Site Setup” commandThe “Site Setup” command displays the “Remote Site Setup” dialog. The dialogallows you to create and programme the modem data for the remote sites.Programming of other parameters like Access or Intrusion programming mustbe performed in the corresponding menus.

Example of the “Remote Site Setup” dialog

Remote sites will have a site no. which starts from 1000 and up. Local sites arenumbered from 1 to 31. Each site can be given a name and a short descriptionin the corresponding text boxes. For each site a number of parameters must bedefined. These are described in the following.

The level can be one of the following two:

If the PC you are working on must be able to programme all access controlparameters for the remote site, your PC must be declared as a DatabaseServer.Please note that for a specific site, only one PC can be the Database Server.

A PC defined as a Control Center is able to set and unset areas, zones anddetectors, to control access doors etc. but cannot program the system.Several PC's can be defined as Control Center for the same site.

Two modems can be installed on each site. Both must be programmed.

Each modem must be programmed with a call number (Primary andSecondary). This call number is the number the PC will use when a call to thesite is made in the “Remote Site” dialog. See Section 12.1

By activating the “Modem Setup” command button a new dialog for specifyingall modem data (Hayes commands, telephone nos. etc.) is displayed. Thissetup corresponds to the setup of a local modem. See Section 12.5.1 for moreinformation.

“Site No”“Name”

“Description”

“Level” field

“Database Server”

“Control Center”

“Modem” field

“Primary No.”“Secondary No.”

“Modem Setup”button

Page 234: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-12

At each manuel connection it can be specified if new events and new alarmsshould be uploaded to the PC. This is done If you check the boxes:

“Alarm upload at each manual connection”“Eventupload at each manual connection”,

However, if the remote modem is set to transmit alarms and events, it is notnecessary to make an alarm upload at each connection because the alarmshave already arrived. See Section 12.6.1 below.

If your remote site is creating many events and you do not connect very oftenthe time to connect can be long when you have specified event upload at eachmanual connection.

This parameter specifies the timeout if the PC is not used during a remoteconnection with the site. The PC will automatically terminate the connectionafter the timeout time. If 0 minutes is specified there will be no automatictimeout.

The site will be created by activating either the “Create” or the “OK” commandbutton. It is not necessary to download any data programmed in this dialog tothe remote site.

12.6.1 Configuration of remote modems

The “Remote Modem Setup” dialog is used for the configuration of the modemssituated at the remote site.

Please note that all changes in modem data made in this dialog must bedownloaded to the remote modem interface afterwards.See Section 12.10.

Example of the “Remote Modem Setup” dialog.

In the “Modem” list box you can select between a number of types. You cannotcreate a new type of modem.If the exact modem type does not exist in the list of modems, all modemcommands can be changed in the “Modem commands” dialog by activating the“Modem commands” button.

Event and alarmupload

“Idle Timeout”

“Modem”

Page 235: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-13

The “Modem Commands” button gives acces to the “Modem Commands” dialogthat are used for setting the various commands used by the modem.The “Modem Commands” dialog is described in the previous Section 12.5.1

When the “Reset Modem” button is clicked, the modem interface sends theinitialization string - entered in the “Modem Commands” dialog – to the modem.

This field contains a list box for selection of the available telephone numbers,and four option buttons by which you can select the use of the telephonenumber. To do so select the number and click the option button thatcorresponds to its use.

In the “No.” list box you must enter the number you want to call for the selectedfunction.

“Unused” - Click this button if the selected number should not be used with thismodem.

“Primary No.” - Click this button if the selected number should be the primarynumber. The site will call this number in case of alarm. If more than one numberis programmed as primary number, the site will call both primary numbers incase of alarm.

“Secondary No.” - Click this button if the selected number should be thesecondary number.The site will call this number in case of alarm and in casethat the primary number does not respond after x retries. The value x isspecified in the “Modem Commands” dialog.

“Call Back No.” - The site will call this number if it receives a call from an AIMS(with the same sitecode). The option “Accept only Call Back” must be set at thesame time.

This field contains five check boxes you can check to determine in which casean automatic dial-up should be performed by a remote modem. If no options isselected the site will not make any call in case of alarm. You have the followingpossibilities:

“Automatic dial-up in case of Intrusion alarms”“Automatic dial-up in case of Intrusion alarm reset”“Automatic dial-up in case of Intrusion events”“Automatic dial-up in case of Access alarms”“Accept only Call Back”

In the AIMS, version 6.06, the following possibilities has been added:“Transmit access set/unset events” and “Transmit all othe events”

If you have selected a call back number, the “Accept only Call Back” optionmust be checked.

To close this dialog, you must activate the “OK” command button. This will storeall new modifications.

If you leave this dialog by activating the “Cancel” command button, all new datafor the configuration will be lost.

“Modem Commands”

“Reset Modem”

“Dial up Telephonenumbers”

“Options”

“OK”

“Cancel”

Page 236: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-14

12.7 “Routine Call Week Programs”commandThe “Routine Call Week Programs” command displays the “Week TimePrograms for Remote Routine Call” dialog for setting up various routine callweek programs.A step-by-step programming description is given in Section 12.7.1.

512 week programs can be created to control the routine call sequences todifferent remote sites. The setup of which site is using which week program forroutine call check is done in the “Routine Call Setup” dialog. See Section 12.8.

The routine calls can be divided into two categories:

Routine calls for control of the set/unset status of systems or areas.

Routine calls that automatically connects to a remote site to check thatthese are in a state ready for communication to ensure that they cantransmit any occurring alarm.

The routine calls are important when the AIMS-M program operates as thereceiving central for the processing of alarms, etc. If the program is used forprogramming only, you need not set up any call routines.

Please note that the routine calls cannot be used for operation of a remotre site.They are used only for the verification of the correct functioning of the remotesites.

Example of the “Week Time Programs for: Remote Routine Call” dialog.

The “Site” list box is disabled in connection with the routine calls because theselection of site takes place in the “Routine Call Setup” dialog. See Section 12.8.

Each week program is described by its No. and a name. The latter is typed inthe “Name” text box. This name will be shown in all dialogs associated with theweek programs.You can select a week program either by entering its number in the “No.” textbox or select it by means of the scroll buttons.

“Site” list box

“No” and “Name”

Page 237: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-15

Each week program is defined for each week “Day” (Monday-Sunday and 2 specialdays). Each day can be divided into max. 8 time “Period”s (numbered 1 to 8).

The “From” and “To” times of each period for the specified day are displayed inthe corresponding text boxes. The selected function for the period is displayedby a option box and can be changed by clicking in the wanted box.

An overview of each week program is displayed in the left side of the dialog withcolours corresponding to the functions.

The following is a list of available functions for routine call week programs thatcan be performed in the selected period:

“No routine calls” - No routine calls is performed in the selected period.

“At beginning without set/unset control” - At the start of the selected period acall starts a cyclic test that is performed without checking for set or unset statusof the system.

“At beginning with system set control” - At the start of the selected period, a callchecks the status of the system (the complete intrusion alarm system) at theremote site.

“At beginning with area set control” - At the start of the selected period, a callchecks the set status of an area at the remote site. The area to check isspecified in the “Routine Call Setup” dialog.

“At beginning with area unset control” - At the start of the selected period, a callchecks the unset status of an area at the remote site. The area to unset isspecified in the “Routine Call Setup” dialog.

“Repeat last function” - The last routine call function is repeated if possible.

“Repeat last function each 10 min.” - The last routine call function is repeatedevery 10 minutes in the selected period.

“Repeat last function each hour” - The last routine call function is repeatedevery hour in the selected period.

“Repeat last function at beginning” - The last routine call function is repeated atthe start of the selected period.

Please note that it is not possible to start a day with any of the Repeatfunctions. It is always required to state the function wanted at the start of a day.

All routine call functions will generate an alarm on the central site if the routineis not performed on the remote site and in case of connection fault alarms orset/unset status fault alarms.

The procedure to follow in case of a connection fault will be to check thetelephone line, the modem, the power supply etc. and correct the fault.

The procedure in case of a set/unset status will be to check – by a person at thesite – why the setting or unsetting has not been made. If no one is present, itwill be necessary to connect to the site and correct the fault locally.

“Day”

“From” and “To”

Functions field

Alarms

Page 238: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-16

By activation of the “Delete” command button you can delete the week programdisplayed. A Confirmation dialog will be shown at each activation of this button.

If you leave this dialog by activating the “Cancel” command button, all new datafor this week program will be lost.

To close this dialog, you must activate the “OK” command button. Thisoperation will store all new modifications.

12.7.1 Programming method

The programming of these different periods in the week programs can be madewith the mouse, using the following method:

1. Click with the mouse on the first week day.

2. Select the required Function for the first period from the “Function” optionbox. The period colour changes according to the selection.

3. Pull up the end of the period (24:00) with the mouse, not releasing the leftmouse button, to the end of the first period

4. Increment the Period in the list box or click with the mouse on the next period.

5. Select the Function from the option boxes for the next period.

6. Pull up the end of the period (24:00) with the mouse, not releasing the leftmouse button, to the end of the second period.

7. Increment the period in the list box or click with the mouse on the next period.

8. Select the Function from the option boxes for the next period.

9. Continue as described until completing the day (the last period must end at24:00).

To change the time between two periods, you must use this method:

1. Click with the mouse on the period to be modified.

2. Press 2nd mouse button, and not releasing it, move the mouse to the new time.

3. Release the 2nd mouse button.

It is possible to copy the programming of one day to another day, using the“Copy” and “Paste” command buttons.

1. Click with the mouse on the day to copy (source).

2. Activate the “Copy” command button.

3. Click with the mouse on the day to where the copy must be done.

4. Activate the “Paste” command button, the programmed day will be copied tothe new day.

“Delete”

“Cancel”

“OK”

Page 239: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-17

12.8 “Routine Call Set-up” commandThe “Routine Call Set-up” command displays the “Routine Call Setup” dialog inwhich you can configurate the routine call procedures.

By means of these you can call each site automatically following a specificweek program and during these calls the Set/Unset status of the remote sitecan be checked.

The week program must be made in the “Week Time Programs for: RemoteRoutine Call” dialog before you can use the “Routine call setup” dialog.

Example of the “Routine Call Setup” dialog.

In the list box at the top of the dialog all remote sites are listed. To include a sitein the routine call procedures, select the site in the list box.

After selection, you must select the modem to use as routine call modem forthis site. Only the local modems which have been programmed to allow routinecalls are displayed in the “Select Modem” list box.

The “Type” option boxes allow you to select the type of routine call to use.

“No routine call” or one of following routine call types: “Only Connection routinecall” or “Only CU Set-Unset routine calls”

This call will test the connection to the remote site. The week program whichcontrols the routine call, can be selected in the “Week Program for ConnectionRoutine Call” drop-down list box.Please note that the “CU” list boxes are grey and cannot be selected.

This call will test the connection and verify the set/unset status of the intrusionsystem on the remote site.The “Week Program for Connection Routine Call” drop down list box is grey,thus the week program must be selected from the “Week Prg.” drop-down listbox at the bottom of the dialog.

“Type” field

“No routine call”

“Only Connectionroutine call”

“Only CU Set-Unsetroutine calls”

Page 240: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-18

This field contains drop down list boxes for selection of Central Unit (CU), areaand week program.

Before selecting the week program you must select the CU (Intrusion centralunit) (if the remote site contains more than one central unit) and select “Yes” inthe “Call CU” option boxes.

Then the “Area no.” and “Week Prg.” can be selected. If you select “No” in the“Call CU” option box, the status of the Central unit will not be verified.

The enabling of the routine calls must be done from the “Routine Call Status”dialog. See Section 12.9.

Example of the “Routine Call Setup” dialog.

“CU Set UnsetRoutine Call” field

“CU”

“Area No.”“Week. Prg.”

Page 241: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-19

12.9 “Routine Call Status” commandThe “Routine Call Status” command displays the “Routine Check” dialog forviewing the status of the routine check and for enabling or disabling the routinecheck procedure.This dialog can only be used when the system is on-line.

Example of the “Routine Check” dialog.

“Period” field containing two boxes showing the current period updated realtime. The routine check week program works in periods of ten minutes

The “Info” text box displays different messages concerning the status of theroutine check. The following messages can be shown:

“Routine check enabled”“Routine check disabled”“Routine check local offline, Waiting”“Reserving modem”“Routine check stoppped”“Routine check ended. Waiting”“Routine check repeating”“Generating check list”“Dialing no.”“Performing test of site”

In the list box below is shown all sites and their last routine check statusmessage. The following status messages can be given for a site:

“Modem fault” - The local modem used for routine calls is faulty.“Remote offline” - The remote site cannot be called.“OK” - The remote site is OK.“—“ - No status for the remote site.

The check box allows you to disable or enable the routine check procedure.

Please note that if the routine check is disabled it will not automatically berestarted again before it is enabled manually.

“Period” field

“Info”

“Site” and “Check”

“Enable Routine Check”

Page 242: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-20

12.10 “Program Modems” commandThe “Program Modems” command displays a submenu with the followingcommands:

“Download Local”

“Download Remote”

“Upload Local”

“Upload Remote”

These commands are used for downloading setup data defined in the”LocalModem Setup” or “Remote Modem Setup” dialogs (and associated “ModemCommands” dialog) to the modems and for uploading setup data from modemsto the”Local Modem Setup” or “Remote Modem Setup” dialogs (and associated“Modem Commands” dialog). See also Sections 12.5 and 12.6.

Please note that you must be on-line with the remote site if you shoulddownload data to or upload data from a remote modem. See Section 12.1.

Activation of either the “Download Remote” or “Upload Remote” will display aconfirmation dialog. When you click the “OK” button of the dialog, an executiondialog is displayed. During the transfer of the setup data, the process can befollowed in the execution dialog. See the figure on the next page.

Activation of the Upload Local” or “Download Local” displays the “SelectModem(s)” dialog in which you can select one or more modems to which youwant to upload setup data or from which you want to download setup data,depending on the command you have selected in the submenu of the “ProgramModems” menu command.

Example of the “Select Modem(s)” dialog.

The list box of the dialog displays a list of the local modems identified by theiraddress and a name. From the list, you can select the modems to be includedin the upload or download. If you want to include all listed modems, click theSelect All button. To cancel all selections you have made, click the Deselect Allbutton.

When you have performed the selection, click the “OK” command button. Thiswill display an Upload or Download confirmation dialog, depending on thecommand you have selected in the submenu of the “Program Modems” menucommand.

Page 243: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

92000701 12-21

When you click the “OK” button of the confirmation dialog, an execution dialogis shown. During the transfer of the setup data, the process can be followed inthe execution dialog. See the examples below.

Example of a confirmation and an execution dialog for upload from a local modem.

Page 244: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Remote Sites” command

9200070112-22

This page is intentionally left blank.

Page 245: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 13-1

13131313

“Graphic Presentation”“Graphic Presentation”“Graphic Presentation”“Graphic Presentation”commandcommandcommandcommand

This chapter provides a detailled description of the GPM program availablethrough the “Graphic Presentation” command and its associated dialogs.

The chapter contains the sections listed in the following table.

Section Page

Introduction 13-2

Concepts and presentation 13-3

Instructions for use 13-10

Introduction

This chapter

Page 246: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-2

13.1 Introduction

13.1.1 General information

The Graphic Presentation program – GPM - is an option that can be easilyintegrated in the AIMS program.

The GPM program is a management program for the end-user, it does not allowfor the creation of the graphics but alone for their use. The graphics havebeforehand been created by the installer program 90T GDT. A description of thisprogram is not contained in this chapter.

The GPM provides a straightforward user interface mainly for the operations ofsetting and unsetting the intrusion system and for the alarm handling.

When the graphic module GPM is installed and operational, the AIMS programverifies this by making the menu command “Graphic Presentation” accessible inthe “Status” menu. If the system do not have the GPM program installed, the“Graphic Presentation” command is greyed

The program operates under Windows® environment and allows for the completehandling of the THOR systems; by means of graphic symbols, the operatorcontrols the system by clicking with the mouse on icons and on drawings.

The GPM program gives the possibility to set and unset the system by means ofa simple click with the mouse on the drawing of the building, alarms and settingfaults will be indicated by multicoloured (flashing light) icons on the drawings.

All the symbols (icons) for readers, circuits, and doors used in this document arethose delivered at first with the GDT program, but possibly the symbols couldhave been supplemented and enriched by the installer during the creation of thegraphic project; so it is possible the symbols in the final project differ from thoseused in this chapter although the mode of operation will be the same.

Page 247: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

92000701 13-3

13.2 Concepts and presentationExample of drawings for overview and detailled view used by the GPM program.

Page 248: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-4

13.2.1 Graphic presentation

It is possible to get a graphic representation of a building as a whole or of smallerparts of the building such as an area/zone/circuit. This is, in principle, done bygiving the different drawings in the presentation such a structure in relation toeach other, that performing a zoom-in function on a certain drawing will display anew drawing with more details (or that performing a zoom-out function on acertain drawing will display a new drawing with fewer details but with a broaderview).

The drawings with more details are, in principle, those that comprise the circuits(addresses, detectors), and those that indicate the current state of circuits, cardreaders or other bus devices on the bus.

After a zoom-out from the circuit drawings the program will display the zone/areadrawings. These may comprise circuits, card readers or keypads, but normallyonly zones or areas will be displayed.

The zone fields can be used for setting and unsetting or for zooming-in to circuitdrawings. The status for the Intruder zone will be indicated by differentbackground colours.

The area fields can (in the same way) be used for setting and unsetting or forzooming-in to a more detailed drawing of zones, areas or circuits. The status forthe areas is indicated by different background colours. It is recommended toindicate the status for physical areas only in the area fields.

The zones and areas will, naturally, have zoom functions, but it is just as wellpossible to create zoom fields that are completely independent of zones andareas. Therefore, it is possible to have detector drawings including several zonesor to have several circuits drawings for a specific zone.

All areas (zones) can be represented by means of hatched fields of differentcolours, these colours representing the set/unset status for the areas (zones). Inthat case, the areas (zones) might be represented by small rectangles, apparentlyidentical, but it is also possible for the hatched fields to be polygonal with exactlythe same shape (outline) as the areas (zones).

A 'tool box' is at disposal for the user. In relation to the selected tool, the zoomfields, zones, detector status, or significant informations are accessible on thedrawings.

The figure on the next page page represents a facility (site) that can be dividedinto the drawings of circuits and zones/areas (a more detailed example isdescribed on the next page).

Page 249: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

92000701 13-5

This page gives, in the form of an example, a graphic representation of anIntruder system installed in an office building. The facility drawing representsthe building seen from the outside. The operator can obtain detailedinformations on a new drawing when he performs a zoom-in operation. An evenmore detailed drawing makes it possible to see each detector in the Intrudersystem.

Example of a graphic presentation of an intruder system.

Example

Page 250: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-6

13.2.2 Description of the screen

The GPM program module is completely integrated in the AIMS program. Thedrawing as well as the tool box will be displayed in the space between the menubar for the AIMS program and the title bar at the top of the “Alarm” dialog, asshown below.

Example of the GPM program window

The size of the window may be modified without loosing any part of the graphicdisplayed, its dimensions will simply be reduced.

Tool box

All drawings contain a standard tool box placed at the top left side of thewindow (this tool box is floating and can be moved around in the window).

The tool box can have two different configurations depending on whether anoperator is logged in or not.:

All tools are at disposal (depending on operator rights programmed for the user).On the following pages the function of all tools will be described.

In this case the tool box of the graphic program is deprived of theinteractive commands like setting, unsetting, isolating and doorcommands - only the zoom and information functions are at disposal.

Note: All the mouse pointers will temporarily take on the default shapeduring the time the cursor is outside the space intended for graphics.

Logged in

No log in

Page 251: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

92000701 13-7

The tools at disposal.

Standard cursor

This tool is the standard mouse pointer (arrow). The pointer only permits theselection of the other tools in the box, its main purpose is to make it possible todeselect a previously used tool (as f.inst. the SET padlock).

Door control

This tool gives the possibility to operate (door control) in the Access Controlsystem. The mouse pointer turns into a pointer representing a door when thistool is selected.A click on any reader or door opens the standard dialog for door control in theAIMS program, with the usual four command buttons.

See Section 14.3.5 for operating instructions.

Unset zone,area,circuit

This tool is used to unset the different elements in the installation.The mousepointer turns into a pointer representing an open padlock when this tool isselected.The background colour for the different elements (zones, areas, circuits)indicates the current set/unset status and alarm status:

Background hatched, detector symbol red, constant: zone, area, or circuitset.

Background hatched, detector symbol yellow, constant: zone, area partialset or circuit (detector) isolated.

Background hatched, detector symbol green: zone, area, or circuit unset.

Background plain red, flashing: alarm(s). The indication of alarms (by aflashing red) will always be shown alternating with one of the set/unsetstatus indications.

Detector symbol plain yellow, flashing: setting fault(s).

See Section 14.3.3 for operating instructions and a complete description of thecolours for the status and alarm indications.

Set zone,area,circuit

This tool is used to set the different elements in the installation. The mousepointer turns into a pointer representing a closed padlock when this tool isselected.The background colour for the different elements (zones, areas, circuits)indicates the current set/unset status and alarm status (in the same fashion asabove).

Page 252: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-8

See Chapter 14.3.3 for operating instructions and a complete description of thecolours for the status and alarm indications.

Isolate circuit

This tool is used to isolate a detector (used in connection with circuits only). Thestatus of each circuit is indicated by means of different symbols for circuits witha colour corresponding to the status. The mouse pointer turns into a pointerrepresenting a pair of scissors when this tool is selected.All circuits will be shown and it is therefore possible to isolate a circuit byclicking with the mouse on the circuit. The colour of the circuit (detector) symbolwill then change to yellow, if the isolation has been successful.

This tool cannot be used if the drawing displayed comprises areas/zones onlyand no detector (circuit).

See Chapter 14.3.3 for operating instructions.

Zoom-in

This tool is used for zooming-in on a drawing to obtain a more detailed view.Themouse pointer turns into a pointer representing a looking glass with a + (plus)sign when this tool is selected.When this tool is selected the zoomable fields will be displayed.If the zoomable fields correspond to zones or areas (this is normally the case),the zones and areas will be displayed. Zoomable fields that do not correspondto areas or zones will be represented by a hatched grey colour.

Zoom-out

This tool is used for zooming-out on a drawing to obtain a more general (lessdetailed) view. The mouse pointer is not changed when this tool is selected, asthe program responds immediately and performs a zoom-out to a lower leveldrawing each time this tool is selected. It is therefore not necessary to place thecursor on the displayed drawing to perform a zoom-out.This tool is not accessible on the lowest zoom level drawings (facility drawings).

The program memorizes the routing for zoom-in operations in order to proposethe inverse route for zoom-out operations. In the same way, a zoom-out will, incase of alarm, bring a new drawing on the screen by going back to the drawingdisplayed at the moment the alarm appeared.

Information

This tool is used to obtain detailed information about zones, areas, circuits,readers (or doors). The mouse pointer turns into a pointer representing an Iwhen this tool is selected.The status for zones, areas, circuits, readers (or doors) is indicated in a dialogdisplaying the information.

Page 253: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

92000701 13-9

A click on any of the elements gives a detailed information about:

Address

Set/Unset status

Alarm

Isolation

Door status

See the examples of dialogs below.

Example of dialogs showin information about areas and zones.

Example of dialogs showin information about readers and circuits.

Page 254: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-10

13.3 Instructions for useThe following section provides a detailed description of the operation of theGPM program.

13.3.1 Activation of the graphic module

The representation of graphic drawings can be activated either manually orautomatic.

This command (menu) is placed in the “Status” menu on the menu bar for theAIMS program. The function is activated by means of the “Graphic Presentation”Graphic command.

Access to the graphic module is only possible when the PC is connected.

The “Status” menu.

After selection of the menu the facility drawing is displayed in the availablespace in the AIMS window (see Chapter 13.2.2).

The facility drawing is, in general, an overview of the installation and is at thelowest zoom level. It is the first drawing to be displayed and may be consideredas the 'quiet' condition for the graphic program.

If an operator has access to perform automatic connection and to activate thegraphic module, the graphic representation is automatically activated after alogin procedure (provided the PC has been successfully connected).

The graphic presentation is not deactivated when an operator performs logout(except when manually required).

The graphics may remain displayed and active, even without an operator beinglogged in on the PC.

Manualactivation

Automaticactivation

Page 255: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

92000701 13-11

13.3.2 Operation of the THOR system using the GPM

The way operations are carried out on the drawings is similar to the proceduresused in the program standards at disposal under Windows® like Designer®,Paintbrush® etc.

When you want to perform a set, unset, or any other of the functions you mustfirst click on (select) the tool, that corresponds to the wanted function, in the toolbox and then click directly on the reader, zone, area, circuit (detector). Theselected tool will be represented by a new mouse pointer depicting the chosentool.

13.3.3 Setting and unsetting

After selection of the set/unset tool the surfaces in the drawing that representzones and areas will be shown hatched. The colour indicates the current status.

Now, a single click on the element will provoke the wanted action.

The unsetting of areas, zones, or circuits is subject the basic rules of the Intrudersystem. F.inst., an operator defined to a certain area, can operate on theelements in his own area only.

After the action the colour of the hatched surface is changed correspondingly.

The setting and unsetting of circuits (detectors) will directly change the colour(plain) of the element without passing via the hatched colours; the action is ofcourse shown on the drawings containing the zones, areas concerning theelement.

The setting of a circuit is not possible if the circuit is active or has been isolated.To set an isolated circuit, it must first be unset and then set anew.

Setting with a detector in alarm.

An attempt to set an area (zone) that contains a circuit (detector) in fault conditionwill automatically display the drawing containing the circuit (detector). The circuit(detector) symbol will be shown in flashing yellow for a few seconds in order toindicate the source of the fault then it will go to its former status of green (unset).

Circuits, that are not included (addresses not indicated by a symbol) on thedrawing and that are in an active state when the attempt to set is performed, willprevent this action.

A drawing containing an active detector in fault condition is shown in flashingyellow to indicate a setting fault. Setting faults will be shown only once after asetting attempt, and they will be shown no more after a zoom-out.

Now, two possibilities are at hand: No isolation of the circuit or Isolation of thecircuit.

This procedure should be used if you do not want to (or is not able to) isolate thecircuit.

No isolation of thecircuit

Page 256: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-12

Go to the detector to find out why it is active. Repair the fault and redo the settingof the zone/area.

Isolate the circuit by means of the Isolation tool (select the tool and click the circuitsymbol). The colour of the circuit symbol will then change to yellow, if the isolationhas been successful.

The reason for refusing an isolation are numerous and are the same as in theTHOR Intruder system (the circuit must be within your own area, you must have asufficient priority level, the circuit must be one that can be isolated etc.)

Perform a zoom-out; this will re-display the drawing on which the setting wasdemanded, the area (zone) must then be clicked again to be set. All circuits arenow set, except the one that provoked the setting fault and now has beenisolated.

13.3.4 Alarm handling

Intruder alarms

A circuit (detector) going into an alarm state will automatically provoke the displayof a drawing containing the circuit; at the same time the alarm will be displayed inthe AIMS “Alarm status” window. The detector in alarm will be indicated byflashing display of its symbol on the circuit drawing (red square as default).

In this way only the first drawing on which the first alarm appears will berepresented on the screen.

If other circuits (detectors) belonging to the same drawing go into an alarm statethese circuits will be indicated in the same way. As all circuits, even without alarmstatus, are represented on the circuit drawing, this can not be removed from thescreen except through an operator action.

The most recent alarm coming from a circuit (detector) will be representedhighlighted in the AIMS standard alarm dialog only.

A new circuit (detector) drawing can be loaded onto the screen, and the relatedcircuit (or reader) symbol be displayed flashing, by clicking twice on a highlightedalarm in the alarm dialog.

The circuit selected by the double click in the alarm dialog will be displayed with ablue arrow on the drawing (in the case that more circuits should be at fault, thecolour makes it possible to localize the selected circuit). Each double click on acircuit alarm belonging to the same drawing will display the related detector withthe blue arrow.

The alarm dialog with its list box will be used in the same way as in the standardAIMS for accepting and clearing the alarms, and also to show the alarmprocedures defined in AIMS.

The alarm filters are always operational in the same way as in the standard AIMS.In this way it is possible to state precisely the types of alarms that will be sent tothe alarm log only and thus not be displayed on the drawings in the graphicprogram.

Isolation of thecircuit

Page 257: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

92000701 13-13

The circuits, that are not included (addresses not indicated by a symbol) on thedrawings, provoke the same alarms as those included in the areas or zones, butthey are not visible on the drawings and they are displayed in the alarm dialogonly.

Access Control alarms

Indication of an alarm state for the readers in the Access Control system (redcolour, flashing) will only take place in the following two cases:

If (in an integrated Intruder and Access Control system only) the reader is ina sabotage state (opening protection or communication fault on the RS 485bus or on the S-art).

If the door is forced or held open (this alarm cannot be accepted before thedoor has been put into quiet condition - closed -).

All the other alarms in the Access Control system will not be indicated by aflashing red colour for the reader symbol. The first one to appear of these otheralarms will provoke display of a drawing containing the reader, with the readershown hatched. The following alarms will not be indicated on the drawing, until adouble click on the alarm line in the “Alarm status” window, then the readercorrespondent with the new alarm will be indicated with a blue arrow.

A new reader drawing can be loaded onto the screen, and the related readersymbol be displayed flashing, by clicking twice on a highlighted reader alarm inthe alarm dialog.

The reader (and its door) selected by the double click in the alarm dialog will bedisplayed as a rectangle with a blue arrow on the drawing (in the case that morereaders should be at fault, the colour makes it possible to localize the selectedreader). Each double click on a reader alarm belonging to the same drawing willdisplay the related reader symbol (as well as its door symbol) with a blue arrow.

Circuits common to the Intruder and Access Control systems

The alarm indications on the circuit (detector) drawings are displayed like this:

By flashing red circuit symbol based on an alarm coming from the Intrudersystem;

By flashing red symbol for readers or keypads in case of sabotage alarm comingfrom the Intruder system;

By flashing red symbol for door status alarm (door forced or door held open)coming from a reader;

And possibly a blue arrow symbol for detector (or keypad) alarm in order toidentify the reader, keypad or circuit (detector) based on a selection from the“Alarm status” window.

It is always possible to perform a zoom-out from a circuit drawing. The alarmstatus is likewise indicated by a flashing red background correspondent to thezone or (area) for the circuit in alarm. The alarm status is always shownalternating with the set/unset status.

Page 258: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-14

Not all the alarms shown in the “Alarm status” window will automatically beindicated on the drawings. Only the physical alarms from the Intruder system areindicated. In this way the alarms will be removed from the drawings when thealarms are actually cleared in the Intruder system.

All alarms displayed in a blue (grey) colour in the alarm dialog list box, as well asalarm in yellow colour, will not be displayed on the drawings.

Colours for the status and alarm indications.

Patterns and colours for status and alarm indications.

The plain and the hatched colours may be displayed alternating in order toindicate both the set/unset status and an alarm for zones (or areas).

13.3.5 Door control

Door control by way of the graphic representation can be executed on the readeritself or even on the door itself (provided the doors have been defined(programmed) as interactive elements during the configuration of the system).

After selection of the “Door” tool, a click on the reader (or the door) will open the“Door Control” dialog.

Example of the “Door Control” dialog

A click on the desired command button will provoke the action on the reader (ordoor) concerned.

Certain commands (for instance “Permanent Open”) will provoke the display ofthe “Alarm status” window because these commands are considered asabnormal states for the system.

Page 259: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

92000701 13-15

The following drawing represents an installation including different aspects ofAccess Control.

Example of a plan of an installation displayed in the GPM program window.

Page 260: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

“Graphic Presentation” command

9200070113-16

This page is intentionally left blank.

Page 261: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 14-1

14141414

Examples of reportsExamples of reportsExamples of reportsExamples of reportsThis chapter provides an overview of the various reports that can be printed.For each type of report, a table lists the various report elemts.

The chapter contains the sections listed in the following table.

Section Page

Event report 14-2

Alarm report 14-3

Operator report 14-4

Presency report 14-5

Introduction

This chapter

Page 262: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Examples of reports

9200070114-2

14.1 Event reportThe event reports may contain all the following elements. All these elementsmay be mixed, limited by xxxxx with the precision possible for the origin (whichreader or Intruder central).

“Access – door entry""Access – door exit""Access – set Intrusion system""Access – unset Intrusion system""Access – input test""Access – log-in""Access – log-out""Access – edit card""Access – delete card""Access – block card""Access – validate card""Access – old time""Access – new time""Access – menu execution""Access – card refused""Access – door locked""Access – new date""Access – anti passback violation"

"Access – data base download""Access – trouble""Access – sabotage reader""Access – sabotage S-ART""Access – door forced""Access – door held""Access – battery fault""Access – mains fault""Access – system fault""Access – blocked card used"“Access – card not created”“Access – illegal code”“Access – data base changed”“Access – service card used”“Access – CPU reset”“Access – reader initialized”“Access – system programming”“Access – door permanent open”

“AIMS – cards events”“AIMS – reader events”

“AIMS – guard tour”

“Intrusion – hold-up”“Intrusion – sabotage”“Intrusion – alarm”“Intrusion – technical alarm”“Intrusion – fire alarm”“Intrusion – system fault”“Intrusion – simulation test”“Intrusion – isolation”“Intrusion – detector set”“Intrusion – detector unset”“Intrusion – alarm accepted”“Intrusion – input test”“Intrusion – zone test"Intrusion – hold-up code""Intrusion – session started""Intrusion – terminal blocked""Intrusion – log-out""Intrusion – area partly unset""Intrusion – area partly set""Intrusion – cancel setting"

"Intrusion – menu execution""Intrusion – end test""Intrusion – zone unset""Intrusion – zone set""Intrusion – area unset""Intrusion – area set""Intrusion – date changed""Intrusion – up/download""Intrusion – test seismic/IR""Intrusion – zone unset by switch""Intrusion – zone set by switch""Intrusion – area unset by switch""Intrusion – area set by switch""Intrusion – isolation at detector set""Intrusion – system set""Intrusion – area auto unset""Intrusion – area auto set""Intrusion – area auto partly set""Intrusion – delay auto set area"

Example of Event Report

13/02/95 19:03 Door Entries main door Page 1

14/07/94 17:42 0001 : Industrial site, Paris – 0003 : Entry reader Main gateDoor 1 entry card No.: 00005 O´Neil

14/07/94 17:42 0001 : Industrial site, Paris – 0003 : Entry reader Main gateDoor 1 entry card No.: 00006 Smith

14/07/94 17:45 0002 : Bank, Copenhagen – 0103 : Entry reader Main entranceDoor 1 entry card No.: 00000 Master Card

14/07/94 17:45 0002 : Bank, Copenhagen – 0103 : Entry reader Main entranceDoor 1 entry card No.: 00000 Master Card

14/07/94 17:50 0001 : Industrial site, Paris – 0003 : Entry reader Main gateDoor 1 entry card No.: 00005 O´Neil

Report elements

Event Report

Page 263: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Examples of reports

92000701 14-3

14.2 Alarm reportThe alarm reports may contain all the following elements. All these elements maybe mixed, limited by xxxxx with the precision possible for the origin (which readeror Intruder central)

"Access – new date""Access – trouble""Access – sabotage reader""Access – sabotage S-ART"“Access – door forced""Access – door held""Access – battery fault""Access – mains fault""Access – system fault""Access – external alarm"

"Access – blocked card used""Access – card not created""Access – illegal code""Access – data base changed""Access – service card used""Access – CPU reset""Access – reader initialized""Access – system programming""Access – door permanent open""Access – door normal"

“"AIMS – cards alarms""AIMS – communication faults""AIMS – reader alarms"

"AIMS – system faults""AIMS – guard tour alarms"

"Intrusion – hold-up""Intrusion – sabotage""Intrusion – alarm""Intrusion – technical alarm"

"Intrusion - fire alarm""Intrusion – system fault""Intrusion – simulation test"

Example of Alarm Report (1).

13/02/95 19:06 Alarm bank site Page 1

00101 29/04/94 11:29 0002 : Bank, Copenhagen – 0101 : Bank, Copenhagen HI SECAlarm C100 PIR DETEKTOR, Z01: BANKLOKALE

00116 15/09/94 19:33 0002 : Bank, Copenhagen – 0101 : Bank, Copenhagen HI SECAlarm C100 PIR DETEKTOR, Z01: BANK HALL

00155 18/01/95 16:08 0002 : Bank, Copenhagen – 0101 : Bank, Copenhagen HI SECAlarm C102 MAX. TEMPERATURE, Z02: E.D.P.

00156 18/01/95 16:08 0002 : Bank, Copenhagen – 0101 : Bank, Copenhagen HI SECAlarm C103 PIR DETEKTOR, Z04: ADMINISTR.

00157 18/01/95 16:08 0002 : Bank, Copenhagen – 0101 : Bank, Copenhagen HI SECAlarm C100 PIR DETEKTOR, Z01: BANK HALL

00158 02/02/95 19:49 0002 : Bank, Copenhagen – 0101 : Bank, Copenhagen HI SECAlarm C100 PIR DETEKTOR, Z01: BANK HALL

Example of Alarm Report (2).

13/02/95 19:08 Access Control Alarm report Page 1

00102 29/04/94 15:07 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor forced

00103 16/05/94 13:52 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor 0 permanently open

00104 16/05/94 13:52 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor 0 normal

00105 18/05/94 17:28 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor forced

00106 18/05/94 17:29 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor forced

00107 18/05/94 17:30 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor forced

00111 07/07/94 15:14 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor forced

00112 07/04/94 15:15 0001 : Industrial site, Paris – 0003 : Entry reader Main HI SECDoor forced

00114 14/07/94 17:45 0002 : Bank, Copenhagen – 0103 : Entry reader Main entrance HI SECDoor forced

00118 15/09/94 19:33 0001 : Industrial site, Paris – 0003 : Entry reader Main gate HI SECDoor forced

Report elements

Alarm reports

Page 264: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Examples of reports

9200070114-4

14.3 Operator reportThe operator reports may contain all the following elements. All these elementsmay be mixed, limited by xxxxx with the precision possible for the operator

"AIMS - execution dialogue""AIMS - alarm acceptance""AIMS - deleting of alarms""AIMS - cards event""AIMS - reader event""AIMS - reader group event""AIMS - guard tour"

"AIMS - general events""AIMS – anti passback zone events""AIMS – week program events""AIMS - THOR users events""AIMS - THOR areas events""AIMS - THOR zones events""AIMS - THOR circuits events"

Example of Operator Report.

13/02/95 19:04 Operator HI SEC Page 1

29/04/94 17:11 HI SEC AIMS No.: 0201 Login 02/02/95 17:14 HI SEC AIMS No.: 0201 Connected to THOR 02/02/95 19:35 HI SEC AIMS No.: 0201 Disconnected from THOR 02/02/95 19:35 HI SEC AIMS No.: 0201 Logout 02/02/95 19:42 HI SEC AIMS No.: 0201 Login 02/02/95 19:43 HI SEC AIMS No.: 0201 Connected to THOR 02/02/95 19:47 HI SEC AIMS No.: 0201 Disconnected from THOR 02/02/95 19:48 HI SEC AIMS No.: 0201 Connected to THOR 02/02/95 19:48 HI SEC AIMS No.: 0201 CU no.: 0101 – Area 001: All zones set 02/02/95 19:50 HI SEC AIMS No.: 0201 Cleared alarm No. : 00158

Report elements

Operator report

Page 265: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Examples of reports

92000701 14-5

14.4 Presency reportExample of Presency Report.

13/02/95 11:07 Presency report from 01/0794 to 30/07/94 Page 1

5 : Peter O´Neil Date: First time : Last time : Time present : 01/07-94 00:00 00:00 00:00 02/07-94 00:00 00:00 00:00 03/07-94 00:00 00:00 00:00 04/07-94 00:00 00:00 00:00 05/07-94 00:00 00:00 00:00 06/07-94 00:00 00:00 00:00 07/07-94 00:00 00:00 00:00 08/07-94 00:00 00:00 00:00 09/07-94 00:00 00:00 00:00 10/07-94 00:00 00:00 00:00 11/07-94 00:00 00:00 00:00 12/07-94 00:00 00:00 00:00 13/07-94 00:00 00:00 00:00 14/07-94 17:42 17:50 00:08 15/07-94 00:00 00:00 00:00 16/07-94 00:00 00:00 00:00 17/07-94 00:00 00:00 00:00 18/07-94 00:00 00:00 00:00 19/07-94 00:00 00:00 00:00 20/07-94 00:00 00:00 00:00 21/07-94 00:00 00:00 00:00 22/07-94 00:00 00:00 00:00 23/07-94 00:00 00:00 00:00 24/07-94 00:00 00:00 00:00 25/07-94 00:00 00:00 00:00 26/07-94 00:00 00:00 00:00 27/07-94 00:00 00:00 00:00 28/07-94 00:00 00:00 00:00 29/07-94 00:00 00:00 00:00 30/07-94 00:00 00:00 00:00

Page 266: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Examples of reports

9200070114-6

This page is intentionally left blank.

Page 267: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

92000701 15-1

15151515

GlossaryGlossaryGlossaryGlossaryThis chapter provides a glossary and and an description of the alarm an errormessages that can occur during the operation of the AIMS. For each alarm anderror message a suggestion made regarding wat to do.

The chapter contains the sections listed in the following table.

Section Page

Access Control 15-2

Alarm messages 15-5

Error messages 15-10

Introduction

This chapter

Page 268: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-2

15.1 Access ControlThis is the common designation for all the elements necessary to control andregister the movements of persons and the entries/exits to/from a building bymeans of readers, exit push buttons, printer, door contacts etc.

An alarm message can be:

- A message displayed on the screen of a terminal or a card reader.- A siren and/or a lamp(s) arrangement (flashing).- A message transmitted to Central Alarm Station (if connected).- A buzzer in a terminal or in a card reader.

The acceptance of an alarm is the way to acknowledge an alarm message bymeans of the PC. This is necessary in order to stop outputs that might have beenactivated by the alarm.

All alarm messages (Intruder and Access Control) are registered in the systemlog.

The anti passback is a system that registers constantly where persons arelocated on the premises. To make this system work card readers are placed ateach passage way from one zone to another. This prevents two successiveentries or two successive exits in taking place with the use of the same card atthe same door and it demands that entry and exit takes place through thecontrolled doors. To enter a zone, the user must read her/his card through areader. If the user do not follow the rules and f.inst. enters (or exits) a zone bywalking in (out) with some one else, the user will lock in her/himself, due to thefact that the system has the user registered in another zone than the zone whereshe/he actually is located. Therefore the user will be blocked at the door the nexttime the card is read through a reader.

The anti passback is a restriction which raises the security level.

An area is a user "territory". This gives the possibility to define the parts of aninstallation that an operator is authorized to set or unset. An area is made up ofone or more zones. The maximum number of areas is 250. The maximumnumber of users is also 250. It is possible for users to share an area. This meansthat, f.inst., 50 users can be attributed to the same area.

The personnel in a production department may, f.inst., have the productionlocalities and the entry hall as their area. These two parts of the building thencomprises their "territory". If a manager has access to all parts of the building,then his will consist of the complete building.

The batteries are the power supply for the system in case of mains failure. Thebatteries are (re)charged by the THOR system and are located in the central unitcabinet.

The Access Control reader is an intelligent unit used for surveillance andcommand of the opening of doors in the system. It possesses its own data base,can display messages and operation instructions and can, of course, read cards.Moreover, the card reader can be used as Intruder terminal in integrated systems.

Alarm message

Alarm acceptance

Alarm log

Anti passback

Area

Batteries

Card readers

Page 269: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-3

The central unit is the "heart" of the Intruder system. In its cabinet is included theprocessor board, the batteries and the mains supply circuits. All elements in thesystem such as detectors, terminals, card readers and apparatus for alarmsignalling (sirens) are connected to the central unit.

The THOR system contains several data bases, both in the central unit or in thecard readers. These data bases contain all the programmed informations, f.inst. thedetector names, the zones, the card numbers and their programming.

The detectors are the "eyes and ears" of the alarm system. They are directlyconnected to the system processor board via a bus cable. Different types ofdetectors exist, they can be divided in several categories according to theirprinciples of functioning. The types used can f.inst. be:

- Movement detectors (infrared, ultra sound)- Magnetic opening detectors for doors and windows- Glass break detectors- Seismic detectors (vibration detectors)

All events (Intruder and Access Control) are registered in the system log.

Element having the possibility to connect a detector (to the system).

This term is used for the combination on the same site of the THOR Intrudersystem and a THOR Access Control system.

This is the common designation for all the elements necessary to protect a buildingagainst Intrusion attempts. These elements may be divided in 3 parts like this:

- detection (room detectors, glass break detectors, hold-up buttons etc.)- daily use (terminals, card readers, central unit)- alarms (sirens, flashing lamps, digital transmitters)

See also the system diagrams for different types of THOR systems in Chapter 1.

The isolation of a detector gives the possibility to set it outside operation for ashorter period. This can be necessary during a modification of the premises orduring maintenance.

The log-in gives the operator access to the PC (program) by the use of a name anda password. This is absolutely necessary before any kind of operation, because thisidentifies the operator (to the system).

The log-out lets the operator quit the use of the program (attention! a log-out do notclose down the program) after operations. It is performed by means of the menuLog-out.

This term is used to define one of the ways an area may be programmed.

The menus are the dialogue interface to the operator and make up the program, soto speak. In the program are included all data and instructions according to thestatus and use of the system.

All operations performed by the operators are registered in the system log.

The outputs are elements for connection of sirens, flashing lamps, lockingmechanisms, transmitters, electrical door locks etc. on a THOR system.

Central unit

Data base

Detectors

Events log

Input

Integrated

Intruder system

Isolation

Log-in

Log-out

Logic

Menus

Operators log

Outputs

Page 270: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-4

A personnel group is an association of cards having the same access rights,restrictions and functions. The system can have a maximum of 250 personnelgroups. A personnel group can consist of one or more persons.

This term is used to define one of the ways an area may be programmed.

The user can not operate the system before the personal code (PIN-code) hasbeen entered. The code has 6 digits in the Intruder system and 4 or 6 in the AccessControl system. The PIN-code is a strictly confidential information and must only beknown to the user.

The priority level defines the possibilities given to a system operator. There are 7priority levels (P0 to P6) in the Intruder system, and 5 priority levels (P0 to P4) inthe Access Control system. The higher the number, the more operationalpossibilities are given the system operator. The level is indicated by the letter Pfollowed by a digit. The installer will issue the definitive priority levels at theinstallation.

These functions gives an operator the possibility to set or unset the Intruder systemon a reader in the Access Control system or a normal Intruder terminal.

The system makes distinctions between the different users (priority levels). Amongthe internal personnel (the guard and the engineer (service technician) are externalpersonnel), the supervisor (priority P2) is the person with the highest number ofpossibilities for operation in the Intruder system. The supervisor is the person tocontact in case of failures or damages.

Technical fault. The system faults are displayed on the Access Control reader ornormal Intruder terminal.

The system makes distinctions between the different users (priority levels). Thesystem manager is the person that possesses most of the possibilities for systemoperation - after the supervisor -for an Intruder installation. In general, there is onesupervisor (priority P2) and several system managers (priority P1), especially onlarge sites.

A unit comprising a keyboard and a display. All operations for the Intruder systemcan be performed on the terminal.

A week program comprises time periods for all week days and 2 special days. Eachweek day programmed may be divided into a maximum of 8 time periods, eachhaving attributed a function.

F.inst., if an access is permitted between 08:00 and 17:00, it also means thataccess is not allowed between 17:00 and 08:00. If a user tries to enter the buildingoutside the time period allowed her/his card will be refused and the transaction willbe registered in the reader log.

A zone is defined as a physical part of the building (one room, two or more rooms,an entry hall etc.). A zone generally contains several detectors. A zone can consistof a single part (f.inst. Sales Department), but can also contain a group of parts(f.inst. Management + Advertising + Technical Service). The maximum number ofzones is 16. For large sites, this gives the possibility to realize zones comprisinglarge room sizes. The subdivision of a building into zones is the responsibility of theinstaller during the installation phase of the system.

Personnel group

Physical

PIN-code

Priority level

Setting function

Supervisor

System fault

System manager

Terminal

Week program

Zone

Page 271: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-5

15.2 Alarm messagesExample of an alarm message

"Anti passback alarm for Card No. XXXXX"

The card XXXXX has provoked an anti passback alarm in the Access Controlsystem.

Remedy: Verify if it is a faulty operation or if the person really has a problem, inwhich case it can be necessary to place the person in another zone or to set theuser in a free status.

"Bus device: XXXX on the address XXYY has been lost"

The bus device of the type XXXX on the address XXYY does not respond toprogram commands any more, and it is not present in the bus devices list.

Remedy: This message may be due to a service visit. If not, the servicecompany must be called to repair the mentioned device..

"Bus communication fault, one mail session has been abandoned"

A communication problem has appeared on the RS 485 system bus, oneexchange of data has been abandoned.

Remedy: Accept and verify that this message does not regularly appear. If themessage often appears it is necessary to make a complete check (verification)of the communication.

"Capacity fault Intrusion, XXXX alarms lost"

"Capacity fault, XXXX alarms lost"

The program (in the PC) has not been able to update all the events that havetaken place since the last connection of the PC to the system. XXXX indicatesthe number of events lost.

Remedy: In the future it is advised that the PC should be connected more often,even if you not are going to be logged in for long.

Do not forget that the log is incomplete from this moment on, and consultationsand reports will be incorrect for the period lost.

Page 272: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-6

"Card data base Mis-match, Reader No.: XXYY"

The program has detected that the content of the card data base in readerXXYY is not identical to the card data base in the PC (the data has beenprogrammed directly on the reader, or a new reader has been introducedwithout a download or the PC ptogramming).

Remedy: Perform a download to the reader in question (do not use the readeras the source for the temporary upload).

In cases where the reader is considered as the data reference the following isdone: Perform an upload using the reader as source, then perform a downloadof the card data base in order to set all readers equal (all readers will then havethe same card data base).

"Connection fault, communication stopped"

The program (the PC) has not been able to enter in communication with theTHOR system following the connection command (manual or automatic).

Remedy: Try again, in case of another unsuccessful attempt you must verify thechoice of communication port (Menu: Communication options), verify the RS232 actually connected to the correct port on the PC, and verify that this port isnot used by another piece of equipment (mouse, modem etc.) or program.

"CU No.: XXYY, alarm counter erroneous, XXXX alarms lost"

The internal alarm counter in the Intruder central unit is at fault, the program hasnot been able to update all the alarms from the central unit with the addressXXYY that have taken place since the last connection of the PC to the system.XXXX indicates the number of alarms lost.

Remedy: This kind of message ought not appear in a system already inoperation. If the message appears a problem might exist in the Intruder central.

Do not forget that the log is incomplete from this moment on, and consultationsand reports will be incorrect for the period lost.

"Fault at alarms upload from Reader No.: XXYY"

"Fault at events upload from Reader No.: XXYY"

"Fault at alarms upload from CU No.: XXYY"

"Fault at events upload from CU No.: XXYY"

A problem during upload of alarms (events) coming from reader (central unit)with the address XXYY has appeared.

Remedy: Accept and verify that this message does not regularly appear. If themessage often appears it is necessary to make a complete check (verification)of the element in question.

Page 273: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-7

"Guard tour ZZZZ alarm. Guard: XXXX"

An execution error has arisen in the guard tour ZZZZ performed by GuardXXXX.

Remedy: Verify immediately why the guard tour has not been correctlyexecuted (bad performance, short-cutting, maximum time at control pointexceeded).

"Invalid Site code, communication stopped",

The site code in the program is not identical to the site code installed with thesystem - communication is impossible.

Remedy: Verify that you have started the right AIMS program, this kind ofmessage can never appear in a system already in operation.Advice to the engineer: Verify the site code in the menu "About" and thereafterin the Intruder system or the Access Control system by means of theappropriate menus (see the Manuals).

"Invalid alarm received from Reader No. XXYY"

The program has received an alarm from the reader with the address XXYY thatis not known to the program.

Remedy: Verify (or let verify) that a newer program version has not beenimplanted in the reader.

"Invalid alarm received from CU No. XXYY"

The program has received an alarm from the Intruder central with the addressXXYY that is not known to the program.

Remedy: Verify (or let verify) that a newer program version has not beenimplanted in the Intruder central.

"Invalid event received from CU No. XXYY"

The program has received an event from the Intruder central (reader) with theaddress XXYY that is not known to the program.

Remedy: Verify (or let verify) that a newer program version has not beenimplanted in the Intruder central (reader).

"Invalid event received from Reader No. XXYY",

The program has received an event from the Intruder central (reader) with theaddress XXYY that is not known to the program.

Remedy: Verify (or let verify) that a newer program version has not beenimplanted in the Intruder central (reader).

"New bus device: XXXX detected on the address XXYY"

A bus device of the type XXXX on the address XXYY, not present in the busdevices list, has appeared on the bus.

Page 274: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-8

Remedy: This kind of message can never appear in a system already inoperation.

Advice to the engineer: This message will disappear after activation of the Savecommand in the menu "Show bus devices".

"No Readers present, communication stopped"

The program has performed an automatic disconnection because it did not findany readers present on the RS 485 bus.

Remedy: Accept and verify that this message does not regularly appear. If themessage often appears it is necessary to make a complete check (verification)of the communications.

"PC Client detected on the address IPX: XXXXXXXX:XXXXXXXX"

The AIMS Network program has detected that a new client has madeconnection onto the communication server. The address IPX gives thepossibility to recognize which post on the net has entered communication. Themessage thus is a means for surveillance of network access on the PC.

Remedy: Accept and, if desired, verify that the post is qualified to work on theAIMS. Moreover, the menu Connection network client allows you to see theoperator logged-in on that post.

"Reader No. XXYY" does not respond"

The reader on the address XXYY does not respond to program commands anymore.

Remedy: Accept and verify that this message does not regularly appear. If themessage often appears it is necessary to make a complete check (verification)of the element in question.

"System fault AIMS No.: XX"

A problem in the functioning of the program has appeared.

Remedy: Accept and verify that this message does not regularly appear. If themessage often appears it is necessary to acquire assistance to find anexplanation of this fault.

"Time exceeded Card No.: XXXXX in Zone YYY"

The user with card XXXXX has rested too long in the anti passback zone YYY.this message only applies if a maximum time for staying in the zone has beenprogrammed in the PC.

Remedy: Verify if it is just a mistake or if the person really has a problem.

Page 275: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-9

"Upload Time-out of events from Reader No. XXYY"

A problem concerning upload of events coming from reader with the addressXXYY has appeared.

Remedy: Accept and verify that this message does not regularly appear. If themessage often appears it is necessary to make a complete check (verification)of the element in question.

"Upload of events from Reader No.: XXYY not possible"

A problem concerning upload of events coming from reader with the addressXXYY has appeared.

Remedy: Accept and verify that this message does not regularly appear. If themessage often appears it is necessary to make a complete check (verification)of the element in question.

Page 276: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-10

15.3 Error messagesExample of an error message.

"All time periods must be programmed with a function !"

You have programmed a week program with a time period, where the functionhas not been defined. All time periods must be programmed with a function.

Remedy: Verify on the screen (the period in question is displayed with a whitecolour in the field for the function) and correct the action.

"Are you sure you want to delete the "VVVVVVVVVVVVVVVV !"

You have activated the “Delete” command button and the program demandsconfirmation of the deletion, if the element displayed will be destroyed by thedeletion.

Remedy: You are the one to decide the action to be taken.

"Are you sure, all modifications will be lost !"

"Are you sure, all modifications for this card will be lost !"

You have activated the “Cancel” command button and the program demandsconfirmation of the cancellation, if modifications performed will be lost by thecancellation.

Remedy: You are the one to decide the action to be taken.

"Are you sure you want to copy the Personnel Group from Reader XX to YY !"

You have activated the “Copy” command button for personnel groups on areader to be copied to another (reader). This message repeats your demand.

Remedy: You are the one to decide the action to be taken.

"Attention. The card is not active !"

The card you want to work on is not active (it is blocked) at the moment.

Remedy: You are the one to decide if the card shall remain blocked. If not, usethe Card status menu to modify the card status.

Page 277: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-11

"Connection fault!"

The PC is no more connected to the THOR system or the client program (PC) isno more connected to the network server.

Remedy: Perform a new connection. If this is unsuccessful, verify that the PC iscorrectly connected to the GPI COM interface, or that the network card iscorrectly installed using the correct protocol (Windows Setup).

"Create card?"

You are going to program a card and the program asks if the card should becreated; at creation the card will be registered in the PC and transferred to theTHOR system.

Remedy: You are the one to decide the action to be taken.

"Download, all changes in the reader will be lost !"

You are going to start a download and the program warns you that the readerdata will be replaced by data from the PC.

"Error in the file "NNNNNNNNNNNNNNNN !"

"Impossible to open the file "NNNNNNNNNNNNNNNN !"

The program has detected an error in the file indicated; the file is corrupted(power cut, PC reset without proper close-down of file etc.).

Remedy: Shut down the program, then try again. If the problem still exists, usethe Backup diskettes to reinstall the data base by means of the Restore menu.

Note: Do not forget that the backup is old. All the present files will be replacedby the old files.

"Has not been able to open this alarm file !"

"Has not been able to open this event file !"

The program has detected an error in the file indicated; the file is corrupted(current cut-off, PC reset without proper close-down of file etc.).

Remedy: Shut down the program, then try again. If the problem still exists, usethe Backup diskettes to reinstall the data base by means of the Restore menu.

Note: Do not forget that the backup is old. All the present files will be replacedby the old files.

"Illegal date!"

The format of the date your are entering is not correct.

Remedy: Verify the syntax of the date (and hour) entered in the dialog / menu.

Page 278: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-12

"Impossible to open the operator log files !"

The program cannot open the operator log file (corrupted, destroyed etc.). files.

Remedy: Shut down the program then restart it and make another attempt. Ifthe problem persists, it will be necessary to look into the files on the PC.

"Impossible to delete! Cards are using this Group !"

It is impossible to delete the personnel group because cards are still in use forthe group.

Remedy: Move all cards using the personnel group onto another (valid)personnel group, then repeat the operation.

"Impossible to perform the upload!"

"Impossible to perform the download!"

Your command is impossible to execute at the moment.

Remedy: Make a new attempt. If the problem persists, there probably is ahardware problem in the system.

"Impossible to repair the alarm file! A new has been created!"

At start-up of the program the program has found the alarm file corrupted andhas made an attempt to repair which has failed. A new log file (empty) has beencreated.

Remedy: Accept the message. A recent backup limits the loss of alarm data.Perform a Restore operation as soon as possible.

"Impossible to import the configuration files!"

The program cannot import the system configuration files.

Remedy: Verify the validity of the import diskette.

Your command is impossible to execute at the moment.

"Impossible to execute the upload command!"

"Impossible to execute the download command!"

"Time-out, uploading abandoned!"

"Time-out, downloading abandoned!"

"Mail time-out on the network!"

The command or the menu you are using has not been able to exchangeinformations between the system and the PC, the command has beenabandoned. This may be due to noise signals or problems with thecommunication on the RS 485 bus.

Remedy: Make a new attempt. If the problem persists, there probably is ahardware problem on the RS 485 bus.

Page 279: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-13

"Impossible to find the log files specified!"

The log files are not present in the directory (or diskette) that you have chosen.

Remedy: Make a new attempt on a different path (or diskette).

"Impossible to delete! Readers are using this zone!"

It is impossible to delete this anti passback zone because readers are still usingthe zone.

Remedy: Move all readers using the anti passback zone onto another antipassback zone, then repeat the operation.

"Impossible to repair the cards file!"

At start-up, the program has found the cards file corrupted and has made anattempt to repair, which has failed.

Remedy: Accept the message. A recent backup limits the loss of card data.Perform a Restore operation as soon as possible.

"Impossible to find your THOR User No.!"

The THOR user no. does not exist in the data base.

Remedy: Verify and correct this.

"Impossible to create a new destination for the log files!"

The moving of files is not possible to the directory (or diskette) that you havechosen (another log file is already present).

Remedy: Make a new attempt on a different path or clean the directory bymeans of the Windows File Manager.

"Impossible to start print job!"

The program cannot start the print job. Problems in the Windows print jobhandling.

Remedy: Verify the Windows print Manager (see Windows manual).

"Impossible to delete! Cards are using this Department!"

It is impossible to delete the department because cards are still in use in thedepartment.

Remedy: Move all cards using the department onto another (valid) department,then repeat the operation.

Page 280: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-14

"Insufficient memory for mail handling!"

"Insufficient local memory!"

The program has not been able to handle the mail from the system due to lackof memory. The mail has been abandoned. This could be due to lack of PCmemory.

Remedy: Close down not necessary applications, then try again. If the problempersists shut down the Windows program and restart it in order to restore thePC memory. Make sure that the RAM is 16 Mb minimum or 32s Mb if you areusing the Network version or Graphic version.

"It is your first connection to the THOR system, do you want to upload all events from thereaders?"

This is your first connection between the program and the THOR system. Inorder to avoid to upload all the old logs from the readers existing in theinstallation you get the opportunity ONLY to upload the alarms pending, and inthis way speed up the connection time.

Note: The first connection to an existing installation could take several hours.

Remedy: You are the one to decide the action to be taken.

"LPT not present or impossible to open!"

The port chosen for the real time printer is not functioning or does not exist.

Remedy: Verify if there is a port configuration error and correct as needed.

"Name for Elevator definition lost!"

The elevator definition associated to this dialog does not exist on the PC.

Remedy: Verify, change the definition or create one.

"No events at disposal for the report specified!"

The program has found no event corresponding to the report that you havedemanded.

Remedy: Accept or verify your dates and content of the report; correct ifneeded.

"No access to system resources, runtime error!"

The command or the menu you want to use require more resources than areavailable on the post at the moment.

Remedy: Close down not necessary applications, then try again. If the problempersists shut down the Windows program and restart it in order to restore thePC memory.

Page 281: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-15

"No printer selected!"

You have required a print-out without selecting a printer in Windows.

Remedy: Chose a printer by means of the Printing menu in the program, orcreate a default printer by means of the configuration tables in Windows.

"No alarms at disposal for the report specified!"

The program has found no alarm corresponding to the report that you havedemanded.

Remedy: Accept or verify your dates and content of the report; correct ifneeded.

"No Operator events at disposal for the report specified!"

The program has found no operator event corresponding to the report that youhave demanded.

Remedy: Accept or verify your dates and content of the report; correct ifneeded.

"No Personnel Group selected!"

You are going to program a Card without stating the personnel group to whichthe card belongs.

Remedy: Choose a personnel group and repeat the operation.

"No Reader selected!"

The command or menu you are using requires the choice of a target reader.

Remedy: Choose a reader and make a new attempt.

"No authorization to edit guard tours!"

Your are not authorized to program guard tours, only to perform themanagement of guard tours.

Remedy: Accept the message or ask the supervisor to modify your rights to thisfunction by means of the Operator Configuration menu.

"No name entered!"

All the Configuration menus require the entering of a Name to be able toregister the configuration in the program data base.

Remedy: Enter a name and repeat the operation.

"No door entry with the card chosen!"

The card selected is not registered in the event log with an entry event type andtherefore no "Last reader used".

Remedy: Verify that the card is given to the correct person.

Page 282: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-16

"Not all readers are in communication!"

One (or more) Readers are not in communication at the moment. The reader(s)is (are) not in a state to perform a dialogue on the bus.

Remedy: Make a new attempt. If the problem persists, there probably is ahardware problem in the reader(s).

"Not possible to create any more messages!"

The maximum quantity of messages has been reached, the program refuses tocreate new messages.

Remedy: Delete messages that are unnecessary, or wait until they have beenused, whereafter they may be deleted.

"No cards authorized to edit!"

You have activated the Edit cards menu and you are not allowed to edit anycard numbers.

Remedy: If you are authorized to use the System Operator menu (AccessControl system), choose the option All cards, or if necessary call the supervisor.

"Personnel Group(s) copied!"

You have activated the “Copy” command button for personnel groups on areader to be copied to another (reader). This message indicates the completionof execution.

Remedy: Accept this message.

"Please enter a name to register the configuration!"

All the Configuration menus require the entering of a Name to be able toregister the configuration in the program data base.

Remedy: Enter a name and repeat the operation.

"Please select a report!"

You have not selected the report, before demanding a create or an editoperation.

Remedy: Choose a report in the list, then activate your command.

"Real time printer out of paper!"

The real time printer is out of paper.

Remedy: Verify and correct this.

"Restore completed, quit AIMS immediately!"

You have performed a restore operation, the program demands that you shutdown the system in order to restart and thus put the new (restored) files intooperation.

Remedy: Accept this action and afterwards make a restart.

Page 283: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

92000701 15-17

“Some configuration files are absent!"

The program has not found all the system configuration files.

Remedy: Use another diskette for the import or accept an incomplete import.

"The reader is not on the line!"

The reader chosen is not in communication at the moment, the reader is not ina state to perform a dialogue on the bus.

Remedy: Make a new attempt. If the problem persists, there probably is ahardware problem on the reader in question.

"The Bus Device wanted does not exist!"

The command or the menu you have used has not been able to exchangeinformations between the system and the PC, because the bus device (reader,central) is not in a state to perform a dialogue on the RS 485 bus.

Remedy: Make a new attempt. If the problem persists, there probably is ahardware problem on the bus device in question.

"The real time printer is out os service or at fault!"

The real time printer is not functioning correctly.

Remedy: Verify that the printer is not turned off, disconnected, or at fault andcorrect accordingly.

"The User does not exist!"

You have selected (chosen) a user no. that is not compatible with the database.

Remedy: Verify the User No. entered and correct it.

"The card number does not exist!"

You have selected (chosen) a card no. that is not compatible with the database.

Remedy: Verify the Card No. entered and correct it.

"The PIN-code is illegal!"

You are going to program a PIN-code for Intrusion personnel that isincompatible with the rules of THOR Intruder (6 digits, verification ofresemblance - max. 4 digits identical and at the same positions).

Remedy: Verify the PIN-code and correct it.

"The Personnel Group does not exist!"

The personnel group you have chosen does not exist.

Remedy: Choose a personnel group that do exist in the system.

Page 284: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Glossary

9200070115-18

"The card no. entered must not exceed 65500!"

You have selected (chosen) a Card No. incompatible with the data base.

Remedy: Verify the card no. that you have entered and correct it.

"The PC is not connected to THOR!"

The command or menu you are using requires that the PC is connected with thesystem.

Remedy: Perform the connection needed: either between the PC and theinterface GPI PC, or between the client program and the server program.

"THOR does not answer the command!"

The command or the menu you have used has not been able to exchangeinformations between the system and the PC, because the THOR system is notin a state to perform a dialogue on the RS 485 bus, or the THOR system mustbe in Service Mode to execute the selected command.

Remedy: Allow Service for the Intruder or Access System depending on thecommand you want to perform and make a new attempt.

"Times specified invalid!"

The dates that you have entered for the report are not correct.

Remedy: Verify the dates and correct if needed.

"Too many outstanding mails!"

You have accepted too large a number of alarms at one time, the programinforms you about the size of the overload.

Remedy: Wait until the alarms (in the overload) have been accepted, thencontinue the accept of more alarms. No alarms or acceptances will be lostbecause of this message.

"Windows Application Error!"

The program has encountered an error message generated by Windows,corrective action is going on.

Remedy: Verify that the program is functioning correctly. For security reasons itis advised to shut down the AIMS and the Windows programs and then restartthe PC

.

Page 285: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the
Page 286: Thor System Access and Intrusion Management System - AIMSassetid.co.uk/Manuals/AIMS.pdf · Access and Intrusion Management System Users manual This manual will provide you with the

Denmark United Kingdom France NetherlandsHI SEC International

Marielundvej 16DK- 2730 HerlevDenmark

Tel.: +45 44 50 78 00Fax: +45 44 50 78 01E-mail: dk @ hisec.com

HI SEC International

4B Victoria AvenueCamberley Surrey GU15 3HXUnited Kingdom

Tel.: +44 (0) 1276 679 950Fax: +44 (0) 1276 679 949E-mail: gb @ hisec.com

HI SEC International

ZAC de Nanteuil12, rue Jules FerryF-93561 Rosny sous BoisFrance

Tel.: +33 (0) 1 48 12 90 10Fax: +33 (0) 1 48 12 90 20E-mail: fr @ hisec.com

HI SEC International

Populierendreef 968BNL-2272 HW VoorburgHolland

Tel.: +31 (0) 70 386 1103Fax: +31 (0) 70 387 4095E-mail: nl @ hisec.com

Spain Germany USAHI SEC International

C/. Ávila, 48-503° Planta, local G-HE-08005 BarcelonaSpain

Tel.: +34 93 300.46.95Fax: +34 93 485.60.78E-mail: hisec @ ciberset.com

HI SEC International

Westerholtstraße 6D-46119 OberhausenGermany

Tel.: +49 (0) 208 - 611193Fax: +49 (0) 208 - 6290299E-mail: ghr @ hisec.com

HI SEC International

6829 K Avenue,Suite 101Plano, TX 75074USA

Tel.: +1 (972) 509 7744Fax: +1 (972) 509 0144E-mail: jje @ hisec.com