Specifications

Technology Upgrade Access Control 28 3500-16
1224_01
5. Secure the J-hooks to the building structure with beam clamps and threaded rod as
required to support the cables.
6. J-hooks shall never be attached to drop ceiling support wires. Cables shall never be
supported by drop ceiling wires.
D. Management Server:
1. Install and configure the server. Attach to the network.
2. Install the server in the MDF on the data rack. Provide shelves as required for
keyboard, PC, mouse, and monitor.
3. Connect Server into the Ethernet network to allow remote monitoring and remote
control of the system from other locations also attached to the Ethernet network or IP
network.
4. Contractor shall provide and install software that allows remote monitoring and control
of the entire security/access system through the Ethernet.
a. Configure backup of the system to the owners storage device.
E. Networked Controller:
1. Controller(s. shall be mounted to the wallfield in the communications room.
2. Controller shall be sized for all security, access, control, and monitoring points
existing on the drawings and shall be expandable.
3. Controller shall be able to be linked to additional controllers in other communications
rooms via the Ethernet network.
4. Each port in the controller that is connected to a security point shall be labeled inside
the controller box.
5. Install power to the battery backup power supply that supports the controller. Power
shall be hardwired from the local power circuit.
F. Control Software:
1. Contractor shall provide all software required for a fully functional security/access
system.
2. Software shall be installed and fully configured by the Contractor.
3. Contractor shall schedule meetings with the Owner prior to installation to determine
the working of the security/access system.
4. Install control software on the management PC in the communications room.
5. Install software on up to 20 other PC’s attached to the IP network to allow remote
monitoring and control of the entire security/access system. Work with Owner on
determining location of PC’s.
6. Configuration of the security software shall include but not be limited to the following:
a. Installation of all user information into the security software. This shall include
all staff. This shall include no less than 100 staff members.
A) Configure the personnel information field prior to beginning the staff
information input. Meet with the owner to determine the information that
they wish to be in the system.
B) Take all personnel pictures as they are enrolled into the system.
C) Enter the persons information into the fields required by the owner.
D) Meet with the owner prior to installing data to determine custom data
fields and to layout the card requirements.
E) Print all cards with the a printer. Provide the ink for each card.
b. Number each door input and associate it with a standard door name for easy
review.
c. Meet with the owner to determine how they will use the system. Take
information from them that will allow all custom settings of the software system.
This shall include but not be limited to:
A) User groups based on building and administrative group
B) Access levels based on groups and times.
C) Building locking and unlocking schedules for each building
D) Building arming and disarming schedules of door contacts.
E) Administrative levels and super administrators