Study Guide Level One: Protege GX Installer Study Guide
Copyright © Integrated Control Technology Limited 2003-2012. All rights reserved. No part of this document may be reproduced, photocopied, or transmitted in any form or by any means (electronic or mechanical), for any purpose, without the express written permission of Integrated Control Technology Limited. The specifications and descriptions of products and services contained in this document were correct at the time of printing.
Contents Module 101: ICT Company Profile ______________________________________________ 7 About ICT ____________________________________________________________________________ 8 Review Questions ____________________________________________________________________ 12 Module 121: Protege GX Platform Introduction __________________________________ 13 Platform Focus _______________________________________________________________________ 14 Installer Certification __________________________________________
Module 126: Limitations of SE Hardware in Protege GX _________________________ 101 System Controller Compatibility _______________________________________________________ 102 Review Questions ___________________________________________________________________ 106 Module 127: Protege DIN Rail Hardware Configuration __________________________ 107 DIN Rail Hardware Setup _____________________________________________________________ 108 LED Indicators _______________________________________________________
Schedules __________________________________________________________________________ 245 Review Questions ___________________________________________________________________ 258 Module 133: Basic Intruder Detection _________________________________________ 261 Programming Areas__________________________________________________________________ 262 Programming Inputs _________________________________________________________________ 270 Review Questions ______________________________________________________
Module 122: Protege GX Licensing ____________________________________________________ 421 Module 123: Protege GX System Architecture ___________________________________________ 425 Module 124: Protege Hardware Overview_______________________________________________ 429 Module 126: Limitations of SE Hardware in Protege GX __________________________________ 435 Module 127: Protege DIN Rail Hardware Configuration ___________________________________ 437 Module 130: Protege GX Hardware Setup ____________________
Module 101: ICT Company Profile ICT is a world leading manufacturer of innovative and superior integrated electronic access control and security solutions. This module provides an overview of the company and its focus. In This Module About ICT ........................................................................................................................................ 8 Review Questions ...............................................................................................................
About ICT ICT is a world leading manufacturer of innovative and superior integrated electronic access control and security solutions that enable organizations to protect their people, operations and information.
Distribution Customers With thousands of system installations in over 20 countries worldwide, ICT boasts a prestigious customer base with a large number of high profile customers and a strong presence in a broad range of vertical markets.
Production ICT produce ALL products in our state of the art production facility located in Auckland, New Zealand. Full surface mount production facility capable of over 80,000 part placements per hour 100% testing for ALL products - no batch testing Boards are manufactured to IPC610 Level 3 standard with an automatic end-to-end production process Products ICT produces more than 260 different products.
Integration Partners: DVR/NVR Systems Protege integrates with a number of third party DVR / NVR systems providing a full featured event based DVR and NVR solution. Operators can control Digital Video and Network Video Recorders and cameras within Protege, including the ability to view live and historical video feeds directly from event association. Video is triggered from events for pin point accuracy. Simply right click and view the video in a separate window with full screen and keyboard shortcut control.
Review Questions Where is ICT hardware produced? China New Zealand Canada Canada and New Zealand Which certification applies to ICT products? UL Certification CE Compliance NIST AES256 Bit Encryption Certification All of the above Where is research and development carried out? China Canada New Zealand New Zealand and Canada 12 Module 101: ICT Company Profile | Review Questions
Module 121: Protege GX Platform Introduction This module describes the focus of Protege GX, who it's been designed for, and what's involved in gaining Protege GX certification. In This Module Platform Focus ............................................................................................................................... 14 Installer Certification ....................................................................................................................... 16 Review Questions .........
Platform Focus Before you begin your journey in to ICT Protege GX training, it is important that you have a good understanding of what GX is all about, why we made it, and - more importantly - where and how you should be using it. Who is an electronic security system for? This may sound like a stupid question but all too often integrators are losing sight of their end user and what it is that they need.
Intelligent Event Reporting One of the simplest and most important requirements of a security system is its ability to produce useful event reports. In many systems this is often overlooked or even licensed as an additional feature. GX makes event reporting both intelligent and easy, with a new grid view WYSIWYG reporting tool that allows you to quickly and easily find the data you are looking for. Results can be filtered, sorted, and grouped, to show only relevant information.
Installer Certification It is important to ICT to protect the image of GX. As such only certified Protege GX partners will have access to the product. Becoming a Protege GX Partner To become a Protege GX Partner, you must submit an application to join the ICT Dealer Network (IDN) and purchase a Protege GX Level 1 Partner Training Pack. Training and certification of at least one technician must be successfully completed before IDN membership will be issued.
Certification Levels There are three levels of Certification: Protege GX Installer (Level 1): Aimed at installers responsible for small to medium projects, this certification focuses on planning, installing, and configuring Protege systems to ensure successful implementation of an intruder detection and access control solution. Protege GX Integrator (Level 2): Aimed at integrators responsible for installing medium to large projects, this certification has a focus on system integration.
Maintaining Certification The Protege GX Installer certificate is valid for one year from the date of completion. Refresher training can be carried out online and a supervised recertification examination must be undertaken at an ICT approved facility prior to the expiration of the certificate to remain current. Alternatively, you can opt to advance to the next certification level by completing the relevant course and corresponding exam.
Review Questions Who was the GX platform built for? The Integrator The Consultant The End User The Distributor What type of system is the GX platform best suited to? Single door systems Systems up to 50 doors Enterprise class systems All of the above Complete this statement: WYSIWYG Event reports are...
Where do certification exams take place? Web based, self paced Only at the ICT factory Supervised at the Integrators office Supervised at an ICT approved facility 20 Module 121: Protege GX Platform Introduction | Review Questions
Module 122: Protege GX Licensing This module outlines the Protege GX licensing structure, describes which items and features are included in the base license (and which must be licensed separately), and explains the importance of an SMA and how it is charged. In This Module Licensing Structure ........................................................................................................................ 22 Base License ...............................................................................
Licensing Structure Protege GX uses a modular licensing model which is both flexible and scalable. This enables you to purchase only the features you need, yet easily extend your system by adding additional features as you need them. The larger the system the higher the premium, however a ceiling (or license cap) prevents runaway license costs. Once this cap is reached, the total number of that item becomes unlimited.
Base License The base Protege GX Server License (PRT-GX-SRVR) is required for all installations and includes 1 concurrent Protege GX Client connection 50 Doors 10 Cameras Unlimited DVRs Unlimited sites Unlimited controllers Unlimited areas Unlimited operators Unlimited users Additional client, door, and camera licenses can be purchased to extend the base configuration. These are only required when exceeding the base license quantity.
Licensed Items and Features Additional licensable components are available based on your needs. Doors The base license includes 50 doors. If additional doors are required, further door licenses can be purchased in blocks of 50, 10 or as a single item, with bulk purchases being more cost effective. Doors have a cap or "top out" limit of 1000. Once this limit has been reached, the number of doors allowed becomes unlimited.
SIP An SIP license enables the GX client to communicate directly with IP intercoms. This feature is licensed per connection point. DVR HLI A DVR HLI (High Level Interface) license enables bi-directional communication between Protege GX and an NVR or DVR platform. Note that this is separate to the live and archived video display which is covered with a camera license.
Protege GX SDK An SDK license allows programmers to interface with Protege GX: Receive status updates Control devices Add users and assign access levels This feature is licensed once. Time and Attendance This feature provides the ability to report on employee attendance, including early or late arrivals, early or late departures, exceeded break times, and total hours worked. This feature is licensed once. You can use a single or multiple readers for logging staff movement.
Server License The Protege GX license is bound to the server. Each time a license request is generated, it takes a complete hardware profile of the server. Any significant change in the hardware profile requires a new license activation. System specifications must be met, and may be checked when your server is licensed. If using Protege GX in a virtual environment (such as VMWare), the MAC address of the virtual machine must be fixed otherwise your hardware profile will keep changing.
Licensing Process: Manual If you do not have internet access you will need to manually license your server. 1. Open the Protege GX application and go to the License Update tab (About > License > License Update) 2. Click Generate License. You will be prompted to save a license request file 3. Take this license request file to a PC with internet access 4. Open a web browser to http://www.incontrol.co.nz/license/ or browse to Support > Software Registration > GX Registration Form from the ICT website 5.
Software Maintenance Agreements (SMAs) At ICT, we take improving and maintaining our software very seriously. A Software Maintenance Agreement (SMA) is designed to provide the best support possible on all our products. Why Maintaining an SMA is Important A Software Maintenance Agreement is an agreement between ICT and the end user and must be purchased through an ICT approved integrator.
Example SMA Calculation After Expiry Scenario: Software was purchased in January of 2010, including SMA which expired in February of 2011. It is now July 2012.
Review Questions What is the license cap for doors? 250 500 1000 Doors are unlimited What is the maximum number of Controller licenses you will ever pay for? 250 500 1000 Controllers are unlimited What happens when the number of cameras reach 250? No more cameras can be added, the cap has been reached Cameras are now unlimited Nothing, the camera cap is 500 No difference, cameras are not limited anyway How many camera licenses are included in the base license? None 5 10 Ca
How many operators can log in at the same time with a base license? As many as you like, operators are unlimited 1 As many as you like, users are unlimited 10 To connect 20 PTZ cameras and have them respond to events automatically, what would be required? 10 camera licenses and a DVR HLI license 10 camera licenses, DVRs are unlimited A base license, 10 camera licenses and a DVR HLI license A base license, 20 camera licenses and a DVR HLI license Which licensed feature(s) are required in ord
Which of the following circumstances would NOT require a license update? Restoring an old Protege GX database Adding 150 door licenses Replacing the server motherboard Upgrading Windows on the server Do you need to have Internet access to update your license? No, you can do a manual license update Yes, the automatic license update connects to the ICT licensing server via the internet Yes, even with a manual license update, you will need internet access somewhere to upload the license request
Module 123: Protege GX System Architecture Before looking at the hardware or software, it is important to have a good understanding of how the overall system fits together. This module provides an overview of the Protege GX system and its architecture. In This Module The Protege GX Server .................................................................................................................. 36 Protege GX Client Software.............................................................................
The Protege GX Server Protege GX is built around a central server and one or more Protege GX Controllers. The Server is responsible for maintaining the system configuration and monitoring, while Controllers are responsible for the physical control and operation of the system. Network Connectivity While the controllers are designed to run standalone, network connectivity is required between the central server and the controller(s) to enable configuration and monitoring of the system.
Protege GX Client Software The client software is used for the configuration and monitoring of the Protege GX system. The client communicates with the Server using TCP/IP. The client software only ever communicates with the Server, never directly with the Controller(s). Configuration Changes For configuration changes, the client software makes changes to the Protege GX database.
Network Architecture The Protege GX Server uses TCP/IP on an Ethernet network to communicate with Protege GX Controllers. The Server sends configuration changes, control commands, status requests and firmware updates to the Controllers LAN The Server receives events and status updates from the Controllers. Scalability The Protege GX system was built with scalability in mind and is suitable for single controller sites right through to enterprise scale systems that span large geographical areas.
Large Sites / Multiple Controllers For larger sites with multiple controllers, a more powerful server is required. In this example, the server resides on a high spec PC, and the client software is installed on separate desktop PCs. LAN Always consult the system requirements in your installation guide prior to specifying your system. Enterprise Level Solutions The Protege GX system is also designed to cater for the needs of corporate clients and scales well to enterprise class solutions.
Remote Environments With IP technology constantly improving and internet coverage spreading further and further every day, thinking outside the box cannot only solve some tricky problems, but can open up a multitude of business opportunities. ADSL LAN LAN WWW WiFi GPRS Consider the example above showing Controllers connecting to a central server using an ADSL internet connection, WiFi access points and GPRS across a cellular network.
Advantages of a Server Based System Protege GX was designed to be easy to operate, simple to integrate, and effortless to extend. It is a server based system, and as such, is not designed to be run on a technician's laptop. The following outlines the reasons why... Simplicity To keep the system simple and manageable for the end user, much of the hardware is hidden. When making configuration changes, you are making changes to the system rather than to a specific Controller.
Protege GX and Small Sites For some smaller sites, budget restricts the practicality of having a dedicated server on site. In this situation it is easy to jump to the conclusion that Protege GX is not suitable. This is not the case. It just needs a shift in thinking, and can actually present a new business opportunity. Central Configuration The majority of businesses these days have an internet connection. Where there is an internet connection, there is the ability to connect controllers to a server.
Review Questions Which database are events stored in? On the Controller only. The server interrogates the Controller for reports. The Protege GX database located on the Server.
What does the GX Client software communicate with? The server only The server for system configuration and reports, and the controller for status updates The controller for configuration and reports, and the server for status updates None of the above Which of the following statements is correct? Controllers can communicate with the GX Server using the Internet Controllers must be on the same local area network as the GX Server Controllers must be on the same corporate network as the GX Serv
Complete this statement... Where budget constraints on a small single Controller site mean an onsite server can't be justified... ...Protege GX is not a suitable solution ...the GX Controller should be programmed using a technicians laptop ...connect the Controller to a shared server using the Internet ...
Module 124: Protege GX Hardware Overview Protege GX is an enterprise level product with leading edge hardware and software to provide a solution for security, access control, and building automation. This module provides an overview of the hardware available and the features included. In This Module The Protege DIN Rail Range........................................................................................................... 48 The Protege PCB Range ...................................................
The Protege DIN Rail Range The Protege DIN Rail range provides extensive hardware advancements and flexible access control, area control and alarm monitoring. Designed with an industry standard DIN Rail mount enclosure, the modules allow for seamless integration into large scale installations alongside high end HVAC and electrical switchboard components. The DIN enclosures also provide more durability and protect the circuitry from damage.
8 Onboard Inputs Use for access control, detection devices such as PIRs, or a mixture of both Most common EOL combinations supported (no need to change resistors when upgrading) Monitor more inputs by adding input expanders (500+ inputs supported) 7 Onboard Outputs One 12VDC 1.
Protege DIN Rail 16 Zone Input Expander (PRT-ZX16-DIN) The Protege DIN Rail 16 Zone Input Expander extends the number of inputs on a system by 16, enabling monitoring of a wide range of EOL capable or open contact sensors for security and building automation purposes Feature Highlights: 16 inputs, each can be assigned to up to 4 areas in the system and processed using different options or features Connect any combination of normally closed or normally open zones, configurable per zone input Util
Protege DIN Rail 8 PGM Output Expander (PRT-PX8-DIN) The Protege DIN Rail 8 PGM Output Expander extends the number of outputs on a system by 8, featuring high current Form-C relays providing flexible and structured control of lighting and automation systems. Feature Highlights: 8 Form-C relay outputs capable of switching resistive loads up to 7 Amps Ideal for connection in an electrical switch room to control signage, lighting and building automation.
Protege DIN Rail Mini 2 Reader Expander (PRT-RDM2-DIN) The Protege DIN Rail Mini 2 Reader Expander extends the number of card reader inputs on a system by 2 (4 when using Multiple Reader mode), the number of inputs by 6, and the number of outputs by 8, providing flexible access control, area control and alarm monitoring.
Protege DIN Rail Intelligent Power Supply (PRT-PSU-DIN) The Protege DIN Rail Intelligent Power Supply provides 12VDC power, ideal for running security, access control or automation devices, along with large numbers of Protege network powered modules within the same installation. Feature Highlights: Mains input ideal for reducing complexity in set up and easy deployment 12VDC output voltage and up to 4.
The Protege PCB Range The Controller ...is the central processing unit responsible for the control of security, access control and automation in the Protege integrated system.
Integrated Access Control The Controller provides a highly sophisticated access control solution with large user capacity and extensive features: Utilize primary and secondary access levels to manage users over simple scheduled periods and time zones Assign Door groups, Menu groups, Area groups, Floor groups and Elevator groups to an access level for flexible user management. Each group can optionally access a secondary group to provide multiple levels of user access.
Connectivity and System Expansion Onboard local zone (input) and PGM (output) allows convenient cost effective expansion without the increased cost of modules for simple system functions: 16 onboard zone inputs can each be programmed to require EOL (End Of Line), Dual EOL or direct contact 2 Bell/Siren Outputs with fully monitored operation Use the Protege Alphanumeric LCD Keypad to expand the number of LCD keypads within an installation Zone expansion is provided on nearly all modules as pa
Upgradable Firmware Utilizing the latest flash technology and high performance communication interface the firmware can be updated using industry standard applications. Electronic Bell/Siren Outputs High current electronic monitored Bell/Siren control outputs: Indication of Bell/Siren outputs activation using LED. Bell/Siren failure monitoring or lock disconnected (tamper) displayed as indicator and reported using trouble zone Automatic shutdown on bell over current when activated or shorted.
PRT-CTRL-GX: System Capacities System Capacities Fixed Profile Users 5000 Events 2000 Schedules 128 Doors 64 Inputs 912 Outputs 676 Zone (Input) Expanders 32 PGM (Output) Expanders 8 Analog Expanders 8 Keypad Modules 32 Reader Expanders 32 Maximum Controllers per Enclosure Medium Large Fatboy Jumbo - 1 2 4 Requires 1 16VAC, 40VA 16 Transformer (TFR-40-16) 58 Module 124: Protege GX Hardware Overview | The Protege PCB Range
Input (Zone) Expanders Protege 16 Zone Input Expander (PRT-ZX16) The Protege 16 Zone Input Expander provides the interface of up to 16 zone inputs, 2 bell/siren device outputs and 2 programmable outputs to the Protege system Technical Specifications Operating Current: 97mA (143mA max) AC Input: 16VAC, 40VA DC Output (AUX): 1.2A Fused & Monitored PSU: Local monitored PSU with battery backup Inputs: 16 4 state, EOL configurable. Outputs: 2 High current (1.
Protege Standard 16 Zone Input Expander (PRT-ZXS16) The Protege Standard 16 Zone Input Expander provides the interface of up to 16 zone inputs and 1 programmable output to the Protege system. Technical Specifications Operating Current: 47mA Inputs: 16 4 state, EOL configurable.
Output (PGM) Expanders Protege 16 PGM Output Expander (PRT-PX16) The Protege 16 PGM Output Expander provides the control of 16 high current FORM C relay outputs or 16 elevator floors (connected with a Protege Intelligent 2 Reader Expander) from the Protege system.
Protege Standard 16 PGM Output Expander (PRT-PXS16) The Protege Standard 16 PGM Output Expander provides the control of 16 low current open collector outputs from the Protege system.
Reader Expanders Feature Highlights Connect 2 readers using the independent reader inputs or use the 2 reader operation to connect 4 readers providing dual entry and exit door connection. Provision to control up to 3 Outputs per reader input with predefined configurations for instant connection (red LED, green LED and buzzer control). Support for intelligent reader tamper operation the system will monitor the reader for reader keep-alive transmissions using the programmed protocol.
Multiplex Reader Mode Pushing the boundaries of functionality, ICT have taken another step in providing the capability to connect up to 4 readers on to ANY of the reader expanders with the multiplex reader mode: Allows the addition of an EXIT reader on to any existing entry with REX egress configuration Identifies the entity with the associated EXIT and ENTRY events No limitations are made on the operation allowing user counting, car park counting, loiter operation, credential anti-pass back and
Arming/Disarming The Reader Expander allows a user to arm and disarm an area from a reader input when associated with a door: Deny access to a user based on the status of the area reducing false alarms Dual presentation of the card can arm an area associated with the entry or exit direction of the door being accessed Fail to arm programmable output can be programmed to provide feedback in the event areas fail to arm when using card reading functions Prevent access to a keypad using a card an
Electronic Lock Outputs (RDS2, RDI2, RDE2) High current electronic monitored electric lock control Outputs: Indication of lock output activation using LED Lock failure monitoring or lock disconnected (tamper) displayed as indicator and reported using trouble zone Automatic shutdown on lock over current when activated or shorted with automatic restore on next deactivation/activation cycle. Shutdown reported using trouble zone.
Protege Mini 2 Reader Expander (PRT-RDM2) The RDM2 is a small and cost effective module for controlling up to 2 doors. Mounted in a medium cabinet, this module has a very small footprint, or mount up to 8 modules in a jumbo cabinet to control up to 16 doors. Technical Specifications: Operating Current: 83mA (109mA max) Doors: 2 doors, up to 4 readers in multiplex mode Inputs: 6 4 state, EOL configurable.
Protege Standard 2 Reader Expander (PRT-RDS2) The RDS2 has all the same functionality as the RDM2, but including a local power supply and battery backup, 2 additional zone inputs and 2 fixed voltage, high current monitored lock outputs. Power locks directly from the module, or use the onboard Form C relays to switch an external power supply. Technical Specifications: Operating Current: 119mA (207mA max all relays activated) AC Input: 16VAC, 40VA DC Output (Aux): 1.
Protege Intelligent 2 Reader Expander (PRT-RDI2) In addition to the features of the RDS2, the RDI2 also has the ability to run standalone in offline mode with 2000 users, 2000 events, and schedules stored locally, enabling the RDI2 to continue to operate seamlessly should there be a loss of RS-485 communications. Technical Specifications: Operating Current: 119mA (207mA max all relays activated) AC Input: 16VAC, 40VA DC Output (Aux): 1.
Protege Ethernet 2 Reader Expander (PRT-RDE2) The RDE2 has all of the intelligence of the RDI2, but with an onboard Ethernet interface. It can be plugged virtually anywhere on the network allowing the use of existing network infrastructure. The RS-485 ports can then be used to extend the network in four directions for elevator control or 3rd party system integrations. Technical Specifications: Operating Current: 119mA (207mA max all relays activated) AC Input: 16VAC, 40VA DC Output (Aux): 1.
Reader Expander Comparison Feature PRT-RDM2 PRT-RDS2 12VDC 16VAC 16VAC 16VAC Battery Backup - Yes Yes Yes AUX PSU - 1A 1A 1A 2 Relay 2 Electronic 2 Electronic 2 Electronic - Yes Yes Yes Offline Users 10 10 2000 2000 Reader Ports 2 2 2 2 Yes Yes Yes Yes Isolated RS485 Ports - 1 2 2 Non-Isolated RS485 Ports 1 - - - Ethernet - - - Yes Power Supply Lock Outputs Lock Monitoring Multiplexed (4) Readers PRT-RDI2 PRT-RDE2 Power Supply Protege Intelligent 5
Intelligent Power Monitoring The Protege Intelligent 5 Amp Power Supply is able to relay information about critical system voltages and currents to the Protege Integrated System Controller by registering as an analog expander module on the Protege network. The Protege Controller can then store these values in system registers that can be viewed live from the Protege software. This allows live viewing of the system voltages and currents along with logging for review at any time.
The Protege GX Module Network The Protege system utilizes a RS-485 four-wire powered module network in a multi-drop daisy-chain configuration Level One: Protege GX Installer Study Guide | August 2013 73
System Architecture Systems can be made up of a single Controller with multiple expanders connected by the RS-485 Module Network LAN PRT-CTRL-DIN PRT-RDM2-DIN PRT-RDM2-DIN PRT-RDM2-DIN PRT-RDM2-DIN PRT-RDM2-DIN PRT-PSU-DIN PRT-PSU-DIN PRT-PSU-DIN PRT-PSU-DIN PRT-PSU-DIN PRT-PSU-DIN Cabinet 1 Cabinet 2 Cabinet 3 Systems can also be made up of multiple Controllers with multiple expanders, with the Controllers connecting to the Server via Ethernet (Ethernet standards apply) LAN PRT-CTRL-DIN
Communications System controllers communicate with the Protege Server using TCP/IP LAN Protege modules communicate to the controller using an encrypted high speed module network or via TCP/IP PRT-TLCD PRT-CTRL-DIN TCP/IP Ethernet Connection Encrypted RS485 Module Network PRT-ZX16-DIN PRT-PX8-DIN PRT-ZX16-DIN Level One: Protege GX Installer Study Guide | August 2013 75
Module Wiring The RS-485 module network must be wired in a daisy chain configuration Star or Spur wiring is not an acceptable method for new installations PRT-CTRL-DIN PRT-C -CT -C CT C TRLLD DIN IN N PRT-RDM2-DIN PRT-RDM2-DIN PRT-ZX16-DIN PRT-ZX16-DIN Cabling The RS-485 module network must be wired in a daisy chain configuration. Belden 9842 RS-485 cable is recommended Total length of the module network should not exceed 900 metres (2952 feet).
Module Network Power The DIN Rail range is supplied by a 12V DC power supply connected to the Module Network. We recommend using an ICT PRT-PSU-DIN however any clean 12V DC supply is suitable.
All ancillary devices connected to a module network powered device, such as keypads, readers or PIRs also draw their power from the module network. You must include all connected devices when considering power supply loading calculations. PRT-CTRL-DIN PRT-PSU-DIN Module Network Isolated Devices The Protege suite of hardware is made up of a number of devices where the Module Network is optically isolated from the rest of the device.
This is usually from a dedicated power supply, but in small installations can be powered by a module with an onboard supply, such as the Controller. Note: In this scenario, 12VDC must be wired from the module's 12V Auxiliary supply to the module network 12V terminals. This must only be done on one module on the network.
Expanding the Module Network Expansion of the Module Network can be done using the PRT-RDI2 module. This uses a secondary communications port which is isolated to allow a stub or spur network to be created. Primary Module Network PRT-PSU-5I PRT-CTRL-SE PRT-RDS2-PCB PRT-RDS2-PCB PRT-RDI2-PCB PRT-PX16-PCB PRT-PX16-PCB PRT-RDS2-PCB PRT-ZX16-PCB PRT-ZX16-PCB Secondary Module Network The same rules apply to the stub or spur network as the main network connections.
Use secondary module networks where daisy chain wiring is not practical Primary Module Network PRT-PSU-5I PRT-CTRL-SE PRT-RDS2-PCB PRT-RDI2-PCB PRT-RDS2-PCB PRT-RDI2-PCB PRT-RDS2-PCB PRT-RDS2-PCB PRT-RDS2-PCB RDE2 expanders use Ethernet to communicate with the controller providing another way to expand the Module Network PRT-PSU-5I PRT-RDE2-PCB PRT-PSU-5I PRT-PX16-PCB PRT-PX16-PCB PRT-CTRL-SE PRT-RDE2-PCB PRT-PSU-5I PRT-ZX16-PCB PRT-ZX16-PCB PRT-ZX16-PCB A biasing adapter must be install
Proximity Readers Wiegand Interface ICT offers a range of Proximity Readers and Reader Expander modules. A standard Wiegand interface means that ICT Readers can be used on any system that supports standard Wiegand readers. It also means that we support 3rd party standard Wiegand readers.
Comparison The Nano Prox reader is small, unobtrusive and cost effective The Vario boasts an extended read range of up to 150mm with clamshell cards The Multi Prox includes a PIN pad allowing multiple authentication combinations using card and/or PIN 13.
Reader Technology Comparison Mifare Desfire EV1 Secure card format ON card data storage Open architecture platform Cost effective Extended read range Reads common cards 84 125KHz Module 124: Protege GX Hardware Overview | Proximity Readers
Keypads Protege Alphanumeric LCD Keypad (PRT-KLCD) The Protege Alphanumeric LCD Keypad provides a user friendly human interface to the Protege integrated access control, security and building automation system.
Auto Logout Confirmation The Protege Alphanumeric LCD Keypad can be programmed for a custom auto logout time specific to each station.
Protege Control Operating in the Protege Control mode the Protege Eclipse LED Keypad provides a complete standalone 4 zone, 8 user local alarm system: Operates autonomously when communication fails without the need for a Protege Integrated System Controller Locally program siren, entry and exit delay timers and configure the operation of up to 8 users with arming and disarming options 4 zones (zone duplex) for delay, instant, follow, fire, fire delay and 24 hour operation Configuration and a
Networking Capabilities The 10/100 Ethernet network connection is completely configurable via the onboard setup menu or the touchscreen builder software. Protege Control Use the Protege Touchscreen Keypad to create custom menus and displays that allow control and viewing of any inputs and outputs in the Protege System.
Temperature and Humidity Sensors Protege Temperature and Humidity Sensor (PRT-ATH1) The Protege Temperature and Humidity Sensor is designed to measure temperature and humidity. It can operate in standalone mode or can be connected to the Protege system. Technical Specifications: Operating Current: 20mA (typical) Inputs: 1 module tamper Outputs: 2 relay outputs (100mA max), 2 programmable LEDs Comms: 1 non-isolated RS-485 port Note: The ATH1 draws its power from the RS-485 Module Network.
Enclosures Throughout the training so far, you will have seen how many of each module fits into our cabinets. Now we will have a look at the cabinets and see how they fit together.
Elevator Control Interfacing with elevator controllers to achieve access control to floors can be done either high level or low level. Configuration of elevator control is not covered in this module which simply aims to advise what equipment is required to achieve low level elevator floor control. Low level elevator control is achieved by controlling the user's ability to select floors in the elevator car.
Example: Single Car System To control a single elevator with 1 to 16 controlled floors and no Destination Reporting, you would need: 1 System Controller 1 PRT-RDI2 or PRT-RDE2 1 PRT-PX16 1 Card Reader PRT-PX16-PCB PRT-CTRL-DIN PRT-RDI2-PCB Primary RS-485 Network Secondary RD-485 Network Wiegand Connection 92 Module 124: Protege GX Hardware Overview | Elevator Control
Example: Three Cars with Different Floor Ranges Now let's look at an example where there are two lifts covering from Ground to Level 24, and a goods lift covering the Basement to Level 24. The end user would also like Destination Reporting.
Review Questions How many access controlled doors can be directly connected to the DIN Rail Controller? 0 1 2 4 How many onboard high current relay outputs does the DIN Controller have? 2 4 7 500+ How many onboard inputs does the RDM2-DIN Reader Expander have? 7 6 8 4 If installing a system with two doors (both with readers for entry and exit), how many Reader Expanders are required? Two. Each Reader Expander has two reader ports onboard. One.
How many onboard reader ports does the PCB Controller have? 0 1 2 4 How many onboard readers does the PCB Controller support? 0 1 2 4 What's the most RDM2-PCBs you can fit in a Jumbo Cabinet? 1 2 4 8 What is the maximum distance that the Protege Module Network may be run? 100m 900m 1200m 1500m A project requires a run of 300m (1000ft) between the Controller and the nearest Ethernet switch.
In a new installation, how many spurs can come off a Controller on the RS-485 module network? 3 4 250 None - star or spur wiring is not an acceptable method for new installations Can multiple power supplies be connected to the Protege Module Network? No, the Module Network must only be powered at one location Yes, as long as the N+ connection is removed between the split sections Yes, as long as they are all in the same cabinet Yes, as long as they are all in different cabinets If a door nee
How many onboard controllable outputs does the PRT-KLCD have? None 1 low current output 1 low current output and two controllable LEDs 1 low current output, two controllable LEDs and a controllable buzzer How many inputs does a PRT-KLCD keypad have onboard? None 1 input (2 using zone duplex) 2 inputs (4 using zone duplex) 4 inputs (8 using zone duplex) What is the ATH1 module used for? Arming and disarming areas To measure temperature and humidity Reading smart cards Programming s
With a single car elevator system configured as shown, what is the maximum number of floors that could be controlled? PRT-PX16-PCB PRT-CTRL-DIN PRT-RDI2-PCB Primary RS-485 Network Secondary RD-485 Network Wiegand Connection 8 16 128 Unlimited 98 Module 124: Protege GX Hardware Overview | Review Questions
In addition to basic access control, what optional feature is also shown in this scenario, and what is it for? Goods Lift Floors B, 1-15 PRT-PX16-PCB PRT-CTRL-DIN PRT-PX16-DRI PRT-RDI2-PCB Goods Lift Floors 16-24 PRT-PX16-PCB PRT-PX16-DRI Lift 1 Floors 1-16 PRT-PX16-PCB PRT-PX16-DRI PRT-RDI2-PCB Lift 2 Floors 1-16 PRT-PX16-PCB PRT-PX16-DRI Lift 1, Floors 17-24 Lift 2, Floors 17-24 PRT-PX16-PCB Goods Lift Lift 1 Lift 2 PRT-PX16-DRI Primary Network Secondary Network Wiegand Connection Direct
Module 126: Limitations of SE Hardware in Protege GX ICT strive to maintain backwards compatibility on software and hardware wherever possible to enable clients to access the latest features and technology without having to upgrade their entire system. With the exception of Controllers, all ICT hardware (both DIN-Rail and PCB) is compatible on both Protege SE and GX systems. This module outlines the limitations that apply. In This Module System Controller Compatibility .....................................
System Controller Compatibility To take full advantage of the Protege GX capabilities, the PRT-CTRL-DIN is required. All System Controllers apart from the PRT-CTRL-LE are compatible with Protege GX however there are some restrictions. The PRT-CTRL-SE and PRT-SE-RACK both require a firmware upgrade in order to work with GX systems. The PRT-CTRL-GX, PRT-CTRL-SE and PRT-SE-RACK are all subject to certain limitations when running on the GX system.
Memory Limitations The newer DIN Rail controller has a much larger storage capacity and a more powerful processor, enabling us to change the way we store and look up information. Because of the smaller storage and lower processing power, the PCB Controllers (PRT-CTRL-GX, PRT-CTRL-SE, and PRT-SE-RACK) have certain limitations imposed when running on a GX system. PCB Controllers require a fixed structure in the database to ensure efficiency.
Controller Comparison Records PCB Controller running GX Firmware Protege GX DIN Rail Controller Cards per user 2 8 Access Levels per user 4 32 Doors in Access Levels Not supported 16 Door Groups in Access Levels 1 per controller 8 Floors in Access Levels Not supported 16 Elevator Groups in Access Levels 1 per controller 8 Floor Groups in Access Levels 1 per controller 8 PGM Groups in Access Levels 1 per controller 1 Menu Groups in Access Levels 1 per controller 1 Arming Area Gr
Feature Limitations The other issue affecting compatibility relates to physical hardware restrictions. New features sometimes require a physical change to the hardware as well as changes to software and firmware. You should always check the hardware release notes to ensure that the hardware version you have will support the feature. An example of this is where Access Levels allow you to add individual Doors or Floors.
Review Questions Can an RDM2-PCB Reader Expander be connected to a DIN Controller on a GX System? Yes, it is fully supported No, it is only compatible with a PCB Controller Yes, but it requires a firmware upgrade No, it is only compatible with SE systems When running GX with a PCB Controller, what greeting would 'Gordon Groves' see at a keypad if he was user number 4999? Good Morning User 4999 Good Morning Gordon Groves Nothing, only 2000 users are supported by the PCB Controller on GX Pro
Module 127: Protege DIN Rail Hardware Configuration This module outlines the requirements for setting up and configuring DIN Rail hardware. In This Module DIN Rail Hardware Setup ............................................................................................................. 108 LED Indicators ............................................................................................................................. 123 Review Questions ........................................................
DIN Rail Hardware Setup The Protege System is an advanced technology security system designed to provide integration with building automation, apartment complex control and HVAC in one flexible package. Communication is over a proprietary high speed protocol across an AES encrypted local area network and an encrypted proprietary RS-485 module network.
Cabinet Tamper Switch The PSU-DIN includes an onboard enclosure tamper input. This tamper input signals to the monitoring station or remote computer that the enclosure has been opened. The tamper input switch should be mounted into the steel bracket provided and connected to the tamper connection terminal and the V- terminal as shown below.
When a PSU-DIN is dedicated to module network power, both outputs can be wired in parallel. In this configuration, a maximum module network load of 4A can be supplied. This includes all expanders and connected ancillary devices such as readers and PIRs.
Each section of the Module Network must be supplied from only one point. Connections from more than one 12V supply may cause failure or damage to the units supplying power. PRT-CTRL-DIN Network Module N+ N+ N- NA NB N- NA Network Module NB N+ PRT-PSU-DIN or equivalent 12V DC supply N- NA NB PRT-PSU-DIN or equivalent 12V DC supply In larger installations, the Module Network power supply may need to be split to allow for load sharing between several supplies.
Encrypted Module Network The Protege system incorporates encrypted RS-485 communications technology. Always connect the NA and NB terminals of the controller to the NA and NB terminals of the expansion devices and keypads. The N+ and N- must connect to a 12V power supply source capable of supplying the peak current drawn by all modules. If a shielded cable is used, the shield must be connected at only one end of the cable. DO NOT connect a shield at both ends.
Card Reader Connection Both the Protege DIN Rail Controller and RDM2 provide access control functionality allowing the connection of 2 Wiegand devices to control 2 doors (entry or exit only) or they can be configured in multiplex mode to allow 4 Wiegand devices controlling 2 doors giving the flexibility of entry and exit readers without the need for additional hardware.
When operating in multiple reader mode, the Controller or RDM2 allows the connection of 4 Wiegand reading devices controlling two doors each with entry/exit readers. The secondary reader will have all connections wired to the same port as the primary card reader with the DATA 1 connection wired to the opposite reader connection DATA 1 input.
Input Connection The Protege DIN Rail Controller and RDM2 both allow the connection of up to 4 contacts for monitoring and controlling access control doors. Each input on the Controller can be used for the door function that is automatically assigned and as a normal input on the system. The following example shows the connection of a normally closed door position monitoring contact to monitor the Open, Closed, Forced and Alarm conditions of the door. N.C.
Lock Connection The DIN Rail Controller provides a connection for an electric strike lock with full monitoring of the lock circuit for tamper and over current/fuse blown conditions. The door lock monitoring can be disabled if it is not required. + B+ 1N4007 Diode BCOM NO COM NO 12VDC Electric Locking Device The lock output is shared with the bell/siren function. You can select another output for the lock control if the bell/siren function is required.
Electromagnetic spikes can affect normal system operation and in some cases, damage hardware. You must use a diode every time a coil, lock, or relay, is controlled. Waveform with a diode Waveform without a diode When the lock is de-energized from 24VDC, the diode absorbs the "Inductive-Kick". All the energy that the locks coil has to "free" is absorbed by the diode. When the lock is de-energized from 24VDC, there is no diode to absorb all the energy that the coil has accumulated.
Inputs The PRT-ZX16-DIN has 16 inputs that it monitors the state of using EOL monitored or dry contact devices such as magnetic switches, PIR motion detectors and temperature thermostats. It also monitors up to 16 trouble inputs used to report trouble conditions such as module communication problems. The DIN Rail Controller has 8 onboard inputs and monitors up to 64 trouble inputs.
When using the EOL resistor configuration, the EOL resistor option must be configured based on the site requirements. Note these resistor options are supported on the PRT-CTRL-DIN Controller but not all resistor options are supported on all Protege field modules.
Outputs The Controller has 7 onboard outputs. Outputs are used to activate sirens, bells, warning devices, control lighting and doors. The first output on the Controller has a special hardware design that allows it to monitor for fault conditions and is ideally suited to driving sirens or warning devices. The + and - terminals of the Bell output (CP001:01) are used to power bells, sirens or any devices that require a steady voltage output.
If readers are not attached to the reader ports then the Reader 1 L1 and BZ, and the Reader 2 L1 and BZ outputs can be used as general purpose outputs. These can be controlled by assigning the RDxxxGreen R1, RDxxx Beeper R1, RDxxxGreen R2 and RDxxx Beeper R2 outputs of whichever reader module has been configured as the onboard reader module. These are open drain outputs which switch to the V- reference.
Telephone Dialer The Protege DIN Rail Controller provides the ability to communicate alarms and upload information to remote systems using the onboard 2400bps modem. The telephone line can be connected directly to the Controller using the onboard telephone connection terminals.
LED Indicators All Protege DIN Rail hardware includes comprehensive front panel diagnostic indicators that can aid the installer in diagnosing faults and conditions. In some cases an indicator may have multiple meanings depending on the status indicator display at the time. Status Indicator The Status indicator displays module status of the module.
Error Code Display The following table is only valid if the FAULT indicator is CONSTANTLY ON and the STATUS indicator is FLASHING RED. If the fault indicator is FLASHING the module requires a firmware update or is currently in firmware update mode. The status indicator will FLASH RED with the error code number. The error code number is shown with a 250ms ON and OFF period (duty cycle) with a delay of 1.5 seconds between each display cycle.
Relay Indicators The Relay 1 and Relay 2 indicators show the status of the lock output relay. State Description On (red) Relay output is ON Off Relay output is OFF Zone (Input) Indicators Whenever an input on the Controller is programmed with an input type and area, the input status is displayed on the front panel (indicators 1-8) corresponding to the physical input number (Z1-Z8).
Battery Indicator The Battery indicator will show the status of the backup battery. State Description Continuous flash (red) Backup battery is disconnected Constantly on (red) Backup battery failed its dynamic battery test Constantly on (green) Last backup battery dynamic test successful Temp Indicator The Temp indicator will show the status of the unit's core temperature. State Description Constantly on (red) Core temperature exceeded.
Output Current Indicator The Output Current indicator will show the status of the output current for both V1+ and V2+. State Description Constantly on Output current exceeded.
Modem Indicator The Modem indicator shows the status of the onboard modem. State Description On (green) Modem has control of telephone line Off Modem is not active Bell Indicator The Bell indicator shows the status of the bell output and the over current or circuit fault conditions.
Review Questions In the configuration shown, what is the maximum continuous load that can be drawn by the module network? PRT-CTRL-DIN N+ N- NA PRT-PSU-DIN NB V2+ V2+ V2+ V2+ V2+ V2+ To other modules on network N+ N- NA NB V- V- V- V- V- V- V1+ V1+ V1+ V1+ V1+ V1+ V- V- B- B+ V- V- L Gel Cell Backup Battery V- V- N Mains Input + 4 Amps 10 Amps 3.
Where does the shield of the cable connected to a reader get connected? Frame grounded at one point. Connected to the reader shield. Wired to V- at the Reader Expander. Connected to the reader shield. Card reader cable is not shielded. Frame grounded at one point. Not connected to the reader shield. Is the wiring method shown in this diagram acceptable? Assume the power supplies indicated in the diagram shown are DIN Rail PSU's.
The Bell indicator on a DIN Controller is flashing two green flashes. What does this mean? The Bell output is off. The circuit to the bell is ok. The Bell output is off. The circuit to the siren / bell is cut, damaged or tampered. The Bell output is on. The circuit to the bell is ok. The Bell output is on. The circuit is in over current protection.
Module 130: Protege GX Hardware Setup This module outlines the requirements for setting up and bringing a Controller online. In This Module DIN Rail Controller Setup ............................................................................................................. 134 PCB Controller Setup ................................................................................................................... 137 Keypad Configuration .....................................................................
DIN Rail Controller Setup To bring a DIN Rail Controller online with your Protege GX Server, the appropriate IP address, subnet mask and gateway (if applicable) must be assigned. The DIN Rail Controller has a factory default IP address of 192.168.1.2 and this should be changed to suit the IP addressing scheme of your site. The IP address can be changed using the built in web interface, or from a keypad.
Assigning the IP Address from a Keypad If the current IP address of the Controller is not known, it can be viewed and/or changed using a PRT-KLCD keypad. 1. Connect the keypad to the module network. 2. Log in to the keypad using any valid Installer code. The default Installer code is 000000. If the default code has been overridden and you do not know the new codes, you will need to force the Controller into its default state.
Setting the Controller to use a Known IP Address If the current IP address is not known, it can be temporarily defaulted to 192.168.111.222. This resets the IP address for as long as power is applied but will not save the change permanently. Once the link is removed and power is cycled to the unit, the previously configured IP address is used again. This means that if the currently configured IP address is unknown, you are able to connect to the web interface to view and/or change it. 1.
PCB Controller Setup To get a PCB Controller online with your Protege GX Server, there are a number of things that need to be set up. Firstly, the Controller needs to have an appropriate IP address, subnet mask and gateway (if applicable) assigned. The PCB Controller has a factory default IP address of 192.168.1.2 and this should be changed to suit the IP addressing scheme of your site. The IP address can be changed using the keypad, or using Telnet.
6. Go back to the View/Edit IP menu by pressing [ENTER] or [1]. Press the [UP] key to change the subnet mask (if required). Net Mask 255.255.255.000 By default, the PCB Controller comes with a 24 bit class C subnet mask already set. 7. Press the [UP] key again, to display the Gateway address. Gateway 192.168.001.001 This should be changed if your server is not on the same subnet, or if you are using an NTP server on another subnet,and should be set to the IP address of your network's router.
If Telnet is Not Recognized Telnet is included as a standard feature with Windows Vista and Windows 7, however the feature is not installed by default and must be enabled. If Telnet has not been enabled, you will receive an error: 'telnet' is not recognized as an internal or external command, operable program or batch file To Enable Telnet: 1. From the Windows Start Menu, select Control Panel >Programs > Turn Windows Features On or Off 2. This opens the Windows Features dialog.
Setting the Event Server IP Once the Controller IP address is set, the Event Server IP address must be set to tell the Controller which IP address to use to send messages to the Event Server. 1. Telnet back into your controller using your new IP address 2. Type D and press [Enter] 3. Type 1 to select the first address and press [Enter]. Type in the IP address of your GX Server and press [Enter] In most cases, you will only need to set the first IP address.
Keypad Configuration Accessing the Configuration Menu Before the Protege LCD Keypad module can communicate, it must be assigned an address. This, and other settings, are configured using the device configuration menu: 1. Apply power to the device and when the keypad version information is displayed, press the key followed by the X key 2. The configuration menu is displayed 3. Scroll the available options by pressing the item.
Displaying Keypad Version Information The version menu option displays the version and build information of the keypad. ICT Protege LCD Keypad Ver 1.44 142 Press the key to exit.
Review Questions How do you default a DIN Rail Controller? Use the web interface to connect to the Controller, then click on Restart Wire a link between D0 and L1 of reader port 2, then cycle power Turn on DIP switch 4, then cycle the power Log in at a keypad, then select [Menu] [4] [2] [2] [Enter] If the IP address of a DIN Rail Controller is unknown, how can you find it? Turn DIP switch 3 on, then cycle power to the Controller to temporarily set the IP address to 192.168.111.
How do you access Telnet for the first time on a Windows 7 PC? Start > Run, type CMD and press [Enter], then type telnet [Controller IP] 10001 Control Panel > Programs > Turn Windows Features On or Off then check (enable) Telnet Client Control Panel > Programs > Turn Windows Features On or Off then check (enable) Telnet Server Control Panel > Programs > Turn Windows Features On or Off then check (enable) Telnet Server and Telnet Client What is the default IP address of a PCB Controller? 192.
Module 125: Protege GX System Design A detailed system design put together up front will result in a much smoother and efficient installation and configuration process. This module outlines the requirements for designing a Protege GX system. In This Module Identifying Requirements .............................................................................................................. 146 Understanding Physical Design ....................................................................................
Identifying Requirements A well planned system design will result in a much smoother and efficient installation and configuration process. It is important to get as much information about what the end user is trying to achieve early on. Sit down with your end user or consultant and run through their requirements. Try to keep the design as simple as possible. Ask the questions that will give you all the information you need for your system design.
Determine User Requirements Next, we need to look at the people we are trying to manage. We need a list of these people, and we need to group them by function. For example, Managers, Office staff, Cleaners. This, along with the information we already have will allow us to create our Users and Access Levels. Determine Information Requirements Finally, the why part of the questioning relates to how the end user intends to extract information from the system once it is up and running.
Understanding Physical Design Cable Selection Perhaps one of the most important yet most commonly overlooked design considerations is the selection of the right cable types. While cost savings in materials can be made by selecting lower cost cables, the cost of troubleshooting and resolving issues that often arise from using such cable usually outweigh the benefits. CCA Cables While Copper Clad Aluminium cables are attractive from a cost point of view, there are a number of negative side effects.
Reader Cable Type Wiegand readers also rely on data transmission, and can therefore be affected by noise. Cat5e and Cat6 data cables were not designed to be used for wiegand readers. It is recommended that a cable specifically designed for Wiegand readers, such as Alpha 5388c is used. This is a Shielded, non twisted multicore cable. Reader Cable Distance The maximum distance between the reader and expander is 150m / 500ft if using an 0.8mm or 18AWG cable such as Alpha 5386c or 5388c. If using a 0.
Voltage Drop Calculation While it is recommended that voltage drop calculations are made with every system design, the following table offers a general guide. 0.2mm 0.5mm 0.6mm 0.
Lock Cable Distance Incorrect conductor sizing for lock power can lead to: Cable degradation Lock malfunction Decreased bond strength PSU overload PSU Expander 250m/820ft 2mm/14AWG Strike/dropbolt 30m/100ft 0.5mm/23AWG 130m/425ft 2mm/14AWG Mortice/single mag 15m/50ft 0.5mm/23AWG 65m/210ft 2mm/14AWG Double mag 10m/30ft 0.6mm/.23AWG Output Wiring If a Controller or expander loses power for any reason, all relays will return to their un-powered state.
Power Supply Design Any system is only as good as the power supply behind it. Wherever possible, the following should be adhered to: Module network power should be from a dedicated feed. Lock power should be separated from other devices. PSU average load should be kept below 75% of rated capacity. Batteries should always be connected to the PSU. Power supply loading calculations should always be carried out to ensure you have enough power to keep your system running under all conditions.
Offline Behavior Input Expanders When RS-485 communications are lost, input expanders continue to process the states of inputs, however it is the Controller that is responsible for carrying out any actions required such as triggering sirens or off site monitoring. Input expanders do not store events, so if an input opens and closes while the expander is offline, it will never be logged or actioned.
Any Card The Any card mode of offline operation should only be used for high volume internal low security doors. In this mode of operation, all card and / or PIN access attempts will be granted. All granted events, including REX events will generate the offline warning of four short beeps from any readers attached to the door. There are two important points to remember with this mode: 1. Any card that can be read by the reader will be granted access 2.
RDI2 & RDE2 The RDI2 and RDE2 reader expanders are intelligent reader expanders, and will continue to function as follows in offline mode: The first 2000 users in the controllers database are stored in the reader expander's offline database and will be granted access based on the their configured access levels. The last 2000 events will be stored while in offline mode and uploaded to the controller once online. Schedules will be followed while in offline mode.
Centrally Located Equipment Where cabinets are located together, and the RS-485 cable is well protected between them, this solution is also considered robust. PSU Controller ZX16 PX8 RDM2 RDM2 ZX16 PX8 Cable protected by conduit Centrally locating equipment and running cable out to field devices can often be a cost effective way of providing a robust solution. External RS-485 Cabling However, when the RS-485 Module Network leaves the cabinet, it is at risk of being damaged.
If the integrity of the RS-485 Module Network is critical, then an intelligent reader expander with an isolated secondary module network can be used. Cabinet PSU Controller ZX16 RDI2 Primary RS-485 Keypad Secondary RS-485 Now if the cable outside the cabinet gets cut, it will only affect the keypad. *Alternatively, a 3rd party RS-485 LAN isolator can be used. Utilizing Ethernet Another option for a robust system design is to use Ethernet.
Multiple Controllers Protege GX not only supports the connection of multiple Controllers, it was built around this scalability. Level 5 Level 4 Controller 2 LAN Level 3 Level 2 Level 1 Controller 1 Ground This provides even more options for designing a large, but robust solution.
Planning the Training System Our training scenarios are based on our fictitious client - ACME International. We will be installing an access control system in their Texas office. Training Scenario Acme have provided us with a basic building plan: Office Warehouse Manager Equipment room From this plan, we can easily identify 3 areas: 1. Office 2. Managers Office 3.
We have established that the manager will be allowed access to the entire building 24/7. The office staff will be allowed access to the Office from 9am to 5pm, Monday to Friday, and the Warehouse only when warehouse staff are present. There will be two shifts in the warehouse, one from 6am to 2pm and one from 10am to 6pm. There will also be a Warehouse Supervisor who will be allowed access to the warehouse through both shifts.
We also need to check that we have enough inputs for our system: Input Description CP1:1 Office Entry Door (Reed) CP1:2 Office Entry Door (REX) CP1:3 Office Entry Door (Bond) CP1:4 Office (PIR) CP1:5 Managers Office Door (Door) CP1:6 Managers Office Door (REX) CP1:7 Managers Office Door (Bond) CP1:8 Managers Office (PIR) RD1:1 Warehouse Roller Door (Reed) RD1:2 Warehouse (PIR) RD1:3 - RD1:4 - RD1:5 Office to Warehouse Door (Reed) RD1:6 - RD1:7 Office to Warehouse Door (Bond)
Review Questions Where should copper clad aluminium cables be used? For Reader connection For RS-485 Module Network connection CCA cables should be used wherever possible due to its higher attenuation The use of CCA cables should be avoided If the keypad cable was damaged, causing a short across all conductors, what would happen? Cabinet PSU Controller ZX16 RDI2 Primary RS-485 Keypad Secondary RS-485 The Keypad would stop functioning. The RDI2 would stop functioning.
What happens to...? A lighting circuit is connected to an output on a PX8-DIN module that is programmed to turn on at 8pm and off at 5am. The expander goes offline at 4am, then comes back online at 10am. What happens to the lights after the expander goes offline? The lights turn off at 5am. The lights turn off at 10am. The lights turn off at 4am. The lights turn off at 5am the following day. What happens when...
Module 128: Protege GX Software Installation This module outlines the requirements and procedure to install Protege GX. In This Module Protege GX System Requirements ............................................................................................... 166 Installation Procedure ................................................................................................................... 169 Review Questions .....................................................................................
Protege GX System Requirements Client/Server Architecture Protege GX uses a client/server architecture. Every installation includes a server which holds the main system database and the Protege services. In most cases it will also have the client software installed. The client application is then installed on additional (remote) workstations enabling multiple operators to access the system. These workstations connect to the database and services on the Protege GX Server.
Server Requirements: Multiple Controller Site A multiple controller installation consists of over 100 controllers operating as multiple sites, or a single site running multiple Controllers. Each controller may have any number of modules connected. The connection to the controllers may be over any variety of communication mediums and can communicate independently or on demand. For best performance, connect using an Ethernet 10/100Mbs connection or similar over a local LAN or WAN network.
SQL Server Editions Protege GX uses a non-proprietary open SQL database engine to store and share information. Protege GX is compatible with the following versions of Microsoft SQL Server in either Standard, Enterprise, or Express editions: SQL Server 2008 R2 (recommended) SQL Server 2008 SQL Server 2005 SQL Server Express is a scaled down, free edition of SQL Server that includes the core database engine and functionality.
Installation Procedure There are several steps required to install Protege GX: 1. Install Microsoft SQL Server the database system used to store all Protege GX configuration information and events. 2. Install the Protege GX Server Components on the server. This installs the database, services, and the client (unless deselected). 3. Install the Protege GX Client on the remote workstations. This installs the user interface that will be used by operators. Installing Microsoft SQL Server 1.
5. Ensure the Named instance and Instance ID are set to PROTEGEGX then click Next to continue. 6. The Server Configuration details are shown. Click Next to continue. 7. The Database Engine Configuration details are shown. Select the Authentication Mode to define how database permissions are created. We recommend Windows authentication wherever possible as it provides a single sign-on experience for users and simplifies security management.
Installing the Protege GX Server 1. Run the supplied setup.exe to launch the Protege GX Install Wizard. Click Next to start the installation process. 2. Read and accept the License Agreement then click Next to continue. 3. Enter your registration information including your name, company, and product serial number then click Next to continue.
4. Click Next to install to the default folder or click Change to choose another location. We recommend accepting the default folder. 5. Select the Complete setup type then click Next. This installs all components including the Protege database, services, and the client application on the server.
6. Click Next to start the Protege services automatically during installation. By default, services are installed using the local account. If you are performing a remote installation you will need to customize the logon and passwords so should disable this option and configure the services manually after installation. 7. Enter the details of the database server where the Protege GX database will be created.
8. To customize the database names and/or paths, clear the setting to Hide advanced database configuration options and enter the relevant details. It is recommended these settings are only modified by advanced users. Click Next to continue. 9. Click Next to use the default WCF TCP/IP port, or clear the option and enter a different port. This option should only be changed where another application on the target machine uses the default port as this would otherwise cause the services to fail to start.
10. Click Install to begin installation. 11. Progress is shown as the installation completes. Once complete, click Finish to exit the setup wizard. 12. You will be prompted to ensure that the Microsoft DirectX Runtime is installed (required if you are integrating with an OnSSI or Avigilon DVR system).
Installing the Protege GX Client on Remaining Operator Workstations Once the Server installation is complete, the Protege GX client can be installed on the remaining operator workstations. 1. Run the supplied setup.exe to launch the Protege GX Install Wizard. Click Next to start the installation process. 2. Read and accept the License Agreement then click Next to continue. 3. Enter your registration information including your name, company, and product serial number then click Next to continue.
4. Click Next to install to the default folder or click Change to choose another location. We recommend accepting the default folder. 5. Select the Custom setup type and click Next. This enables you to select the program features that will be installed.
6. Click the Server item and choose This feature will not be available from the options displayed. This removes the server components from the list of features to be installed. Click Next to continue. 7. Click Next to use the default WCF TCP/IP port, or clear the option and enter a different port. This option should only be changed where another application on the target machine uses the default port as this would otherwise cause the services to fail to start. 8. Click Install to begin installation. 9.
Initial Site Configuration Once the server and client components are installed, there's a few basic steps you need to take to get things setup. 1. Log In 2. Activate your license, and 3. Add a Site You also need to add (and program) a Controller but we'll cover that later in the course. Step 1: Log In Start Protege GX and login as a user with full access to the system. For new installations, this is admin with a blank password.
To Automatically Activate Your License: 1. Click Download License, enter the required information and select OK. 2. The Protege application passes your details to the ICT web registration service, then activates your software automatically. To Manually Activate Your License: 1. Click Generate to create a license request file. When prompted, save the ICT_LicenceRequest.req file to a folder on your network or a portable drive. 2. Click the link to Select your licensing options.
Review Questions Which of the following operating systems are NOT supported for server installations? Microsoft Windows XP SP3 Microsoft Windows Vista SP2 Microsoft Windows Server 2008 R2 All of the above systems are supported Which database version is recommended? SQL Server 2008 R2 MySQL Server Enterprise Edition MySQL Server Express Edition SQL Server 2005 What are the minimum CPU and RAM requirements for a Protege GX Server? Intel Atom 1.66GHz, 2GB RAM Intel Dual Core 2.
Module 129: Protege GX Software Introduction This module describes the various services that make up the Protege GX Server and the functions they perform, provides an introduction to the user interface, and outlines the global settings that apply to the entire Protege system including all sites and all controllers. In This Module The Protege GX Services ............................................................................................................. 184 The Protege GX User Interface ...........
The Protege GX Services The Protege GX Server is made up of six different services: Protege GX Update Service Protege GX Data Service Protege GX Download Service Protege GX DVR Service A Protege GX DVR Service B Protege GX Event Service Each service performs a different function within the system. It is important that you have a good understanding of what these services do, and more importantly, when to start or stop them.
Protege GX Data Service The Data Service is responsible for: Communications between the Protege GX services Communications between the Protege GX server and the MS SQL databases Communications between the Protege GX client and Protege GX server Download Service Event Service Data Service DVR Services GX Client(s) Event Database GX Database Stopping the Data Service The Data Service is the central point for all communication, and cannot be stopped without adversely affecting the system.
Protege GX Download Service The Download Service is responsible for all outgoing messages and sends system configuration data, firmware updates, status requests and control commands from the server to the controllers. Controller(s) Download Service Data Service GX Client(s) Firmware updates Status requests Control commands Configuration data GX Database The Download Service can be stopped without adversely affecting the system.
The Download Service is advised of a successful download by the controller. The controller sends this message to the Download Service via the Event Service and Data Service. Controller(s) Download Service Data Service Event Service DVR Services DVR/NVR(s)) When the server successfully sends a new configuration to the controller, it writes a file to its local hard disk. This file contains only the current configuration of the controller.
Protege GX DVR Services There are two DVR services that are responsible for the interaction between Protege GX and integrated DVR/NVR systems. Controller(s) Download Service Data Service Event Service DVR Services DVR/NVR(s)) The DVR services can be stopped without adversely affecting the system. Stopping these services will stop events and control messages going from the Protege GX server to the DVR, and prevent the viewing of video within the Protege GX client.
Stopping the Event Service The Event Service can be stopped without adversely affecting the system. Stopping this service will prevent the server from receiving all messages from controllers. If your site has operators actively monitoring the system, then they should be advised prior to stopping the service, as they will not receive any events, alarms or status updates while the service is offline.
The Protege GX User Interface The Protege GX user interface (or GX client) is used by operators to: Program the configuration database Receive live events and alarms from the server Receive video from DVR/NVR systems Send control commands to devices, such as opening doors remotely or controlling cameras Run reports Programming changes made using the GX client are entered into the GX database by the Protege GX Data Service.
Main Menu The Main Menu provides complete access to all program functions and is designed to help you quickly find the commands that you need by organizing commands in logical groups.
Toolbar The Toolbar remains consistent throughout the Protege GX User Interface. Once you know what a button does, it has the same functionality throughout the software: Add: Adds a new record to the database. The new record isn't added until you save it. Delete: Removes the selected record(s) from the database. Where a record has links to other records (such as an Expander with links to Inputs), you'll be prompted to remove these records too Save: Saves the selected record to the database.
Find Use the Find button to search for particular record(s) 1. Choose the Field to search across 2. Enter the text string (label) to look for and click OK The Record List is filtered to display only the records that match the text entered. The Find tool can also be used to filter records of a specific type. For example, to find all inputs in a particular Area: 1. Select the Area from the field options 2.
Refresh Clicking the Refresh button will reload the records that are displayed in the Record List Use the Refresh button in the following circumstances: To clear the filtered results when using the Find tool To update data when a second client window has been used to configure something For example, if you are configuring something that requires an Area to be selected and you use the ellipsis button to open another window to create a new Area, you will need to click the Refresh button in the origina
Import The Import tool takes the configuration values from one record and copies it to another. This can be used to clone the configuration of an existing item. 1. Select the item that you wish to copy the configuration values to and click Import 2. Choose the existing item to copy data from and click OK 3. The settings are updated to match those of the existing record Breakout Button Use the Breakout button to open the current page in another window.
The Record List The Record list is the panel shown on the left of the screen and is used to display a list of records within the current database. For example, when programming Inputs, the Record List displays a list of all Inputs that are currently programmed. The Record list contains one or more of the following columns: Column Description Name The primary language name given to the record. Controller The name of the Controller that the record belongs to. Database ID This is the Database ID.
The Record List can be sorted, resized and reordered to suit. Sort the record list by clicking on a column header. For example, to sort alphabetically by record name, click the Name column. Click the column header again to sort in reverse order. Resize columns by hovering your mouse over the edge of the column header until it forms a double-headed then dragging the column to the required size.
1. The Programming Window typically contains a number tabs, with similar configuration items grouped together. The General tab always contains the name of the record as well as the most common or important items to be configured. 2. Use the up and down arrows to collapse/expand the groups. This is particularly useful when using a low screen resolution. 3. Items that require you to select other configurable records have an ellipsis button that opens a second window.
Viewing Usage The Usage tab shows other records that rely on the record currently displayed. Viewing Events The Events tab provides an easy way to find information about a record.
The Status Bar The status bar provides general information about the system, regardless of where you are in the software. Item Description Current Operator The name of the operator that is currently logged in Controller Status The current status of the controller. Shown as OK when all controllers are online and there are no health warnings. Displays a number (in red) to indicate a configuration problem (such as a component requiring a module update). Use the Health Status to check for issues.
Global Settings Global settings apply to the entire Protege system - including all sites and all controllers. They define such things as: The user name format How long event records are stored The backup settings They also define email, display, and sound settings which we will cover in a later module.
Deleting Events from the Event Database If your event database reaches its capacity, you will have problems. To help control the database size, we can set the frequency at which events are deleted (or purged) from the database. The frequency you choose will vary according to the size and the nature of the site but in most cases 1 year would be sufficient. The Importance of Backups It should probably go without saying, that regular backups are vital in ensuring the data protection of a site.
Review Questions After a configuration change, how long must you wait before the changes take effect? Protege GX is a server based system so changes take effect immediately 60 Seconds The changes won't take effect until you connect to the Controller and download to it Up to the time that is set in 'Download Retry Delay' under the Controller Configuration tab After restoring a database and starting the Data Service what additional step(s) must be taken? Confirm your configuration is correct.
What is the Refresh button used for? To clear the filtered results when using the Find tool To update data when a second client window has been used to configure something To update data when another operator may have made changes to the same record All of the above What is the Events tab in the Programming window used for? To load events for the selected record To load events for the selected record and run a report on these events To show which fields were modified and their old and new va
Module 131: Hardware Programming This module outlines the requirements for programming a Controller, configuring a status page to show what is happening on the system, and the steps to take for troubleshooting hardware connections. In This Module Programming a Controller ............................................................................................................ 206 Status Pages .................................................................................................................
Programming a Controller Adding a Controller To add a controller, select Sites | Controllers from the menu then click Add. You'll be given 3 options: 1. Use the controller wizard 2. Add an individual controller record 3. Add a new controller based on an existing controller. This option effectively clones an existing controller, including all its records (doors, outputs, etc) For the purpose of this exercise, we are going to use the first option which adds the controller and the required hardware records.
Adding a Controller with Default Records Using the wizard, we'll add the following hardware records: 1. 1 Controller 2. 8 Controller Inputs 3. 1 Keypad 4. 2 Reader Expanders. The Controller has 2 onboard reader ports but must register as a reader expander to use this functionality. This means we need 1 reader expander for our Controller and 1 for our RDM2. Note the number of doors has adjusted based on the options selected.
Setting the Controller Date/Time By default, the Date/Time is set to the current time of the PC. Right click the Controller to adjust the Date/Time then click Set Controller Date Time to save the changes. This can be very useful for testing your system as you can enter any date and time. Viewing and Addressing Health Status Issues The Get Health Status function provides details of the overall status of the system and can be useful in identifying any problem areas that need to be addressed.
The health status is generated by the Controller as follows: 1. The Download Server sends configuration data to the Controller 2. The Controller checks the new configuration 3. Any problems are reported back to the Data Server via the Event Server This can all take time, so it is important to note that a health status problem will not necessarily show up immediately after it has been programmed. The health status will also show up issues related to compatibility.
This sends a message to the Controller to tell it to take this message off its Health Status list The next time we open the Health Status window, the message will have been cleared. Note also that the number under Health has now reduced. Enabling the Onboard Reader Expander Our Reader expanders are currently showing as offline for two reasons. Firstly, the Controller by default does not have its onboard reader expander enabled. Secondly, our RDM2 doesn't have a valid address configured yet.
Addressing Modules Right click the Controller and select Auto Address. The auto addressing window displays a list of expanders that are (or have been) connected to the Controller. Listed here are all expanders that have reported to the Controller since the last Controller module update or power cycle.
Module Update If you check your Health Status now, you should have everything online: We'll deal with the service encryption in just a moment. The other messages are all in relation to items requiring module updates. This can be resolved by right clicking on the Controller and selecting Update Modules. This updates all modules connected to the Controller. A module update is required whenever a programming change is made that requires the hardware to function in a different manner.
Firmware Updates You should always check the ICT website to ensure you are running the latest software and firmware versions. If your controller is running older firmware, update it by right clicking on the controller and clicking Update Firmware. Enter the file name or click the [...] button to browse to the new firmware file. You can select multiple controllers to update. The software updates them sequentially, and reports the results when complete.
Status Pages Now that we have our hardware up and running and we want to begin the rest of our system programming and testing, it would be good to have a way of seeing what is happening on the system. The best way to do this is with a Status Page. Status pages are usually designed by the integrator, and are a quick and efficient way to get an overview of your Protege system in one easy place.
Status Page Layout The layout we've chosen creates a 3 x 3 grid. Items can be set to span multiple rows and/or columns giving us control over the layout. Item 1 spans the first two rows of the first column Item 2 spans the first two rows of the second column Item 3 spans the first two rows of the third column Item 4 has been set to appear in the third row and span all three columns Adding Content to a Status Page Now that we have the layout, we want to add content to each of the panels. 1.
Status Lists The next option we are going to look at is status lists. A status list is a list of system items usually created by the integrator, and is used to provide a real time display of the defined devices. Status lists can contain any number of items, and can contain items of different types (eg inputs and outputs). Creating Status Lists Navigate to Monitoring | Setup | Status Lists 1. Change the name of the default status list to All Doors and Areas. 2.
Editing a Status Page Go back to the Status Page Editor (Monitoring | Setup | Status Page Editor) 1. Click Cancel to exit the wizard then choose your Technician page from the dropdown 2. Set the Columns to 4 3. Now, in each of the top panels, set the Type to Status List and choose a different list for each 4. Make sure you set the Rows to 2 in the right most panel 5. Finally, adjust the Event Window so it spans all 4 columns 6.
View the Finished Status Page Navigate to Monitoring | Status Page View and select your Technician page Click the button to open the page in a secondary window. This enables you to keep the status page open while you continue programming in the main window. Note that for the rest of this course, it is assumed that you will have this status page displayed in a second window.
Troubleshooting Hardware If your controller is not coming online, you need to follow some basic troubleshooting steps.
Requirements For the server and controller to communicate, the following things are required: 1. The server must have the correct IP address of the controller 2. The controller must be contactable on ports 21000 and 21001 3. The controller must have the Event Server IP address set correctly 4. The Event Server must be contactable on port 22000 5. The server must have the correct controller serial number to properly identify incoming messages from it 6.
Confirm the Controller Serial Number Incoming messages from the controller to the server are identified by the controller serial number Highlight and copy (CTRL + C) the serial number from the controller web page: Paste (CTRL + V) the copied serial number to the controller configuration: Confirm the Event Server is Functioning To confirm that the Event Server is functioning and listening on the correct port for incoming events, open the Event Server diagnostic window Navigate to Sites | Controllers.
Confirm that the server is listening on the correct port. The default event server port is 22000.
If the Event Server diagnostic window contains no text, then you have a problem with the configuration of the Event Server: This means that the event server is not accepting incoming events Check the Computer Name On the Server, open Control Panel | All Control Panel Items | System Copy the Computer name Within Protege GX, navigate to Global | Event Server and ensure that the Computer Name matches the server PC Name This usually only changes when you have restored a database from a different PC If th
Confirm the Event Server IP Address For messages to get from the Controller to the Server, the Event Server IP address must be programmed correctly Open a command prompt at the Server and type ipconfig then press [Enter] If the Server has more than one IP address, select the one that is on the same sub network as the Controller. In this case, 192.168.10.
There are three spaces for entering the Event Server IP: This is for situations where Controllers have multiple paths to the Server. In most cases, the second and third Event Server IP addresses should be left as all zeros or all 255s. Windows Firewall When the Controller and Server are on the same local network, the only place that a firewall can be blocking messages is on the Server PC itself.
If the firewall is on, it will be shown in green To eliminate the Windows Firewall as a cause of communication problems, turn it off temporarily by clicking the Turn Windows Firewall on or off link at the left of the screen: Then turn off the firewall for all network locations. If this fixes the issue, you may choose to leave the firewall off. Alternatively you can allow the services through the firewall by clicking the Allow a program or feature through Windows Firewall link.
Click Browse then navigate to the Protege GX installation directory. By default, this is C:\Program Files\Integrated Control Technology\Protege GX. Add the following executables one by one: GXSV.exe GXSV2.exe GXSV3.exe GXEvtSvr.exe GXDVR1.exe GXDVR2.exe This allows access through the Windows Firewall to all Protege GX services. Multiple Firewalls On corporate networks, there can be multiple firewalls.
Encryption Encryption relies on a shared key that both the sender and receiver of a message know. The message is encrypted using the key, then decrypted by the receiver using the same key. Server LAN Message encrypted Encrypted data Controller Message decrypted If the message is intercepted it will make no sense to anyone without the key. If for some reason the receiver loses the key, then it will be unable to decrypt incoming messages.
If the sender and receiver have different keys then the message will still not be able to be decrypted by the receiver.
Encryption Summary The server issues a different key each time it negotiates encryption with a controller Encryption can be enabled for one controller and disabled for another If both the server and controller have encryption disabled, communications are possible If both the server and controller have encryption enabled and the keys match, communications are possible If the server has encryption enabled but the controller does not, communications are not possible If the server does no
Duplicate IP or Serial Number Although the software will warn you, it is possible to save two controllers with the same IP or serial number. In this case, the controller that was created first will take priority. Confirm that you haven't created a controller with a duplicate IP or serial number. Check all of your sites. If you have created a site for templates, these should be left with zero IP addresses and serial numbers.
Finally, to confirm that the event server is able to accept connections, configure a laptop with the same IP settings as the controller. Remove the Ethernet plug from the controller and plug in your laptop Try to telnet to the server IP address on the event server port (22000 by default): telnet 192.168.1.100 22000 If the server is able to accept connections, you will get the clear screen and blinking cursor.
Review Questions A module update is required when... You change any settings on the expander You change any programming The Controller advises it is required via the health status All of the above What does the Controller Wizard do? Adds a Controller Adds expanders, inputs, outputs, trouble inputs Links all of the associated records All of the above What steps are required to use the Controller onboard reader ports? None.
If Controller encryption is accidentally disabled, what additional step must be carried out to get the Controller back online? The Controller must be defaulted to clear the encryption key Controller encryption should be enabled again Controller encryption should be initialized again Nothing. If encryption is disabled at the Server, the Controller will continue to communicate Answer the following...
Module 132: User Management This module takes you through creating users and access levels, and using schedules to control how and when users gain access. In This Module Managing Users ........................................................................................................................... 236 Schedules .................................................................................................................................... 245 Review Questions ..................................
Managing Users A User is a person that requires access to the facility being controlled by the access control system. They identify themselves to the system using credentials such as access cards, PIN and biometric profiles. Once a user has been added, they can then be assigned access to doors, areas, elevator floors and menu groups via Access Levels. Training Exercise Throughout the rest of the programming modules, you will be guided through setting up a basic system.
Door Groups Doors and Door Groups define which doors a user has access to. By default, Protege GX has a door group called All Doors that allows access to all doors, all of the time. When a new door is created, it is automatically assigned to this All Doors group. Adding a Door Group to an Access Level 1. Select the Door Groups tab and click Add 2. Select the All Doors group and click OK Menu Groups Menu groups control access to keypads.
Adding a Menu Group to an Access Level 1. Select the Menu Groups tab and click Add 2. Select the Installer group and click OK. Arming and Disarming Area Groups Arming Area Groups and Disarming Area Groups control which areas a user is allowed to arm or disarm. Protege GX has a default Area Group called All Areas. This allows access to all areas, all of the time. When a new area is created, it is automatically assigned to the All Areas group.
Creating a User Now that we have our installer access level, we need to create a user: 1. Navigate to Users | Users and click Add 2. Enter a First Name and Last Name for the user. Because we have set our global options to use the long format, the Name is populated automatically 3. Enter a PIN or use the [4] [5] or [6] button to automatically generate a random pin number between 4 and 6 digits in length. For now, we'll set the PIN to 000000 so we can remember it easily.
User Expiry Users can be set to expire by checking the Start and/or End options and setting a date and time: This allows cards to be issued and sent out prior to access being enabled, and allows for a users access to be stopped on a certain date. Adding an Access Level to a User 1. Select the Access Levels tab and click Add 2. Select the Installers access level and click OK 3. Click Save to finish configuring the new user. Users can have multiple access levels.
Batch Adding Users The Batch Add Users feature enables you to automatically create a number of user records with an assigned facility and range of card numbers. Use this feature when you have a large number of cards to add to the system. 1. Navigate to Sites | Batch Add Users 2. Enter the Facility Number, the Card Number range (first and last card number to be entered), and the Access Level to be assigned to the users 3. Click OK.
Importing Users from a CSV File It's not unusual to have hundreds of users that need to be loaded into the system. Entering the data manually can be tedious and time consuming, and data entry is often prone to human error. Many organizations already have some form of data source - such as an HR system or a student enrolment database - containing user information. Most of these systems enable you to easily export this data as a CSV file or even an Excel spreadsheet.
For our Acme training system, we'll map the columns as follows: Column 1 = First Name Column 2 = Last Name Column 3 = Skip (we'll use the Auto Format function instead) Column 4 = PIN Number Column 5 = Facility Number Column 6 = Card Number Column 7 = Access Level When mapping to an access level that does not yet exist, it will be created during the import 7. Set the User Display Name option to Long Format: 8. Click Next to continue. 9.
12. If the imported users are not showing up, navigate away from the Users page, then back again. You should now have a list of users something like that shown above. 13. Navigate to Users | Access Levels. The Import function has created all of the access levels from our CSV file. We will still need to configure these, but time has been saved in creating, naming and assigning them to users.
Schedules Schedules are definitions of timeframes.
Edge Triggering Things that are programmed to change when a schedule changes are deemed to be edge triggered. This means that by default, they are only checked and changed when the schedule changes state.
Notice how the Graphics View updates to show green bars for these days. These green bars show when the schedule will be valid.
Adding an Unlock Schedule to a Door Navigate to Programming | Doors and select DR 1 Set the Unlock Schedule to the newly created Office Hours schedule Once the download server has pushed out the new configuration, you should see something like this in your All Events window Because the schedule hasn't gone through a state change, there should be no effect on the state of the door yet. Notice that DR 1 is locked, and the lock output is off.
Navigate to Sites | Controllers, then right click on your controller Set the controller time to 08:59 on a weekday Looking at your event window, you should see the schedule go invalid, then after a minute it should go valid Straight after this, you should hear a relay click and see in the event window that the door has been unlocked Looking at your status page now, you should see that DR 1 is now unlocked, and that the lock output is on.
Manually Locking a Door Unlocked by a Schedule Right click on DR 1 and select Lock Notice that the door locks and stays locked The schedule unlocked the door when it was edge triggered at 09:00am, but we still have full manual control and are able to override the door back to locked Always Check Unlock Schedule Navigate to Programming | Doors and select DR 1. Click the Options tab and enable the option labeled Always Check Unlock Schedule. Save your changes and observe what happens.
Schedule Triggering Summary Devices that are controlled by a schedule will be edge triggered by default Edge triggering allows full manual control of the devices in between times Edge triggering only gets processed at the start and end of a period If you program a device to follow a schedule, control will not take place until the next 'start' time passes If you configure the device to always follow the schedule, the device state will immediately start following the schedule When a dev
Holidays That Change Dates Each Year Let's look at a holiday that changes date every year. A good example of this is Easter. These holidays need to be programmed for every occurrence, but being able to put multiple entries in a group means we can program many years in advance. Holidays That Span Multiple Days Holidays can also span multiple days. For instance, Christmas Day and Boxing Day usually go hand in hand, so this can be configured as a single holiday.
Applying a Holiday Group to a Schedule Once you have programmed a holiday group or groups, these can be applied to your schedules. Navigate to Sites | Schedules Select the Holiday Groups tab and click Add Select the group or groups of holidays that you wish to apply to this schedule. This tells the schedule which days are holidays, but it does not tell the schedule what to do if it is a holiday. For that, you must configure a Holiday Mode.
Multiple Time Spans Schedules sometimes need to turn on and off more than once, or at different times on different days. Protege GX has 8 periods for each schedule to allow for these scenarios. Different Hours for Weekends Sometimes, premises will need to open for shorter hours on a weekend.
Overnight Schedules Where a schedule is required to operate overnight, enter a start time, but leave the end time as 00:00. This results in the period being valid from 3pm until midnight: Now program a second period to start at midnight and continue until 3am. The schedule will become valid at 3pm on Monday, and stay valid until 3am the following morning.
In this example, Wednesday has two periods that overlap. The two periods are combined, and as a result, the schedule will be valid from 9am to 3pm on Wednesday. Because they have been combined, the edges are at 9am and 3pm, and these are the only times that the schedule will change state. Qualify Output The final bit of schedule flexibility comes from the ability to qualify a schedule with the state of an output.
Adding the Managers Schedule Referring back to our system design, we require some additional schedules. The manager is going to require access to the building 24/7. Add a new schedule called Managers Hours Check every day in Period 1 and set the holiday mode to Ignore Holiday This schedule is effectively the same as the built in schedule called Always, but we now have an easy way to reconfigure the managers access at a later date if requirements change.
Review Questions What are Access Levels used for? To control which elevator levels they have access to To control what users can do, where they can go and when they can do these things To control how a door responds to a user To provide a way to rank users In an Access Level, what are Door Groups used for? They define which doors a user has access to They allow a number of doors to be unlocked with a single card read They are used for scheduling multiple doors to unlock They define which A
How do you program a schedule to run from 11pm on Monday through to 2am on Tuesday? Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and check Monday and Tuesday. Program period 1 from 23:00 to 23:59 and check Monday. Program period 2 from 00:01 to 02:00 and check Tuesday. Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and check Tuesday. Program period 1 from 23:00 to 23:59 and check Monday.
Module 133: Basic Intruder Detection There are several items that need to be configured to set up a system for intruder detection: Areas: A location - often with a group of devices - that will be monitored for intrusion or other purposes. Inputs: Used to connect motion detectors, door contacts, and other protection devices to the system. Outputs: Used to control devices from the Protege system, outputs can be used to activate sirens, bells, warning devices, control lighting, and doors.
Programming Areas Naming Conventions Before you start programming the system, it's important that you decide on the naming conventions that will be used. This step is too commonly forgotten, resulting in systems that are inconsistent and therefore hard to understand and maintain. Consider that the first 16 characters are what a user sees from a keypad, so these characters should be as descriptive as possible to ensure items are easily identifiable.
3. Select the Configuration tab: Set the Entry Time to 10 seconds. This will allow any users that enter the area 10 seconds to disarm it before the area generates an alarm Set the Exit Time to 10 seconds. This will allow our users 10 seconds to exit the area once the arming of the area has begun before an alarm is triggered Set the Alarm 1 Time to 1 minute. This determines how long the bell/siren output for the area will remain activated before timing out.
Pulse Times Pulse times allow an output or group of outputs to be pulsed for the duration of an area state. For example, the keypad beeper can be used to make short beeps for an exit delay, then a long continuous beep for entry delay. Pulse times are measured in tenths of a second or 100ms. A pulse time of 10 equates to 1 second. Setting the Pulse On to 1 and the Pulse Off to 9 provides a short pulse (such as a short beep or flash) every second.
24 Hour Tamper Area Every Area in Protege is actually made up of two areas. The main area that monitors devices (such as PIRs) only when it is armed The 24 hour (or Tamper) area that monitors for a tamper or short condition on devices (such as PIRs) 24/7 Whenever a 24 hour area is disarmed, it will be displayed under the controller's Health Status. The 24 hour tamper area is armed automatically when the main area is armed.
Disarming the 24 Hour Area The 24 hour or tamper portion of an area can be armed and disarmed at the keypad by any user that has an appropriate menu group. Log in using the Installer code of 000000. Once the area status is displayed, press the left arrow key. Office 24HR Enabled You can now use the [Arm] and [Disarm] keys to control just the 24 hour portion of the area.
Updating the Technician Status Page Now we need to add the new areas to our Technician status page. Navigate to Monitoring | Setup | Status Lists. 1. Select the All Doors and Areas Status List 2. Click Add to open the Select Devices window 3. Set the Device Type to Area and choose your Controller 4. Check the new Areas and click OK. If your status page is already open, you will need to close it and open it again for the changes to take place. You should now have three areas in your status list.
Controlling Areas from the Software Devices shown in status lists can be controlled directly from the software: Right clicking the Office area will present a control menu. Try clicking the Arm option. You will be presented with an Arm Area control window: The area status should change to Exit Delay then you should hear the keypad beeper pulsing.
Once armed, close the window. Note that the statuses are updated live on the status page. The Office area is now shown as armed, and the output states have changed to match the keypad. Navigate to Programming | Areas and right click on the Office Area. You'll see that the control menu is accessible from here too. Right clicking most devices within the Protege GX interface will provide some level of control or functionality. Disarm the Office area again.
Programming Inputs Input Testing Next, we will need to program some Inputs into the areas. So that we can test the functionality, wire buttons or switches as follows: On the Controller, wire inputs 1 - 8 On the RMD2, wire inputs 1, 2, 5 and 7 N.C. Input Contact 1K 1K REN Input Bond Sense 1K 1K Z4 V- N.O. Input Contact Z3 N.C. Input Contact Z2 1K 1K VZ1 REX Input V- V+ Door Contact 1K 1K N.O.
Programming Inputs 1. Navigate to Programming | Inputs 2. Select Input CP1:1 from the Record List 3. Using our naming convention, set the Name to Office Entry Dr (Door) TXS CP1:1 We'll leave the rest of the settings on the General tab as they are: The Module Address identifies where the device physically connects to the system and allows us to shift inputs around at a later date if we need to. The Reporting ID (if defined) will override the report map for Contact ID and offsite monitoring.
Input Types Input Types define how an input will operate in an area. For example, Delay will go into entry delay when triggered, whereas Instant will activate immediately. There are a range of predefined input types included by default. These can be modified to suit your requirements or new input types created.
Onboard Reader Expander If you look at the Technician status page, you will note that we have inputs 1-8 for the Controller and for Reader Expander 1. The Controller has been configured to register as Reader Expander 1, so what happens to the inputs assigned to Reader Expander 1? If you now open Inputs 1 and 3 on the Controller, you will see that both the Controller and Reader Expander inputs change state.
Programming Efficiently Now that you have programmed a number of inputs, we will look at how naming conventions will help us to program a system efficiently. This is particularly important on a large system. Program the Office Area Inputs 1. Click the Find button and type office into the Label field. 2. Click Ok. You should get a list of six inputs. 3. Click on one of the inputs then press CTRL + A to select all 4. Now hold down the CTRL key and click on Office Entry Dr (REX) to deselect it.
Program the Warehouse Area Inputs 1. Use the find tool again with the word warehouse. Select the first two inputs. 2. Set the Area to Warehouse and the Input Type to Instant 3. Click Save 4. Now select the other two inputs. Note that they already have the Office area assigned 5. Assign the second Area of Warehouse 6. Assign the second Input Type of Instant 7. Click Save Inputs can be assigned to multiple areas and with different input types. They are processed independently by each area.
Set the Input Speeds Now that we have configured our areas, let's look at other ways to use the Find tool. 1. Click Find and type (REX) into the label field. 2. Click Ok. You should get a list of two inputs: 3. Click on one of the inputs, then press CTRL + A to select all. 4. On the General tab, set the input speeds to 50 msec and click Save. The default Input Speed is 500 msec. This means the input needs to be activated for half a second before it will trigger.
Monitor the Health Status You will find that your Controller health status is now showing 7. 1. Open the health status window. The first two messages are in relation to the new areas that have been added but not yet armed. The next five messages are appearing because the inputs have had changes made that affect the operation on an area that is currently armed. In this case, it is because the 24 hour portion of the Office area is armed.
Testing Areas 1. Navigate to the Technician status page 2. Right click the Office area and select Arm 3. Click Close 4. Right click the Warehouse area and select Arm 5. Click Close 6. Right click the Managers Office area and select Arm 7. Click Close All areas should go through the 10 second exit delay then change to armed. Testing the Office Area 1. Open the Office (PIR) TXS CP1:4 input This has been programmed as a Delay input type so should trigger the entry delay.
4. Close the Office (PIR) TXS CP1:4 input An input closed event will be generated, then another report will be generated. This is the Zone Restore signal to offsite monitoring. 5. Open and close the Office PIR input again, but this time, log in at the keypad and disarm the area: Press: 000000 [Enter] [Enter] [Disarm] As you can see, the event logging in Protege GX is very comprehensive and can be a great source for troubleshooting. Testing the Managers Area Open the Managers (PIR) TXS CP1:8 input.
Testing Inputs Assigned to Multiple Areas 1. Arm the Office area again 2. Wait for the exit delay to expire 3. Open the Office to Warehouse Door (Door) TXS RD2:5 input This input is programmed for both the Office and Warehouse areas. You can see that after the input opens, the Warehouse area goes into alarm instantly, whereas the Office area goes through entry delay first. Testing Complete We have now finished testing the configuration of our Areas.
Review Questions A short time after creating a new area, a health status message appears on the controller.
What does the Input Type setting do? It sets how the input operates in the specified area It sets how the input operates in all areas It sets the Input name displayed in the keypad It sets whether input to use for an on-board expander Which of the default input types should be used for a PIR that is covering the keypad at the main entry? Instant Delay Trouble Silent 24 Hour Alarm 282 Module 133: Basic Intruder Detection | Review Questions
Module 134: Basic Access Control There are two main elements to access control: Doors: Used to control access by users or to monitor/control the flow of people into an area Access Levels: Used to control what users can do, where they can go, and when they can do these things This module outlines how to configure these items to provide basic access control. In This Module Programming Doors ..............................................................................................................
Programming Doors Navigate to Programming | Doors. You'll see that there are four doors already programmed: DR 1 DR 2 DR 3 DR 4 This is because the Add Controller Wizard added the doors automatically.
Adding Cards from the Event Log Badge the first training tag at the MultiProx reader. You should see an event come through, telling us that an unknown card has been read on Port 1 The numbers in the brackets at the end of the event - in this example (99:1) - represent the Facility Code Card Number and 1. Right click on the event 2. Select Add Card Number to Existing User 3. Select the user you wish to add the card to then click OK 4. Once the download is complete, badge the card again.
Door Processing Door Sense Badge your card at the reader, then open the Office Entry Dr (Door) TXS CP1:1 input (using the switch you wired earlier) for a second or two This time you will see Door Opened and Closed events. Inputs 1 and 5 are configured by default as the Door Sense (Reed switch) inputs for the doors associated with a Reader Expander Door Processing occurs independently of any areas the inputs may be associated with as alarm inputs REX 1.
Beeper The beeper on an ICT reader can be controlled internally by the reader itself or externally by grounding the beeper wire. Beep generated internally. Data sent to expander for processing. The first beep that is emitted when a card is read is generated internally by the reader to acknowledge that the card has been read. The second beep (or beeps) are generated by the access control system to advise whether access has been granted or denied.
Reader Beepers 1. From the Technician status page, right click the RD1 Beeper R1 output 2. Set a time of 5 seconds 3. Select Activate Timed The Reader Expander BZ output can be controlled by Protege GX just like any other system output.
LEDs 1. From the Technician status page, right click the RD1 Green R1 output 2. Set a time of 5 seconds 3. Select Activate Timed Reader LED's can also be controlled by Protege GX Reader Single LED Mode ICT Readers can be configured to operate in either single or dual LED mode. In single LED mode the green LED control wire (orange) is not connected to the Reader Expander. The blue LED control wire (brown) is connected to the L1 output of the Reader Expander.
Reader Dual LED Mode In dual LED mode the green LED control wire (orange) is connected to the L1 output of the Reader Expander. The blue LED control wire (brown) is connected to the L2 output of the Reader Expander. Green control line grounded The reader LED strip is GREEN Blue control line grounded The reader LED strip is BLUE Dual LED mode allows two extra states of LED display: No LED's and Both LED's.
Door Monitoring 1. Open the Office Entry Dr (Door) TXS CP1:1 input (using the switch you wired earlier) You should see a Door Forced Open event, and see the status update on the Technician status page 2. Close the Office Entry Dr (Door) TXS CP1:1 input 3. Badge the Installer card 4. Open the Office Entry Dr (Door) TXS CP1:1 input (to simulate the door opening) Leave the input open this time and observe what happens: 1. The door opens 2. After 30 seconds an alert is generated 3.
Configuring Access Levels Access Levels are used to control what users can do, where they can go, and when they can do these things. They determine the doors, areas, elevator floors and menu groups a user has access to. The tidiest way to define this access is using groups. Door Groups Navigate to Groups | Door Groups. You will see a default door group called All Doors. This is created by the system and cannot be deleted or changed.
Adding Door Groups Add the Managers Door Group We could also assign the All Doors door group to our Manager access level, however to follow good practice, we'll create a new door group for the Manager. 1. Click the Add button on the main toolbar 2. Name the door group Managers TXS 3. Click Save to create the group 4. Click Add to open the Doors selection window... This display all doors in the system that are not already in the group 5. Select all four doors.
Add the Office Staff Door Group 1. Create a new door group called Office Staff TXS 2. Add the two office doors 3. Assign the Office Hours schedule In our system design, it was specified that the office staff will have access to the Warehouse only when warehouse staff are present. We still need to give them access to the door, but we will configure the rest later.
Add the Warehouse Staff Door Group 1. Create 2 further door groups for: Warehouse Shift 1 TXS and Warehouse Shift 2 TXS 2. Add the doors required by the warehouse staff: Office Entry Office to Warehouse, and Warehouse Roller 3. Assign the appropriate schedules (shift 1 or shift 2) Again, we will configure the office restriction later...
Adding Area Groups Add the Managers Area Group 1. Navigate to Groups | Area Groups You will see a default area group called All Areas. This is created by the system and cannot be deleted or changed. Whenever a new area is created, it is added to the All Areas group automatically. Use of the All Areas area group should be made with caution. 2. In the same way we created the Managers door group, add a new area group called Managers 3. Add all three areas 4.
Adding Menu Groups Add the Managers Menu Group The final thing we need to configure is Menu Groups. Menu groups control access to keypads. They define what a user can do at a keypad, but not which areas the user has access to. 1. Navigate to Groups | Menu Groups 2. Add a new menu group called Manager 3.
Add an Additional Menu Group 1. Add another menu group called Staff 2. Check the Area (1) setting to allow area control 3. Under the Options tab select (enable) the Show User Greeting option 4. Click Save We have now created all of the groups we need... Configure Access Levels Navigate to Users | Access Levels.
6. Select the Manager menu group and click OK 7. Click Save 8. Select the Disarming Area Groups tab and click Add 9. Select the Managers area group and click OK 10. Click Save Remember that if we allow a user to Disarm an area, the system will automatically allow them to Arm the area.
Testing the Managers Access Level 1. Badge Card Number 2 at a reader Right click the event and assign the card to our Manager Brett Lamb 2. Wait 5 seconds, then badge the card again. Access should now be granted: 3. Log in at the keypad using Brett's code of 9998 Note the areas he has access to 4. Press the [Menu] key and scroll up to see the menus he has access to 5. Navigate to Sites | Controllers and right click on the Controller 6. Set the time to 2:00AM 7.
Configure the Office Access Level 1. Navigate to Users | Access Levels and select the Office access level 2. Add the Office Staff door group 3. Add the Staff menu group 4. Add the Office area group to the Disarming Area Groups tab 5. Add the Warehouse area group to the Arming Area Groups tab 6. Click Save Testing the Office Access Level 1. Badge Card Number 3 at a reader Right click the event and assign the card to one of our office staff Calvin Diaz 2.
3. Navigate to Sites | Controllers and right click on the Controller 4. Set the time to 9:30AM 5. Try badging Calvin's card again You will see the Office and Warehouse Shift 1 schedules go valid, and then Calvin is granted access. 6. Log in at the keypad using Calvin's code of 9779 Note the areas he has access to 7. Press the [Menu] key and scroll up to see the menus he has access to 8. Press [Enter] 9.
Configure the Warehouse Shift 2 Access Level 1. Select the Warehouse Shift 2 access level 2. Add the Warehouse Shift 2 door group Configure the Warehouse Supervisor Access Level 1. Select the Warehouse Supervisor access level 2. Add the Warehouse Shift 1 and Warehouse Shift 2 door groups 3. Add the Staff menu group 4. Add the Warehouse area to the Disarming Area Groups tab 5.
Assign the Remaining Cards Assign card number 4 to Lois Joseph Assign card number 5 to Douglas Ross Assign card number 6 to Gretchen Holmes 304 Module 134: Basic Access Control | Configuring Access Levels
Door Configuration Door Types Door Types define how a door will operate. This includes the passback mode, the reading mode used to gain access (such as Card, PIN, Card or PIN, Card and PIN, etc), and if operator verification is required to grant access. Setting a Door Type 1. Navigate to Programming | Doors 2. Set the Door Type of the Office Entry door to PIN Only 3.
After approximately 10 seconds, you will see a PIN Entry Timed Out event. 3. Badge the card then type 000000 and press [Enter] at the MultiProx reader This time you should be granted access.
Door Outputs We configure the outputs under the Door's Outputs tab: The Lock Output and Lock Output Group determine which output or output group to activate when the door unlocks The Lock Activation Time defines how long the door unlocks for (in seconds) Note that the Add Controller Wizard has configured this automatically.
Relock on Door Close 1. Badge Card 2 at the Managers Door reader 2. Open the Managers Dr (Door) TXS CP1:5 input 3. Close the Managers Dr (Door) TXS CP1:5 input Notice that the lock output remains on for 5 seconds regardless of how long the door opens for 4. Select the Managers Office door and go to the Options tab 5. Enable the Relock on Door Close option and save your changes 6. Wait a few seconds then try simulating entering the Managers Office again Notice that the door now locks as soon as it closes.
Offline Operation Offline Operation defines how a reader expander will behave if it loses communications with the controller RD1 has been configured as the controller onboard reader expander, so offline operation is not relevant for RD1 RD2 controls access to the warehouse, so let's set the offline operation to First 10 Users plus Cache For offline operation to work, we also need to configure some options at the controller... 1.
Reader Multiplexing A unique feature of Protege GX is the ability to configure both an entry and an exit reader while only using a single reader port SHIELD RED BLACK Shielded Cable GREEN WHITE N/R ORANGE BROWN Shield is frame grounded at one point BLUE N/R YELLOW SHIELD RED BLACK Shielded Cable GREEN WHITE N/R ORANGE BROWN Shield not connected BLUE N/R YELLOW BZ L1 D1 BZ DO L1 D1 DO Z4 V- Z3 Z2 V- Z1 V- V+ Our system design is using this feature for the Warehouse Roller and Office
Reader Configuration Select the Reader One tab. The Configuration options here define the behavior of the reader port 1. By default, readers are configured for: 26 bit reading mode As entry readers for access control ARK-501 keypad (supports the ICT Multi Prox PIN input) The Add Controller Wizard has automatically assigned each reader port to a door: RD1 to doors 1 and 2, RD2 to doors 3 and 4, and so on.
Review the Health Status The Status Bar should now be showing 2 health status warnings. 1. Navigate to Sites | Controllers and open the Controller Health Status window. Remember, the numbers inside the brackets refer to the Database ID, not the physical expander number. 2. Both reader expanders require a module update as we have made changes to the physical properties of the hardware (disabled and enabled inputs for door processing). Performing a Module Update 1.
Module Updates During a module update, there is a short period (a few seconds) where the expander temporarily stops processing Performing an update from the Controller will update all modules connected to the system Performing an update from the selected module only updates that single module causing less disruption Additionally, a single module update provides a confirmation that the update succeeded and the new configuration is now running Downloading Changes Before Updating It is important t
Review Questions If a door has been created by the Add Controller Wizard with no additional configuration and it is the Forced Open state, which input must be open? The REN (Request to Enter) Input The REX (Request to Exit) Input The Bond Sense (Lock State) Input The Door Sense (Reed) Input Which inputs are configured by default as bond sense (lock state) inputs on a Reader Expander? 1 and 5 2 and 6 3 and 7 4 and 8 What does this event mean? A card has been read that was programmed inco
If a user is automatically logged out of a keypad after a period of time, which option do they NOT have checked in their menu group? Installer (4) Advanced Installer (4, 8) Installer Menu Group Time (6) What do Door Types do? They define which lock outputs to use They set double badge arming They define the reading mode used to gain access All of the above For Offline Operation on a Reader Expander to allow a cached user through a door in offline mode, what items must be configured? The
Module 135: Configuring Intruder and Access Integration In this module we'll finish configuring intruder detection and access control according to the system requirements we defined earlier. In This Module Configuring Office Access ............................................................................................................ 318 Configuring Warehouse Access ................................................................................................... 328 Testing the System ..............
Configuring Office Access From the Protege GX user interface: Set the Controller time to 7am on a weekday Arm the Office area (if it isn't already armed) Lock the Office Entry door (if it isn't already locked) Now we're going to simulate the manager arriving in the morning: Badge Card 2 at the Office Entry reader and enter the PIN 9998 Open the Office Entry Dr (Door) TXS CP1:1 input to simulate opening the door Note the keypad starts entry delay Door Areas It makes sense that if a
Wait a few seconds then badge Card 2 again. Enter the PIN 9998. This time the Office area will automatically disarm. Arm the Office area again Badge Card 4 at the Office Entry reader and enter PIN 2758 Our user Lois Joseph has the Warehouse Shift 1 access level. This has the Office Entry door in a door group and the schedule is valid, however because Lois doesn't have access to the Office area, she is denied access. Badge Card 2 at the Office Entry reader and enter PIN 9998.
Disarm on Entry: Warehouse Roller Set the Area Inside Door of the Warehouse Roller door to Warehouse Disarm on Entry: Office to Warehouse Door Set the Area Inside Door of the Office to Warehouse door to Warehouse Set the Area Outside Door of the Office to Warehouse door to Office Arming an Area on 2 Reads Badge Card 2 at the Managers Office door The Area is disarmed Now badge Card 2 at the Managers Office door twice in a row You should get a 3 beep acknowledgment, and the Managers Office
Configure the Managers Office Outputs We don't have a keypad to show the status of the managers office, but we do have a reader, so let's set some outputs for the Managers area: Navigate to Programming | Areas Select the Managers Office area and go to the Outputs tab Set the Exit Delay Output to RD1 Beeper R2 Set Pulse Times of 1 and 9 Set the Armed Output to RD1 Green R2 Set the Pulse Times to 5 and 5 Save your changes The outputs we have used are the second reader port (R2) on
Create an Area Armed Schedule Navigate to Sites | Schedules Add a new schedule called Office Area Armed Select all days in period 1 and set the holiday mode to Ignore Holiday Go to the Options tab and select (enable) the Validate Schedule if Qualify Output On option Set the Qualify Output to KP1 Red LED We have created a schedule that will be valid 24/7 regardless of holidays, but requires the keypad's red LED to be ON before the schedule becomes valid.
Assign the New Door Type Navigate to Programming | Doors Select the Office Entry door, and choose the new Door Type Testing the New Door Type Arm the Office area: You will see that as the area is armed, the keypad Red LED turns on This in turn makes the Office Area Armed schedule valid The door is now in Card and PIN mode Badge Card 2 and enter the PIN 9998 at the Office Entry door: Brett is granted access which disarms the area The keypad Red LED turns off which makes the schedule
Door Type Integration Summary 1. We've created a new 24/7 Office Area Armed schedule that is qualified by the Keypad Red LED This Schedule becomes valid whenever the Office area is Armed 2. We've created a new Door Type that has the new schedule as its Operating Schedule 3. We've set the Entry Mode to Card and PIN 4. We've set the Secondary Door Type to Card 5.
Let's try that test again: Disarm the Office Area Set the Controller time to 4:59pm - at 5:00pm, the door locks Arm the Office area by double badging at the Office Entry reader - the building is locked and secure Set the Controller time to 8:59am At 9:00am, the Office Hours schedule goes valid but this time the door stays locked Badge Card 2 and enter the PIN 9998 The door is unlocked and the Office area disarmed Note the door stays unlocked Double badge Card 2 at the Office Entry re
Armed Output Group Navigate to Groups | Output Groups Add a new output group called Office Area Armed Add the KP1 Red LED and RD1 Green R1 outputs Navigate to Programming | Areas and select the Office area Change the Armed Output to Set the Armed Output Group to the new Office Area Armed group Set pulse times of 5 and 5 Rearm the Office area Note that even though the outputs are pulsed, the schedule that is following the keypad Red LED only follows the edge triggers
Arming Output Group Navigate to Groups | Output Groups Add a new output group called Office Area Arming Add the KP1 Beeper and RD1 Beeper outputs Navigate to Programming | Areas and select the Office area Change the Exit Delay Output to Set the Exit Delay Output Group to the new Office Area Arming group Disarm then re-arm the Office area We now have audible warnings while arming and visual indications at the keypad and reader when armed.
Configuring Warehouse Access We've fully configured the Office Entry and Managers Office doors and areas, so now let's take a look at the Warehouse...
Wire two Nano readers in multiplex configuration to Port 2 of the RDM2 expander SHIELD V+ RED ORANGE BROWN C BLUE DATA L1 WHITE L2 GREEN D1 DO V- BLACK BZ EXIT READER SHIELD ORANGE BROWN VC BLUE D1 DO WHITE L1 GREEN L2 BLACK BZ RED V+ ENTRY READER Reader Multiplex Configuration We set up reader multiplexing in an earlier module, but let's recap: Navigate to Expanders | Reader Expanders and select RD2 Select Multiple Reader Input Port 1 to enable multiplexing for the War
Testing the Doors Badge Card 2 at the Warehouse Roller entry reader You will see that an Entry event is generated. Badge Card 2 at the Warehouse Roller exit reader You will see that an Exit event is generated. Badge Card 2 at the Office to Warehouse entry reader Badge Card 2 at the Office to Warehouse exit reader Basic door configuration has already been completed...
Warehouse Area Indication Because we want to be able to arm the warehouse from the Multiprox reader, we are also going to have to set up a schedule to change the door type when armed. While we are at it, we should set up some indication using reader LED's and beepers. 1. Create a new output group called Warehouse Area Arming Add outputs RD2 Beeper R1 and RD2 Beeper R2 2. Create another output group called Warehouse Area Armed Add outputs RD2 Green R1 and RD2 Green R2 3.
Office Area Indication Let's also add the Office to Warehouse door beeper and LED's to the Office output groups: Navigate to Groups | Output Groups Select the Office Area Arming output group and add the RD2 Beeper R2 output Select the Office Area Armed output group and add the RD2 Green R2 output The Office to Warehouse readers will now indicate if either area is armed. This makes sense as users in the unarmed portion will now have indication as to why they can't enter the other area.
Create the Warehouse Door Type 1. Create a new door type called Warehouse Entry 2. Set the Operating Schedule to Warehouse Area Armed 3. Set the Secondary Door Type to Card This means that when the Warehouse is disarmed the schedule is invalid and the door type will change to Card only. 4. Set the Entry Reading Mode to Card and PIN 5. Set the Exit Reading Mode to Card Only Now, when the area is armed, the entry reader will require a PIN. The exit reader will not ever require a PIN. 6.
Testing the System Now, we are going to test everything... Before we do this, disarm all areas. Testing the Office Area Arm the office area.
Testing the Warehouse Area Badge Card 6 (our warehouse supervisor) at the Warehouse Roller entry reader. Access should be granted without requiring a PIN. Double badge Card 6 (our warehouse supervisor) at the Warehouse to Office reader. The beepers on the Warehouse Roller and Office to Warehouse door should start beeping. Now anyone in the office will get an audible warning that the warehouse area is arming.
Review Questions Which of the following is a good example of where a Qualify Output should be used to validate a schedule? To change a Doors entry reading mode when an area is armed To keep a door locked on a holiday To turn on the keypad red LED when an area is armed To unlock a door when an area is disarmed To enable automatic disarming of an area when access to a door is granted, which of the following must be configured? Area Inside Door (Set in door programming) and Disarm Users Area On Val
Module 136: System Monitoring This modules explains how trouble inputs can be used to monitor the status and condition of the system, and describes how offsite monitoring can be achieved over a PSTN phone line and / or via any of the supported IP protocols across the internet. In This Module Trouble Inputs .............................................................................................................................. 338 Contact ID Monitoring ..................................................
Trouble Inputs A Trouble Input is a logical entity that behaves like a physical input, but changes state based on the state of a system trouble condition. For example, AC Fail or Battery Low. In a normal condition, the Trouble Input is closed, much like a PIR that is not detecting any movement. When a trouble conditions occurs, the associated Trouble Input opens. Trouble Input Programming Trouble Inputs are programmed much like a physical input, starting with the name.
Areas Trouble Inputs, just like physical inputs, must be programmed to an Area and assigned an Input Type before they will generate an alarm. Trouble Inputs can be assigned up to four areas, and will be processed individually by each area based on the Input Type assigned.
Controller Trouble Inputs 1. Use the Find tool to select only the Trouble Inputs on the Controller. 2.
Keypad Trouble Inputs Use the Find tool to select the Keypad trouble inputs Select and delete the Door Left Open and Door Forced Open records Reader Expander Trouble Inputs Find the Reader Expander trouble inputs Delete the following records from both Reader Expanders: Module Tamper AC Failure Battery Low / Missing Auxillary Fuse / Supply Fault Lock 1/2 Output Problem Reader 1 Fuse / Supply Fault Reader 2 Fuse / Supply Fault Add the Power Supply Module The Add Cont
Add a Trouble Input Navigate to Programming | Trouble Inputs Add a new trouble input named TXS PSU Tamper Set the Module Type to Analog (AE) Set the Module Address to 1 Set the Module Input to 1 Add Additional Trouble Inputs Add the remaining Trouble Inputs from the table as shown (excluding 7) Input Number Description AExxx:01 Module Tamper AExxx:02 Mains Failure AExxx:03 Low Battery / Battery Failure AExxx:04 Output Voltage Low AExxx:05 Output Over Current Failure AE
Adding Trouble Inputs to the System Area We're now left with a list of active trouble inputs Select all the trouble inputs (CTRL+A) then click the Areas and Input Types tab Set the first Area to our new System area Set the first Input Type to Trouble Silent Click Save to update the records We've now added all the Trouble Inputs to the System Area. View the Status Page You'll notice that the Status Page now has links to missing Trouble Inputs: It also doesn't include the new System area.
Updating Status Lists We'll start by removing all of the old Trouble Inputs: 1. Navigate to Monitoring | Setup | Status Lists 2. Select the All Trouble Inputs status list 3. Highlight all the Trouble Inputs (CTRL+A) under the Devices window 4. Click Delete Then we will re-add our current Trouble Inputs: 1. Click Add to open the Select Devices window 2. Set the Device Type to Trouble Zone and choose your Controller 3.
And finally, we'll add the new System area to our status page: 1. Select the All Doors and Areas Status List 2. Click Add to open the Select Devices window 3. Set the Device Type to Area and choose your Controller 4. Check the new System area and click OK 5. Save your changes If your status page is already open, you will need to close it and open it again for the changes to take place. Arm the System Area From the Technician status page, arm the 24hr portion of the System area.
Contact ID Monitoring Offsite monitoring can be achieved using either ContactID or SIA over a PSTN phone line and / or via any of the supported IP protocols across the internet. PSTN Monitoring Station Internet Both options are built in to all Protege controllers and do not require any additional hardware or licenses. Traditional Analog CID Monitoring When alarm systems first started reporting to a central monitoring station they often used a third party alarm dialler.
Contact ID uses DTMF tones to communicate alarms in the following format: 1234 18 1131 01 015 8 Account Type Event Area Zone Chksum where: 1234 = The account number (1234) 18 = The message type used to identify the message as Contact ID 1131 = The event qualifier (1) for a new event, followed by the event code for perimeter burglary 01 = The partition or area number (1) 015 = The zone number (015) 8 = The checksum The entire message can be looked at like this: 0800 123 456 123 18 1131 01 015 8
Adding a Phone Number For any PSTN based monitoring service, at least one phone number is required for communication. Navigate to Programming | Phone Numbers and click Add Enter the Name and primary Phone Number of your monitoring station Save your changes Adding a Secondary (Backup) Phone Number Most monitoring stations have a secondary number to be used as a backup in case the first fails.
Services Services provide interaction between Protege GX and external systems. Services include: ContactID SIA Report IP and many other options for automation and control Services run on Protege GX Controllers, so are not reliant on the Protege GX Server. Configure the Contact ID Service 1. Navigate to Programming | Services 2. Select your Controller then click Add to create a new service 3. Set the Service Type to ContactID 4. Set the Service Mode to Start with Controller.
Set Phone Number 1 to the primary phone number of the monitoring station Set Phone Backup to the second number we defined earlier. This number will be dialed if a connection to the monitoring station cannot be made on the Phone 1 number. This can be an alternative monitoring station. Phone Number 2 is only programmed when you require monitoring signals to be sent to two different phone numbers simultaneously. This is not a backup phone number. 6.
The Area Group defines which group of areas the service is responsible for monitoring. By default, it is set to All Areas which means that signals generated by any area will be reported offsite by the service. This is particularly useful when dealing with a multi tenanted building where ContactID services can be set up for each tenant and Area Groups configured for each. The CID Mapping sets a standard predefined monitoring template.
Start the Service Once a service has been configured, it must be started.
IP Monitoring As technology improves and more and more services and functions are being performed on computer networks or the internet, traditional analog systems are being forced into the digital world. Why IP Monitoring? Analog technologies such as copper phone lines are becoming more costly to maintain, and are therefore more expensive for the end user. In some cases, they are simply non-existent. Analog alarm dialers are no exception.
IP Alarm Monitoring IP alarm monitoring has been developed to achieve the same thing as Contact ID alarm monitoring (to transmit an alarm message to a central monitoring station), only it does this via a network connection across the internet. IP Alarm Transmission ArmorIP Server Alarm Transmitted -or- Alarm Panel Router Router www Acknowledgement sent Alarm Receiver The ArmorIP protocol takes the Contact ID message and encapsulates it inside a TCP/IP message.
IP Alarm Processing Workstation (optional) IP ArmorIP Server -or- Router Ademco 685 Alarm Monitoring Software Server IP Receiver Workstation Monitoring Operator Database The ArmorIP server receives the IP message from the alarm panel, sends an acknowledgement to the panel, then passes the data to the alarm receiver via RS232 using the Ademco 685 protocol.
Configure the Report IP Service 1. Navigate to Programming | Services 2. Select your Controller then click Add to create a new service 3. Set the Service Type to Report IP 4. Set the Service Mode to Start with Controller. This ensures that the service is started automatically whenever power is cycled to the controller. If left at Manual Mode, the service will need to be manually starting each time the controller is reset or restarted. 5. Select the General tab: Enter the Client Code (or account number).
If encryption is used, the monitoring station will supply an Encryption Level and Encryption Key that must also be entered in the service settings. If required, select a Backup Service: If a backup service is selected you must also enable the Service Operates as Backup option in the Contact ID service, otherwise both services will report each new event. The Area Group defines which group of areas the service is responsible for monitoring.
6. Select the Options tab and enable the reporting options for the signals that you wish to be sent by this service: Open and Close: Reports all area arming and disarming signals. This is usually only enabled for commercial premises. Alarms, Tampers and Restore: Reports the corresponding input state changes. Bypass: Reports if a user bypasses an input. This is usually only enabled for commercial premises. Start the Service Once a service has been configured, it must be started.
Review Questions How many areas can a trouble input be assigned to? 1 4 None - Trouble inputs are automatically assigned to the System area None- Trouble inputs are automatically assigned to the Trouble area When do you need to set a Reporting ID for a Trouble Input? Only if you want to use a different Reporting ID from the default reporting map Only if you need offsite monitoring for that trouble input Always Never When manually adding a trouble input, where can you find the Module Address
Which of these configuration examples are valid for IP Monitoring? They are all valid A is not valid B is not valid D is not valid Which of the following statements are true for ALL IP Monitoring Protocols? No copper phone lines required No copper phone lines required, displays additional, accurate information from site No copper phone lines required, displays additional, accurate information from site, they are essentially 'always online' No copper phone lines required, they are essentia
Module 137: System Commissioning This module introduces you to the tools available within Protege GX for commissioning a system, how the keypad can be used when carrying out commissioning on site, and outlines the procedure for backing up and restoring a database. In This Module System Commissioning Tools ...................................................................................................... 362 Keypad Testing ..................................................................................
System Commissioning Tools Protege GX has a number of built in features that can be used when commissioning a system. Item History All programmable items in Protege GX have a History tab. This tab shows the audit trail for the currently selected item, including who made a change to the programming and when. This can be very useful in tracking down why something that was working has stopped working. The History tab also shows details of what was changed. Highlight the change and click Details.
Item Usage Another useful feature for troubleshooting and commissioning is the Usage tab. This tab shows how a particular item links to other items. For example, the usage tab on a door will show which reader expander the door is linked to, and which door groups the door currently belongs to.
1. The loaded events can then be copied to the Windows clipboard to quickly paste into an email, or to save to a text document to include in commissioning reports. 2. Click the Run as Report button to run this list of events as a report. Reports are covered in more detail shortly... The Export Tool Another useful tool for commission documents is the Export tool. The Export tool enables you to extract selected information to the Windows clipboard or to a file in CSV format.
Reports: Event Search An important function of any access control system is the ability to produce a report on what has happened. There are several ways to achieve this, but in this qualification we will just be looking at the Event Search function. 1. Navigate to Events | Event Search 2. Select the Time Period you wish to include events from Choose from the available list of common timeframes or enter a specific start and end date 3.
Using Grid View The Grid View enables you to easily sort and filter the report results. Click in any of the empty fields at the top of the list and start typing what you are looking for. For instance, type gran into the description field and the event list will be filtered to show only Granted events: The results can be even further refined by adding additional filters.
CID Reporting Tool You'll often need to supply the offsite monitoring station with a Contact ID Report Map. The Report Map Generator enables you to easily produce this report from a Protege GX system. This is included on the Training USB Card or can be downloaded from the ICT website. 1. Double click the Report Map.exe to launch the Report Map Generator: 2. Enter the Database connection details.
Keypad Testing Protege GX is a server based system, and as such, very little programming can be carried out at the keypad. Essentially, the Controller's IP settings are the only things that can be programmed at the keypad. The keypad is still however, a valuable tool when carrying out commissioning on site. We are going to look more in depth at the Events Menu (3) and Installer Menu (4). Events Menu Log in with the installer code.
Press to select an input. Pressing while the display shows all 0s will display the first input on the Controller (usually Input 1 on the Controller). The first line displays the first 16 characters of the input name as recorded at the server. The second line shows the current state. Office Entry Dr is CLOSED Note: This display is dynamic and updates in real time as the input changes state. Press the Press the and keys to cycle through the inputs.
Door View Menu Press [4] [1] [4]. This takes you to the Door View menu allowing you to view the current state of a door. Select Door to view: DR000000 As with the previous menus, you'll be prompted to enter a door number. Navigation is carried out in the same manner. Doors can also be controlled from this menu. Pressing the [1] key will send an unlock by menu command to the door. This will unlock the door for the same period as a card badge or REX input would (5 seconds by default).
Pressing the [3] key (Latch) will latch bypass the input. This means the input will be ignored and will be able to open and close without activating an alarm. Office Entry Dr is BYPASS LATCH When the area is next disarmed, a latched bypass will not clear automatically. Press the [2] key (OFF) to clear a bypass from an input.
Backing up and Restoring a Database The Configuration and Event databases are both Microsoft SQL Server databases. The databases are completely independent from the Protege GX server and user interface. This means the services and software can be completely removed without affecting the configuration or events databases. Similarly, the Protege GX databases can be backed up and restored as required. It is even possible to backup a database from one server and restore it to another server.
To Backup a Database: 1. Open Microsoft SQL Server Management Studio. The first time you connect, you will need to specify the server name. If you accepted the defaults during installation, this will be COMPUTERNAME\PROTEGEGX where COMPUTERNAME is the name of the PC that GX is installed on. Click Connect to continue. By default, only the Windows user who performed the original installation (using the SQLSetup.exe file from the Protege GX installation package) will have access to the database. 2.
3. Right click the ProtegeGX database and select Tasks | Backup… If a backup has already been performed, the path is displayed under the destination. If you don't want to overwrite this file, select it and click Remove. By default, if you select a backup file that already exists, the new backup is added to this file. It can still be restored, but care needs to be taken to select the correct backup when restoring. 4. Click Add... to enter the name and location of the backup file.
Restoring a Database While backups can be performed automatically or manually, and from within the software or from within MSSQL, restoring a database must always be carried out in MSSQL. Before attempting to restore a database: You should always backup your current database first so that you can return to a known point if something goes wrong. You must stop the Protege GX Services.
2. Click to expand the Databases node in the Object Explorer 3. Right click the ProtegeGX database and select Tasks | Restore | Database… 4. Under the Source for restore, select From Device, then click the [...] button. The Specify Backup window opens.
5. Click Add to browse to the backup file to be restored. By default, only file with the extension .bak or .tm will be displayed. 6. Browse to the backup file. For this exercise, we are going to restore an empty database which can be found on your USB training card. Take note of the version number which is shown in the file name then click OK. 7. You'll see that the file has been added as a backup path. Click OK.
8. You should now have the backup file listed under the backup sets to restore. Select (enable) the Restore check box beside the backup set. When performing a backup, if the file already exists, SQL appends the backup to the same file as an additional backup set. If multiple backup sets are shown, select the set with the most recent date. 9. Click the Options page and ensure the Restore options are set to Overwrite the existing database.
10. Click OK to start the restore process. Progress is shown as the database is restored. If the progress wheel doesn't increase, an error message will eventually be displayed. This is usually caused by an open connection to the database, which most occurs when the Protege GX Services haven't been stopped. If the database restored successfully and the database version is the same as the software installed, then the services can now be restarted.
Upgrading a Database If the database needs upgrading, this can be done by running the Setup.exe file of the currently installed Protege GX software. The software does not need to be uninstalled first, as it will only be used to upgrade the database structure. Select the Repair option when prompted then follow the onscreen instructions. The installer will cycle through versions one by one until the database is upgraded to the current version of the software.
Review Questions What is the Usage tab used for? It shows which items are linked to the current item It shows when a change was made to the current item It shows the events associated with the current item It shows which operator made a change to the current item If an Output was on and I needed to know what turned it on, what would be the best way to figure this out? Go to the Usage tab of the output Use the find tool Run a usage report Use the 'Load Events' function for the output What i
Can a database that has been backed up from one server be restored to another? Yes, any Protege GX database will work with any Protege GX Server No, it can only be restored to the Server it was taken from Yes, as long as the Server is running the same or newer version Yes, as long as the Server is running the same or older version How do you upgrade a database after it is restored to a newer Server version? By running the software installer and choosing the repair option It is not possible to
Module 138: Programming Walkthrough This module takes you through the practical steps of setting up and testing a system. In This Module Programming a System from Start to Finish ................................................................................. 384 Testing the System ...................................................................................................................... 391 Step by Step Tasks .....................................................................................
Programming a System from Start to Finish We'll now set up a new scenario to practice what we've learned so far. This will give you an idea of what to expect during the practical element of the certification exam. Scenario In this scenario, we are installing an access control system in Acme's Melbourne branch. Acme have provided us with a basic building plan from which we can see we have two areas: 1. Showroom, and 2.
Door Type Internal Area Schedule Showroom Entry Door Card/PIN entry, REX exit Showroom Opening Hours Showroom to Warehouse Card entry, REX exit Warehouse None The Showroom area will have the Showroom PIR, the Showroom Entry Door Reed, and the Showroom to Warehouse Door Reed assigned to it The Warehouse area will have one PIR in each corner, the Showroom to Warehouse Door Reed, and the Warehouse Roller Door Reed assigned to it We will also install a keypad in the Showroom that will be
3. Bring the Controller Online and Address Health Status Issues Enter the serial number and IP address of the controller Set the Download Server Clear the health status message advising that the controller has been restarted Enable encryption Update all modules 4. Create Schedules Create an Opening Hours schedule Create a Showroom Armed schedule The Showroom Armed schedule will control the reader mode for the door. Set it to operate 24/7 and to ignore holidays.
7.
11. Create User Menu Groups Create a menu group that allows Managers access to control areas, view events and other system information, set the controller time, bypass inputs, and force arm the system. The menu group should also be configured so that managers are shown a greeting when logging in at the keypad, so that any alarms that are in the memory are shown on log in, and that managers can acknowledge these alarms from a keypad.
15. Create Users, Assign Access Levels, and Add Cards Create the following users, adding PINs and assigning the relevant access levels based on their role: User Role PIN Card Manny Jah Manager 1111 Card 1 Stu Roman Storeman 2222 Card 2 Whare Hausmann Storeman 3333 Card 3 Sel Ettuyu Sales Rep 4444 Card 4 Ike Cansalla Sales Rep 5555 Card 5 Add each of the training cards to the corresponding user 16. Add Power Supply Module and Trouble Inputs Add the Power Supply module.
19. Address Health Status Issues View and address any health status issues 20.
Testing the System Our last - and perhaps most important - task is testing the system. The following steps provide a good indication of how your final practical assessment will be marked. Each item represents one mark. Using the software, arm the Showroom area.
Badge Card 5 (Ike Cansalla) at the Showroom Entry door and enter PIN 5555. Was access granted? Did the Showroom door unlock and remain unlocked? Badge Card 5 at the Showroom to Warehouse door. Was access denied? Badge Card 3 (Whare Hausmann) at the Showroom to Warehouse door. Was access granted? Badge Card 5 (Ike Cansalla) at the Showroom to Warehouse door again. Was access now granted? Set the Controller time to 4:59pm on a Monday.
Step by Step Tasks Task 1: Restoring a Blank Database and Defaulting the Controller 1. Ensure the Protege GX Services are stopped. From the Windows Start menu, choose Control Panel | Administrative Tools | Services. Scroll down to locate the services Right click and choose Stop 2. Open Microsoft SQL Server Management Studio. The first time you connect, you will need to specify the server name.
5. Right click the ProtegeGX database and select Tasks | Restore | Database… 6. Under the Source for restore, select From Device, then click the [...] button. The Specify Backup window opens.
7. Click Add to browse to the backup file to be restored. 8. Browse to the backup file on your USB training card and click OK. 9. You'll see that the file has been added as a backup path. Click OK.
10. Select (enable) the Restore check box beside the backup set. 11. Click the Options page and ensure the Restore options are set to Overwrite the existing database.
12. Click OK to start the restore process. 13. Restart the Protege GX Services. 14. Remove the power to the controller by disconnecting the 12V DC input. 15. Connect a wire link between Reader 2 D0 input and Reader 2 L1 output. BZ L1 D1 DO READER 2 16. Power up the Controller. Once the Controller has started and the Status light is flashing, you can remove the wire link from the Reader 2 connector.
Task 2: Adding a Controller Navigate to Sites | Controllers and click Add Choose the option to Add a controller with default records Include the following hardware records: 1. 2. 3. 4.
Task 3: Bringing the Controller Online and Viewing Health Status 1. Add the Serial Number and IP Address of the Controller 2. Set the Download Server, then click Save. Your Controller should come online within a few seconds. 3. Right-click on the Controller and choose Get Health Status 4. Clear the message advising that the Controller has been restarted 5. Select the Configuration tab and click Initialize Controller Encryption: 6.
Task 4: Creating Schedules 1. Navigate to Sites | Schedules and click Add 2. Create the Opening Hours schedule and define the period the schedule applies to (8:00am and 5:00pm Monday to Friday and from 10:00am to 4:00pm on Saturday). 3. Create the Managers Hours schedule setting the time period to 24/7 and the holiday mode to Ignore Holiday 4. Create an additional schedule Showroom Armed setting the time period to 24/7 and the holiday mode to Ignore Holiday 5.
Task 5: Creating Areas 1. Navigate to Programming | Areas and click Add to create the Showroom area 2. Select the Configuration tab: Set the Entry Time to 10 seconds. Set the Exit Time to 10 seconds. Set the Alarm 1 Time to 1 minute. 3.
Task 6: Creating a Technician Status Page 1. Navigate to Monitoring | Setup | Status Lists 2. Change the name of the default status list to All Doors and Areas. 3. Click Add to open the Select Devices window 4. Set the Device Type to Door and choose your Controller 5. Select all doors, then click OK 6. Repeat steps 3 to 5 to add all areas to the status list 7. Add a new status list by clicking the Add button on the main toolbar 8. Call this one All Inputs 9.
15. In each of the top panels, set the Type to Status List and choose a different list for each Make sure you set the Rows to 2 in the right most panel 16. In the bottom left panel, set the Type to Event Windows and choose the All Events Record. 17. Adjust the Columns so it spans all 4 columns 18. Save the page Task 7: Configuring Inputs 1.
6. Use the Find tool to locate the PIR inputs 7. Set the Input Type to Instant 8. Use the Find tool to locate the Reed inputs 9. Set the Input Type to Instant 10. Use the Find tool to locate the Showroom inputs 11. Select the Showroom PIR and Showroom Door Reed, then click the Areas and Input Types tab. 12. Set the First Assigned Area to Showroom 13. Use the Find tool again to locate inputs with the word Warehouse 14.
Task 9: Configuring Doors 1. Navigate to Programming | Doors 2. Using our naming conventions, rename DR1 to Showroom Entry MEL 3. Set the Door Type to Showroom 4. Set the Area Inside Door to Showroom 5. Set the Unlock Schedule to Opening Hours 6. Select the Options tab and enable the following options: Door Lock Follows Inside Area Area Disarmed AND Schedule Valid Unlock Door 7. Rename DR2 to Showroom to Warehouse MEL 8. Set the Area Inside Door to Warehouse Task 10: Setting up Auto Disarming 1.
Task 11: Creating User Menu Groups 1. Navigate to Groups | Menu Groups 2. Add a new menu group called Manager 3. Select (enable) the following settings: Areas (1): Area Control Events (3): View Events View (5): View other system information Time (6): Set the Controller time Bypass (7): Bypass Inputs Force Arming: Force arm the system 4.
Task 13: Creating Door Groups 1. Navigate to Groups | Door Groups 2. Click Add button and create a new door group Managers MEL 3. Click Add to open the Doors selection window 4. Select both doors and click OK 5. Change the schedule to the Managers Hours 6. Create a new door group called Sales Staff MEL 7. Add the Showroom and Showroom to Warehouse doors 8. Assign the Opening Hours schedule 9. Create another door group for Warehouse Staff MEL 10. Add the Showroom and Showroom to Warehouse doors 11.
Task 14: Creating Access Levels 1. Navigate to Users | Access Levels 2. Create a Managers access level Select the Door Groups tab and add the Managers door group with the schedule set to Managers Hours Select the Menu Groups tab and add the Managers menu group Select the Disarming Area Groups tab and add the Managers area group with the schedule set to Managers Hours Select the Arming Area Groups tab and add the Managers area group 3.
Task 15: Creating Users, Assigning Access Levels, and Adding Cards 1. Navigate to Users | Users 2. Create a new user named Manny Jah with the PIN 1111 3. Select the Access Levels tab. Add the Managers access level and click OK 4.
5. Add a new trouble input named MEL PSU Tamper Set the Module Type to Analog (AE) Set the Module Address to 1 Set the Module Input to 1 6. Add the remaining Trouble Inputs from the table as shown (excluding 7), adjusting the name and setting the Module Input number accordingly. For instance MEL PSU Mains Failure should be Module Input 2.
Task 18: Creating a Report IP Service 1. Navigate to Programming | Services 2. Select your Controller then click Add to create a new service 3. Set the Service Type to Report IP 4. Set the Service Mode to Start with Controller 5. Select the General tab: Enter the Client Code (or account number). This is the code used to identify the system at the monitoring station and will usually be issued by the monitoring company. For the purpose of this exercise, we'll just use 1234.
Task 19: Addressing Health Status 1. Navigate to Sites | Controllers 2. Right-click on the Controller and choose Get Health Status. The Controller Health Status window appears indicating any areas that need addressing. 3. Right-click the Showroom area from your Technician status page and choose Arm 24 4. Repeat with the Warehouse and System areas. 5. Navigate to Expanders | Reader Expanders 6. Right-click RD1 and choose Update Module 7. Once the module has finished updating, view the health status again.
Task 20: Setting the Controller Time 1. Navigate to Sites | Controllers 2. Right click the Controller and choose Set Controller Date Time.
Review Questions and Answers In This Section Module 101: ICT Company Profile................................................................................................ 417 Module 121: Protege GX Platform Introduction ............................................................................ 419 Module 122: Protege GX Licensing .............................................................................................. 421 Module 123: Protege GX System Architecture ..................................
Module 101: ICT Company Profile Where is ICT hardware produced? China New Zealand Canada Canada and New Zealand Which certification applies to ICT products? UL Certification CE Compliance NIST AES256 Bit Encryption Certification All of the above Where is research and development carried out? China Canada New Zealand New Zealand and Canada Level One: Protege GX Installer Study Guide | August 2013 417
Module 121: Protege GX Platform Introduction Who was the GX platform built for? The Integrator The Consultant The End User The Distributor What type of system is the GX platform best suited to? Single door systems Systems up to 50 doors Enterprise class systems All of the above Complete this statement: WYSIWYG Event reports are...
Where do certification exams take place? Web based, self paced Only at the ICT factory Supervised at the Integrators office Supervised at an ICT approved facility 420 Review Questions and Answers | Module 121: Protege GX Platform Introduction
Module 122: Protege GX Licensing What is the license cap for doors? 250 500 1000 Doors are unlimited What is the maximum number of Controller licenses you will ever pay for? 250 500 1000 Controllers are unlimited What happens when the number of cameras reach 250? No more cameras can be added, the cap has been reached Cameras are now unlimited Nothing, the camera cap is 500 No difference, cameras are not limited anyway How many camera licenses are included in the base license? N
How many operators can log in at the same time with a base license? As many as you like, operators are unlimited 1 As many as you like, users are unlimited 10 To connect 20 PTZ cameras and have them respond to events automatically, what would be required? 10 camera licenses and a DVR HLI license 10 camera licenses, DVRs are unlimited A base license, 10 camera licenses and a DVR HLI license A base license, 20 camera licenses and a DVR HLI license Which licensed feature(s) are required in ord
Which of the following circumstances would NOT require a license update? Restoring an old Protege GX database Adding 150 door licenses Replacing the server motherboard Upgrading Windows on the server Do you need to have Internet access to update your license? No, you can do a manual license update Yes, the automatic license update connects to the ICT licensing server via the internet Yes, even with a manual license update, you will need internet access somewhere to upload the license request
Module 123: Protege GX System Architecture Which database are events stored in? On the Controller only. The server interrogates the Controller for reports. The Protege GX database located on the Server.
What does the GX Client software communicate with? The server only The server for system configuration and reports, and the controller for status updates The controller for configuration and reports, and the server for status updates None of the above Which of the following statements is correct? Controllers can communicate with the GX Server using the Internet Controllers must be on the same local area network as the GX Server Controllers must be on the same corporate network as the GX Serv
Complete this statement... Where budget constraints on a small single Controller site mean an onsite server can't be justified... ...Protege GX is not a suitable solution ...the GX Controller should be programmed using a technicians laptop ...connect the Controller to a shared server using the Internet ...
Module 124: Protege Hardware Overview How many access controlled doors can be directly connected to the DIN Rail Controller? 0 1 2 4 How many onboard high current relay outputs does the DIN Controller have? 2 4 7 500+ How many onboard inputs does the RDM2-DIN Reader Expander have? 7 6 8 4 If installing a system with two doors (both with readers for entry and exit), how many Reader Expanders are required? Two. Each Reader Expander has two reader ports onboard. One.
How many onboard reader ports does the PCB Controller have? 0 1 2 4 How many onboard readers does the PCB Controller support? 0 1 2 4 What's the most RDM2-PCBs you can fit in a Jumbo Cabinet? 1 2 4 8 What is the maximum distance that the Protege Module Network may be run? 100m 900m 1200m 1500m A project requires a run of 300m (1000ft) between the Controller and the nearest Ethernet switch.
In a new installation, how many spurs can come off a Controller on the RS-485 module network? 3 4 250 None - star or spur wiring is not an acceptable method for new installations Can multiple power supplies be connected to the Protege Module Network? No, the Module Network must only be powered at one location Yes, as long as the N+ connection is removed between the split sections Yes, as long as they are all in the same cabinet Yes, as long as they are all in different cabinets If a door nee
How many onboard controllable outputs does the PRT-KLCD have? None 1 low current output 1 low current output and two controllable LEDs 1 low current output, two controllable LEDs and a controllable buzzer How many inputs does a PRT-KLCD keypad have onboard? None 1 input (2 using zone duplex) 2 inputs (4 using zone duplex) 4 inputs (8 using zone duplex) What is the ATH1 module used for? Arming and disarming areas To measure temperature and humidity Reading smart cards Programming s
With a single car elevator system configured as shown, what is the maximum number of floors that could be controlled? PRT-PX16-PCB PRT-CTRL-DIN PRT-RDI2-PCB Primary RS-485 Network Secondary RD-485 Network Wiegand Connection 8 16 128 Unlimited Level One: Protege GX Installer Study Guide | August 2013 433
In addition to basic access control, what optional feature is also shown in this scenario, and what is it for? Goods Lift Floors B, 1-15 PRT-PX16-PCB PRT-CTRL-DIN PRT-PX16-DRI PRT-RDI2-PCB Goods Lift Floors 16-24 PRT-PX16-PCB PRT-PX16-DRI Lift 1 Floors 1-16 PRT-PX16-PCB PRT-PX16-DRI PRT-RDI2-PCB Lift 2 Floors 1-16 PRT-PX16-PCB PRT-PX16-DRI Lift 1, Floors 17-24 Lift 2, Floors 17-24 PRT-PX16-PCB Goods Lift Lift 1 Lift 2 PRT-PX16-DRI Primary Network Secondary Network Wiegand Connection Direct
Module 126: Limitations of SE Hardware in Protege GX Can an RDM2-PCB Reader Expander be connected to a DIN Controller on a GX System? Yes, it is fully supported No, it is only compatible with a PCB Controller Yes, but it requires a firmware upgrade No, it is only compatible with SE systems When running GX with a PCB Controller, what greeting would 'Gordon Groves' see at a keypad if he was user number 4999? Good Morning User 4999 Good Morning Gordon Groves Nothing, only 2000 users are support
If a Controller limitation is exceeded, what happens? Nothing, the Controller ignores anything it can't fit or doesn't know about. The server displays an error. The Controller fault light comes on solid and the status light flashes three pulses. The Controller sends a System Assertion event to the Server.
Module 127: Protege DIN Rail Hardware Configuration In the configuration shown, what is the maximum continuous load that can be drawn by the module network? PRT-CTRL-DIN N+ N- NA PRT-PSU-DIN NB V2+ V2+ V2+ V2+ V2+ V2+ To other modules on network N+ N- NA NB V- V- V- V- V- V- V1+ V1+ V1+ V1+ V1+ V1+ V- V- B- B+ V- V- L Gel Cell Backup Battery V- V- N Mains Input + 4 Amps 10 Amps 3.
Is the wiring method shown in this diagram acceptable? Assume the power supplies indicated in the diagram shown are DIN Rail PSU's.
What does a continuous fast green flash of the status indicator mean? The Module is in identification mode There is Module communications activity The Module is online The Module is attempting to register with a Controller The Bell indicator on a DIN Controller is flashing two green flashes. What does this mean? The Bell output is off. The circuit to the bell is ok. The Bell output is off. The circuit to the siren / bell is cut, damaged or tampered. The Bell output is on.
Module 130: Protege GX Hardware Setup How do you default a DIN Rail Controller? Use the web interface to connect to the Controller, then click on Restart Wire a link between D0 and L1 of reader port 2, then cycle power Turn on DIP switch 4, then cycle the power Log in at a keypad, then select [Menu] [4] [2] [2] [Enter] If the IP address of a DIN Rail Controller is unknown, how can you find it? Turn DIP switch 3 on, then cycle power to the Controller to temporarily set the IP address to 192.168.
How do you access Telnet for the first time on a Windows 7 PC? Start > Run, type CMD and press [Enter], then type telnet [Controller IP] 10001 Control Panel > Programs > Turn Windows Features On or Off then check (enable) Telnet Client Control Panel > Programs > Turn Windows Features On or Off then check (enable) Telnet Server Control Panel > Programs > Turn Windows Features On or Off then check (enable) Telnet Server and Telnet Client What is the default IP address of a PCB Controller? 192.
Module 125: Protege GX System Design Where should copper clad aluminium cables be used? For Reader connection For RS-485 Module Network connection CCA cables should be used wherever possible due to its higher attenuation The use of CCA cables should be avoided If the keypad cable was damaged, causing a short across all conductors, what would happen? Cabinet PSU Controller ZX16 RDI2 Primary RS-485 Keypad Secondary RS-485 The Keypad would stop functioning. The RDI2 would stop functioning.
What happens to...? A lighting circuit is connected to an output on a PX8-DIN module that is programmed to turn on at 8pm and off at 5am. The expander goes offline at 4am, then comes back online at 10am. What happens to the lights after the expander goes offline? The lights turn off at 5am. The lights turn off at 10am. The lights turn off at 4am. The lights turn off at 5am the following day. What happens when...
Module 128: Protege GX Software Installation Which of the following operating systems are NOT supported for server installations? Microsoft Windows XP SP3 Microsoft Windows Vista SP2 Microsoft Windows Server 2008 R2 All of the above systems are supported Which database version is recommended? SQL Server 2008 R2 MySQL Server Enterprise Edition MySQL Server Express Edition SQL Server 2005 What are the minimum CPU and RAM requirements for a Protege GX Server? Intel Atom 1.
Module 129: Protege GX Software Introduction After a configuration change, how long must you wait before the changes take effect? Protege GX is a server based system so changes take effect immediately 60 Seconds The changes won't take effect until you connect to the Controller and download to it Up to the time that is set in 'Download Retry Delay' under the Controller Configuration tab After restoring a database and starting the Data Service what additional step(s) must be taken? Confirm your co
What is the Refresh button used for? To clear the filtered results when using the Find tool To update data when a second client window has been used to configure something To update data when another operator may have made changes to the same record All of the above What is the Events tab in the Programming window used for? To load events for the selected record To load events for the selected record and run a report on these events To show which fields were modified and their old and new va
Module 131: Hardware Programming A module update is required when... You change any settings on the expander You change any programming The Controller advises it is required via the health status All of the above What does the Controller Wizard do? Adds a Controller Adds expanders, inputs, outputs, trouble inputs Links all of the associated records All of the above What steps are required to use the Controller onboard reader ports? None.
If Controller encryption is accidentally disabled, what additional step must be carried out to get the Controller back online? The Controller must be defaulted to clear the encryption key Controller encryption should be enabled again Controller encryption should be initialized again Nothing. If encryption is disabled at the Server, the Controller will continue to communicate Answer the following...
Module 132: User Management What are Access Levels used for? To control which elevator levels they have access to To control what users can do, where they can go and when they can do these things To control how a door responds to a user To provide a way to rank users In an Access Level, what are Door Groups used for? They define which doors a user has access to They allow a number of doors to be unlocked with a single card read They are used for scheduling multiple doors to unlock They def
How do you program a schedule to run from 11pm on Monday through to 2am on Tuesday? Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and check Monday and Tuesday. Program period 1 from 23:00 to 23:59 and check Monday. Program period 2 from 00:01 to 02:00 and check Tuesday. Program period 1 from 23:00 to 00:00 and check Monday. Program period 2 from 00:00 to 02:00 and check Tuesday. Program period 1 from 23:00 to 23:59 and check Monday.
Module 133: Basic Intruder Detection A short time after creating a new area, a health status message appears on the controller.
What does the Input Type setting do? It sets how the input operates in the specified area It sets how the input operates in all areas It sets the Input name displayed in the keypad It sets whether input to use for an on-board expander Which of the default input types should be used for a PIR that is covering the keypad at the main entry? Instant Delay Trouble Silent 24 Hour Alarm 454 Review Questions and Answers | Module 133: Basic Intruder Detection
Module 134: Basic Access Control If a door has been created by the Add Controller Wizard with no additional configuration and it is the Forced Open state, which input must be open? The REN (Request to Enter) Input The REX (Request to Exit) Input The Bond Sense (Lock State) Input The Door Sense (Reed) Input Which inputs are configured by default as bond sense (lock state) inputs on a Reader Expander? 1 and 5 2 and 6 3 and 7 4 and 8 What does this event mean? A card has been read that was
If a new door is created but it is not added to any door groups or access levels, who will have access to it? The Installer Anyone with the 'All Doors' door group Nobody The Manager If a user is automatically logged out of a keypad after a period of time, which option do they NOT have checked in their menu group? Installer (4) Advanced Installer (4, 8) Installer Menu Group Time (6) What do Door Types do? They define which lock outputs to use They set double badge arming They define
Module 135: Integrating Intruder Detection and Access Control Which of the following is a good example of where a Qualify Output should be used to validate a schedule? To change a Doors entry reading mode when an area is armed To keep a door locked on a holiday To turn on the keypad red LED when an area is armed To unlock a door when an area is disarmed To enable automatic disarming of an area when access to a door is granted, which of the following must be configured? Area Inside Door (Set in d
Module 136: System Monitoring How many areas can a trouble input be assigned to? 1 4 None - Trouble inputs are automatically assigned to the System area None- Trouble inputs are automatically assigned to the Trouble area When do you need to set a Reporting ID for a Trouble Input? Only if you want to use a different Reporting ID from the default reporting map Only if you need offsite monitoring for that trouble input Always Never When manually adding a trouble input, where can you find the Mo
Which of these configuration examples are valid for IP Monitoring? They are all valid A is not valid B is not valid D is not valid Which of the following statements are true for ALL IP Monitoring Protocols? No copper phone lines required No copper phone lines required, displays additional, accurate information from site No copper phone lines required, displays additional, accurate information from site, they are essentially 'always online' No copper phone lines required, they are essentia
Module 137: System Commissioning What is the Usage tab used for? It shows which items are linked to the current item It shows when a change was made to the current item It shows the events associated with the current item It shows which operator made a change to the current item If an Output was on and I needed to know what turned it on, what would be the best way to figure this out? Go to the Usage tab of the output Use the find tool Run a usage report Use the 'Load Events' function for t
Can a database that has been backed up from one server be restored to another? Yes, any Protege GX database will work with any Protege GX Server No, it can only be restored to the Server it was taken from Yes, as long as the Server is running the same or newer version Yes, as long as the Server is running the same or older version How do you upgrade a database after it is restored to a newer Server version? By running the software installer and choosing the repair option It is not possible to
TRN-13-1908-08