Specifications

LENEL
®
- A UTC FIRE & SECURITY COMPANY FACILITY COMMANDER™ v2.2.3 GUIDE SPECIFICATIONS
[PROJECT NUMBER]
[DATE]
[PROJECT NAME]
[PROJECT LOCATION]
[AUTHOR]
[FILE NAME]
INTEGRATED AUTOMATION INSTRUMENTATION & TERMINAL
DEVICES FOR ELECTRONIC SAFETY & SECURITY SYSTEMS
25 38 00 - 13
LENEL CONFIDENTIAL INFORMATION For use by Lenel-authorized VARs, prospective or existing Facility Commander users
and their respective authorized consultants. All other third-party use is prohibited without Lenel’s written permission.
(e) Location.
6) Video Clip Storage.
(a) Tag video clips automatically as a result of predefined events in the
system.
(b) Allow any subsystem alarm or event to be linked with a video clip.
(c) Store all video tokens in primary system database.
(d) Each video clip shall reference the date and time of the event in the
token name.
(e) Retrieve the video on-demand from the DVR's hard disk.
(f) Provide a snapshot feature, allowing operator to store a single video
frame in JPG format on their local workstation disk.
g. Graphics Viewer
1) Allow operators to respond to alarm events and issue commands from a
graphic representation of the facility and systems.
2) Allow device monitoring and control using symbols on a graphical map.
3) Control toolbar shall provide quick access actions for selected device.
4) Limit the symbols displayed on a map based on an operator's facilities.
5) Determine the alarm state of each device by the symbol's appearance.
(a) Set.
(b) Reset.
(c) Cleared.
6) Device symbols without associated alarms in the alarm monitor shall appear
in their initial state.
7) Operator Controls.
(a) Size the map as desired maintaining aspect ratio.
(b) Dynamically select the map layers in active view.
(c) Launch a control toolbar for any object on the graphical map.
(d) Send device-type dependent commands.
(e) Lock or unlock a door.
(f) Launch live video.
(g) Answer intercom calls.
(h) Acknowledge alarms.
h. Third-Party Program Launcher.
1) The client Launcher shall allow operators to define up to six (6) additional
third-party applications that can be launched.
2) Customized icons can be defined for each third-party application.
E. System Management
1. Configure system servers
2. Monitor and report status and alarms
a. Remote media server communication failure
b. Access system communication failure
3. Notify browser session operators of pending shutdowns upon any operator action
.
F. Access Control Management:
1. Configure to support associated access control systems
a. Import access points
b. Digital inputs
c. Logical inputs
d. Digital outputs
2. Synchronize device information between host server and access control systems
3. Monitor and report access status and alarms
a. Door forced alarm
b. Door held alarm
c. Door pre-alarm