SE 6000 Security Management System UNIX-based Host Software and Hardware A/E Guideform Specification Version 1.
NOTES: • The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers an easy way to include Westinghouse Security Electronics products in their specifications. • The specifier should carefully select the portions of this document that fit the intended application. • Feel free to consult with your Westinghouse Security Electronics systems integrator regarding your particular application. • Optional feature choices are represented by items enclosed in brackets [ ].
Table of Contents PART I GENERAL ................................................................................................................................................................1 .1 INTRODUCTION ............................................................................................................................................... 1 A. This document describes the required Electronic Access Control and Security Management System software (Host). .........................................
F. Access Control Operation: The system shall have the capability to control access via either central processing or distributed processing. With central processing, Host or Local/Remote Location Controller shall make all decisions when controlling Westinghouse Security Electronics Access Control Units (Controllers). For distributed processing, an intelligent Westinghouse Security Electronics Controller is required to make all decisions locally.
Page intentionally left blank WSE • 3/21/97 16720 — v SE 6000 Security Management System
PART I .1 .2 GENERAL INTRODUCTION A. This document describes the required Electronic Access Control and Security Management System software (Host). B. This specification provides all information necessary to produce a complete proposal for a sophisticated, easy to use multi-tasking, multi-user, UNIX based electronic Security Management System. The appendices contain hardware and software specifications necessary to select the proper equipment for an installation. GENERAL DESCRIPTION A.
.4 5. Enter data of security system database. 6. Connect between Host system and Controllers and related hardware. 7. Test security system communications and operation. 8. Train operators. 9. NOTE: See PART IV.3, “Equipment” for an expansion of this work summary. Block diagram: 1. Submittals shall include a block diagram detailing all connected devices from Host to the door entry device. 2.
D. Host Software: Software Maintenance shall include three levels of support, provided by Westinghouse Security Electronics' Customer Service Organizations, via the systems integrator, as follows: 1. Phone-in Consulting Service, which provides troubleshooting assistance and answers all functional, procedural and operational questions. 2. On-Line Diagnostic Service, with the ability to remotely dial into a specific system through the modem to diagnose and resolve software problems. 3.
B. Architecture: 1. Host Computer (Host): a. b. c. d. e. General: 1) Host computer shall be the nucleus of the required system. It shall provide all necessary capabilities to manage access and alarm activity. 2) Host shall be the single computer that supports all the functions of Access Control and Alarm Monitoring, including file management, reporting and real-time monitoring / control of security hardware devices.
(iii) This system shall replace a failed Host CPU, shall have all necessary system applications loaded, and shall be activated by connection to the proprietary security key device utilized with Host system. (iv) The Redundant Stand-By System shall only be activated only in the event of hardware failure at the Primary System. 2) Host/LC: (i) The second level of redundancy is available through the standard architectural design of the SE 6000.
D. Operator Interface/Operations: 1. Sophisticated Operator Interface: The required system shall provide a sophisticated, easy to operate interface for security operators. The following aspects of the system shall contribute to the effectiveness of the operator interface: a. b. c. Graphical user interface: 1) A graphical user interface, based on the X-Windows system, which permits a user to view and operate multiple screens in several areas of the system simultaneously.
d. e. 3. 4. 5. 1) The system shall have the ability to provide the routing of alarms and alarm instructions to more than one CRT or printer, dependent upon end-user customization requirements. 2) This routing capability shall include categorizing alarms based on “zones” (physical grouping) and “tenants” (people grouping) and then assigning “zone” and “tenant” responsibility to specific monitoring stations and personnel.
7. 5) Shunt, unshunt and restart Controllers. 6) Halt and restart pollers. 7) Activate/Deactivate project schedules. 8) Activate/Deactivate relay outputs. High Resolution Color Graphics at Operator Console: a. SVGA resolution with 256 colors minimum. b. Vector resolution for maps: 1) Utilizing a mouse to facilitate the selection and placement of graphic symbols, the system shall define maps representative of the site. The symbols shall be associated with alarm points.
c. The Audit Trail implementation shall include reporting on the information that affects keyholder access and alarm events, including the following files: 1) Keys holders. 2) Pollers. 3) Devices. 4) Readers. 5) Points. 6) Holidays. 7) Access Groups. 8) Access Codes. 9) Employee Access Assignments. 10) Time Codes. 11) Instructions. 12) Auto Opens/Activates. 13) Device Reports PIN Definition 14) PIN Hardware Definition. 15) Dialers. 16) All SQL database items. d.
11. Project Schedules: a. Implement the capability to use project schedules to alter access to certain doors by activating and de-activating “projects” in the SE 6000. This functionality shall work with access codes and privilege levels to provide another level of clearance checking to the system. b. Doors per project: 16 maximum. Doors included in an active project can be accessed only by cardholders who are assigned a project that includes that door. c. Projects: 128 maximum.
13) ID Security maintenance. 2. Security System Hardware Definition: a. The capability to define the system hardware to the following degree shall be allowed: 1) Access control/alarm monitoring devices. 2) Communications characteristics. 3) Grouping by zone and tenant. 4) Grouping by Anti-passback levels. 5) Defining readers. 6) Defining points. 7) Defining CONTROLLER reports. 8) Defining auto activate/open periods: (i) Proximity access control. (ii) Magnetic card access control.
d. e. 4. 5. 6. 7. 1) The system shall have the capability of dividing the physical site into zones for antipassback control and for arm/disarming security functions. 2) Zone definitions shall be applied to card readers into or out of the zone. Tenancy: 1) The system shall allow for security hardware, areas, and cardholders to be grouped as tenants in the case of multiple tenant occupied facilities.
9. Backup and Restoration of Security System Definitions: a. b. F. The system shall provide the capability to backup to streaming tape the security system definition, including both hardware and user information. System back-up shall be initiated by a menu option for optimal simplicity. c. In the event of data corruption, tampering, or other loss of data integrity, the security system definitions shall be capable of being restored to the on-line system from the backup tape. d.
f. Automated System Control: 1) g. The system shall provide the ability to automatically change the state of certain devices and/or areas based on time. Multiple Identification Required for Access: 1) Selected entrances and exits require multiple methods of confirming identity for entry. 2) The required system must support any combination of the following access controlling devices: (i) Proximity card readers. (ii) Magnetic stripe card readers. (iii) PIN keypad.
e. f. 3. 2) Assigning passback zones: The system shall be able to assign a passback zone and a direction (in or out) to each card reader. A data log shall be generated, and passage denied, when there is failure to alternate entry and exit. The system shall be able to assign a zone number for an adjacent zone number; for example, the system can define a single card reader entering zone 1 and exiting zone 2.
2. 3. 4. 5. c. Automatic transfer of map data entered on Host, in addition to the ability to display and print maps, shall be available at the LC. d. NOTE: System requirements may include some or all of the following alarm monitoring standards. The specifier should carefully select the portions of this section that fit the intended application. Line Supervision / Response Time: a. Host, LC or RLC shall interrogate each alarm point at a minimum of twice per second. b.
9. Operator Definable Alarm Task Programming: a. Tasks available: 100 per event minimum. b. The operator shall be provided with the capability to define a set of tasks to be performed by the system as a result of a specific action. For example, an event such as an alarm condition (smoke detector activated), access event (invalid access attempt) or time trigger (60 seconds after a duress button was pressed) shall initiate a task or series of tasks. c.
c. 3. The system shall allow for the programming of camera titles at any camera or alarm location that is part of the automatic sequence, or is selected manually. 2) The system shall allow for the display of the date and time at the CCTV control monitors.
6. 7. Automatic transaction logging to the time and attendance database. The logs shall include card holder id, no less than 6 user definable fields, clock in/out date and time. 4) Time transaction editing capability to ensure that data is accurate and complete prior to transmittal to an ancillary database. 5) Time transaction reporting to provide a means of verifying the accuracy of any transactions to be exported to a payroll system.] [Electronic Visitor Directory (optional module): a.
(iv) Nesting control shall be provided in order to monitor and track a cardholder who has parked outside of a designated area. The system shall provide the capability for a reader, or series of readers, to be defined for the sole purpose of allowing access to an inner, or nested, parking area. A flag shall be triggered whenever a reader in the “nesting” path is accessed. Upon accessing the reader in the designated area, the flags shall be removed.
2. SE 6100 or LC/1, or RLC/1 System Hardware and Software: a. Manufacturer/Model: Hewlett-Packard SM3 Series. b. Microprocessor: Pentium, 32-bit minimum. c. Processing speed: 77 MHz. d. Random Access Memory: 24 MB minimum. e. Monitor: 256 Color, Super Video Graphics Array (SVGA) standard 110/220v selectable UL Listed, or better. f. Mass Storage: 540 MB fixed disk drive. g. Backup Media: 150 MB streaming tape drive. h. I/O Ports: 1) Mouse port. 2) 1-parallel port.
i. Input media: 1.44 MB 3.5" diskette drive. j. Keyboards: 1) 101 Key IBM PC/AT Enhanced Keyboard Format. 2) Foreign language keyboards are available. k. Printer: Hewlett Packard LaserJet 5 Report Printer, LaserJet 5L Printer, Serial Log Printer. l. Communications: RS-232. m. Operating System: SCO UNIX System V, with SCO Color Graphics Interface. 4. n. Database Management System: UNIFY Accell SQL. o. Advanced Visual Report Writer: Yes. p. Other: 1) Tilt/swivel base.
5. Accessories: a. Optional Peripheral Devices: 1) Printer: (i) Hewlett Packard LaserJet 5 Report Printer. (ii) LaserJet 5L Report Printer. (iii) Okidata Serial Log Printer. (iv) Okidata Parallel Log Printer. 2) Terminal: (i) Hewlett Packard Monochrome Terminal or Color Graphics Terminal. (ii) Terminal emulation software (iii) 2-button serial mouse (required for real-time maps) b. Optional ancillary equipment: 1) Communication Modems: (i) Direct Connection: Short distance (max.
4. Support shall be available to the integrator via the following methods: a. Phone inquiries. b. Direct dial-in to the customer system for remote system troubleshooting by a qualified Field Service Engineer. c. On-site visits if required, upon approval by the manufacturer's Customer Service Manager. 5. Manufacturer shall provide reliable field service support for the computer hardware utilizing Hewlett Packard service. 6.
B. C. System Installation: 1. Install security management hardware. 2. Factory and dealer On-Site Commissioning. 3. Initial startup and verification. 4. Data Entry. 5. Data Entry listing & verification. Verify Installation: 1. Connect access control hardware to security management system. 2. Download data and verify correct operation. 3. Testing total access and management system. 4. Sample Reports. 5. Daily Operation and Monitoring. 6. Dealer deliver “as built” drawings.
PART IV .1 APPENDIX REMOTE DIAL-UP INTERFACE: MODEL RDI A. SE 6000 Remote Dial-up Interface: This interface is designed for the SE 800 Series products. 1. Each RDI Unit supports 3 Controllers which includes : a. b. 2. SE 6000 remote dial-up interface software: 1) Access control and alarm monitoring capability. 2) 8 door & 32 monitor point capability. 3) Dial-up capability to SE 6100/6200/6300 systems. SE 6000 remote dial-up interface hardware: 1) Intel 286 microprocessor.
.2 DATABASE CAPACITIES A.
C.
E. LC / RLC System Database Capacities: HARDWARE / DATA User Terminals Controllers Sensors Sensors with Keypads Monitor Points Output Relays F. CENTRAL 1 16 128 64 512 256 DISTRIBUTED 2 32 256 0 1,024 512 LC1 / RLC1 System Database Capacities: HARDWARE/DATA User Terminals Controllers Sensors Sensors with Keypads Monitor Points Output Relays CENTRAL 1 32 256 256 1,024 512 DISTRIBUTED 2 64 512 512 2,048 1,024 CENTRAL 1 64 512 512 2,048 1,024 DISTRIBUTED 2 128 1,024 1,024 4,096 2,048 G.