Presentation on theme: "Geoffrey Version 5.1.4: Cutting Edge Security Technology"— Presentation transcript:
1Geoffrey Version 5.1.4: Cutting Edge Security Technology 16th-17th June 2003Carmel Indiana
2CCTV/Universal Interface Geoffrey HardwareAlarmsQuick InstallAreas & Area SetsRedundant RecoveryCCTV/Universal InterfaceSample System ConfigurationsCardholdersTime Zones & HolidaysElevator ControlSecurity TourProgram FlashOffline Lock IntegrationGuest Pass/Vistitor TrackingVIP Online IntegrationGURI - Universal Reader InterfaceSoftware Only PresentationClick here to exit show
3How Geoffrey Handles Alarms 16th-17th June 2003Carmel Indiana
4Time Zone Cardholder Files Alarm Label Devices Transaction Groups Examples of Time Zones:5pm – 8am, M-F; 24 hours Sa/Su24 hours, M-F, Sa/SuCardholderFilesTime ZoneGary D’AriesBruce WhiteJason PalleschiJack KahnAlarm LabelExamples of Transaction Groups:Valid AccessInvalid AccessContact ConditionsCommunicationsUser InfoExamples of Alarm Labels:Emergency Exit Door AlarmsSpecific Employee w/ Valid Access to Server Room from 9am-5pm attempting after hours accessAll Invalid Access Attempt into IT Area from 8pm – 6am M-F, 24/7 Sa/SuCommunication Failure with Area ControllerExamples of Devices:ReadersContactsRelaysDevicesTransactionGroups
5Alarm Display: Workstation by User Login Alarm LabelAlarm GroupsAlarm Display: Workstation by Computer NameAlarm Display: Sent to AddressAlarm Display: Workstation by User Login
6Management Alarm Group Alarm Label: Specific Employee w/ Valid Access to Server Room from 9am-5pm attempting after hours accessTransaction Type: CardholderTime Zone: 7 p.m. TuesdayArea: 3rd Floor IT Server Room, East WingPriority: Level 3 Priority AlarmWorkstation: Floor 3 Security Desk, East WingUser: Joseph Smith, Security OfficerUser: Beth Jones, Security OfficerJohn Porter, Asst. Security SupervisorEast Wing Alarm GroupWorkstation: Floor 3 Security Desk East WingWorkstation: Floor 3 Security Desk West WingUser: Brian Fields, Security ManagerJohn Porter, Asst. Security SupervisorJames Walker, Security Supervisor3rd Floor Alarm GroupIf no response in pre-programmed time, reroute to:Workstation: Main Security DeskUser: Brian Fields, Security ManagerBrian Fields, Security ManagerJames Walker, Security SupervisorManagement Alarm GroupIf no response in pre-programmed time, reroute to:
7Management Alarm Group Alarm Label: Communication Failure to IT Area ControllerTransaction Type: CommunicationTime Zone: 2 a.m. TuesdayArea: 3rd Floor IT Server RoomPriority: Level 2 Priority AlarmWorkstation: Floor 3 Security Desk, East WingUser: Joseph Smith, Security OfficerUser: Beth Jones, Security OfficerJohn Porter, Asst. Security SupervisorEast Wing Alarm GroupWorkstation: Floor 3 Security Desk East WingWorkstation: Floor 3 Security Desk West WingUser: Brian Fields, Security ManagerJohn Porter, Asst. Security SupervisorJames Walker, Security Supervisor3rd Floor Alarm GroupWorkstation: Main Security DeskUser: Brian Fields, Security ManagerBrian Fields, Security ManagerJames Walker, Security SupervisorManagement Alarm GroupIf no response in pre-programmed time, reroute to:
8Management Alarm Group Alarm Label: Door Forced OpenTransaction Type: Contact ActiveTime Zone: 8 p.m. TuesdayArea: 3rd Floor IT Server RoomPriority: Level 1 Priority AlarmWorkstation: Floor 3 Security Desk, East WingUser: Joseph Smith, Security OfficerUser: Beth Jones, Security OfficerJohn Porter, Asst. Security SupervisorEast Wing Alarm GroupWorkstation: Floor 3 Security Desk East WingWorkstation: Floor 3 Security Desk West WingUser: Brian Fields, Security ManagerJohn Porter, Asst. Security SupervisorJames Walker, Security Supervisor3rd Floor Alarm GroupWorkstation: Main Security DeskUser: Brian Fields, Security ManagerBrian Fields, Security ManagerJames Walker, Security SupervisorManagement Alarm Group
9Version 5.1: Default templates included in software Customize layouts to your company’s floor plansCustomize .WAV files to match language or accent of operators
17Areas & Area Sets16th-17th June 2003Carmel Indiana
18What is an Area?An Area is a space or group of spaces that have secured entry ways (e.g. door, gate, turnstile, etc.). An area can consist of one reader or a number of readers and can be identified at one location or over several locations consisting of “Door Types” and “Area States”.
19What is a Door Type?A Door Type is the particular model or kind of door which a cardholder is granted access to usePedestrianVehicularHandicappedTurnstile
20What is an Area State?Each area has one of 8 user defined state options (e.g. normal, lockdown, strike, etc.)Area State determines who has access to that area during a specific condition or state.For example, if an area is placed in “Strike” state then only those cardholders with access during Strike will be granted access to that area while in Strike state.Cardholders are given permission to access areas in various states when they are added to the cardholder database.
21Example: Main Lobby Area Northeast EntranceTurnstilesMain LobbyBuilding AWest EntranceTurnstilesSouth Disabled Entrance
22Example: IT Area New York Office Comm Closet on Floor 2 Dallas Office Los Angeles OfficeComm Closets on Floor 6 and Floor 10Dallas OfficeComm Closets on Floor 2 and Floor 7
23What is an Area Set? An Area Set is a group of Areas. For example, a company can set up an “IT Set” to grant IT employees access to the Perimeter Area, Lobby Area, Common Area, IT area and Comm Closets.
25Area Sets Administration Area Set Perimeter Area Administration Area HR Area SetHR AreaAccounting Area SetAccounting AreaManufacturing Area SetManufacturing AreaManufacturing Administration Area SetManufacturing Office Area IT Area SetPerimeter AreaLobby AreaCommon AreaIT areaComm ClosetHandicapped Admin Area SetPerimeter Area – HandicappedAdministration AreaExecutive Area SetHR AreaAccounting AreaComm Closet AreaManufacturing AreaManufacturing Office AreaExecutive/IT Lobby AreaExecutive/IT Common AreaExecutive AreaIT AreaPerimeter Area – Pedestrian/VehicularHandicapped Executive Area SetPerimeter Area (Handicapped/Pedestrian/Vehicular)Administration AreaHR AreaAccounting AreaComm Closet AreaManufacturing AreaManufacturing Office AreaExecutive/IT Lobby Area - HandicappedExecutive/IT Common AreaExecutive AreaIT Area
30How Geoffrey Handles Cardholders 16th-17th June 2003Carmel Indiana
31Accounting Department Cardholder Access Normal work day for an Accounting Clerk is 9am-6pm. All other employees have a normal workday of 9am-5pmDuring the annual audit the daily workday changes to 8am-7pm and Saturdays from 9am-noon
32Cardholders: Status Levels (Acct Clerk Normal Workday) System ReadersStandard System Time ZonesPerimeter Reader #1Administration Area Reader #1Administration Area Reader #2H.R. Area Reader #19am-5pmM-F5pm-10pmM-Th7am-9am9am-NoonSat
33Cardholders: Status Levels (Acct Clerk During Annual Audit) System ReadersStandard System Time ZonesPerimeter Reader #1Administration Area Reader #1Administration Area Reader #2H.R. Area Reader #19am-5pmM-F5pm-10pmM-Th7am-9am9am-NoonSat
34Status Level IssuesLimited number of time zones programmed into some systemsUsing time zones defined in the system may grant unnecessary access for times when administrators don’t really want the employee to have access (e.g. granting access from 5-10pm when access is only really needed until 6pm)Extending or temporarily changing access requires the creation of a new status levelAdministrators must remember to change that extended access back to normal access after time has passed
35Cardholders: Area Sets Time ZonesCardholder AccessArea Sets
36Cardholder Access Options in Geoffrey Change Area State to “Audit”Extend access with expiration at end of auditCreate “Accounting Department Time Zone” (Geoffrey has unlimited time zones)
37Elevator Control16th-17th June 2003Carmel Indiana
38GIONX24 is used with a GRCNX 8 or 16 Controller to for elevator control Elevator Cab #1 5 FloorsReader
39GIONX24 can be used to control multiple elevator cabs Elevator Cab #1 10 FloorsElevator Cab #2 10 FloorsReader
40GIONX24 can be used to control multiple elevator cabs Elevator Cab #1 5 FloorsElevator Cab #2 5 FloorsElevator Cab #3 5 FloorsReader
41Elevator Cab #1 3 FloorsElevator Cab #2 3 FloorsGIONX24 when used for elevator control can be used in conjunction with other devices on the system.
43Program FlashEnables firmware to be flashed to Controllers and InterfacesMinimizes trips/time at customer sitesNo need to change chips for new or updated features
44Guest Pass/Visitor Tracking 16th-17th June 2003Carmel Indiana
45Guest Pass Setting Options Fully integrates with Geoffrey Access Control SoftwareOperators can assign access control privileges to authorized guestsOperators can be allowed to authorize guests for sign-in or sign guests in automaticallyGuest Pass System can require portrait and/or signature capture
46Guest Pass Setting Options Guest Pass System can send to the host upon their guest’s sign-in or sign-out; this can include their portrait if capturedEnable label or photo ID badge to be printed or generic visitor badge to be recorded in guest recordGuest Pass System requires a Primary Contact and can be configured to require a Secondary Contact as wellSign-In/Sign-Out instructions can be defined per guestDefine color codes for Valid Guests, Guests about to Expire and Expired Guests
47What is a Guest Pass Location? A Location is any place(s) where the Geoffrey Guest Pass System is runningA Location is defined as some place or places that are going to be responsible for guest acceptance. Each location defines its own Guest Pass Settings.A Guest Pass System can be installed and operated in any location where Geoffrey is running
48Location Examples: 4 Separate Guest Pass Systems/Licenses Office Bldg on Cabot Place WestOffice Bldg on The South ColonnadeOffice Bldg on Columbus CourtyardOffice Bldg on Cabot Place East
49Location Examples: 1 Guest Pass System/License Office Bldg on Cabot Place WestOffice Bldg on The South ColonnadeOffice Bldg on Columbus CourtyardOffice Bldg on Cabot Place East
50Guest Pass Run Through… These examples show the Guest Pass System with all options turned on. The system can be tailored to meet your specific needs.ADD A NEW GUEST - Add a new guest to Pending, Not AuthorizedAUTHORIZE A GUEST - Add guest to Pending, AuthorizedSIGN A GUEST INSIGN A GUEST OUTWeb InterfaceClick here to return to the Main Menu
82Guest Pass: Web Interface Using the Geoffrey Web Interface, users can authorize guests ahead of time remotely.Using the web interface is a quick and convenient way to alert security officials of anticipated guests.
83Geoffrey Universal Reader Interface 16th-17th June 2003Carmel Indiana
84Geoffrey Universal Reader Interface A Solution for Building Owners or Property ManagersUse up to Four Different Access Control Systems and Share Readers in Common Areas
85GURI: Specifications Specialized Firmware Use Any Wiegand Signal Output DeviceLED Control for Each Access Control System
86Old Way:Here’s How It Works Access Control System A (access granted)Access Control System B (access denied; not in controller memory)Access Control System C (access denied; not in controller memory)Present Card
87Geoffrey Way: Here’s How It Works Access Control System AAccess Control System BXAccess Control System CXGURI interprets Bit Pattern and sends the transaction to only the corresponding access control systemAccess Control System DXPresent Card with Encoded Bit Pattern A at any Wiegand Signal Output DeviceNo transaction is sent to the other Access Control Systems
88One Last Note…The GURI interprets bit patterns and site codes only from Wiegand signal output devicesSample encoded cards are required for GURI setup
89Geoffrey Hardware16th-17th June 2003Carmel Indiana
90Geoffrey Hardware: How it Works for You CompatibilityComplete firmware library can interface with any readers, biometric device or access control card in the market todayEconomic StabilityMultiple site codes and multiple bit formatsCommunication interface – Multiple communication channels to peripheral devicesDirect connect u to 16 controllers per hardwired channelIP Addressable – virtually connect over WANDial up modem 254 remote locationsRetrofitHardware can be used with most current cards & existing installed card reader headsFeaturesReader controllers with up to 8MB of dynamically allocated memoryElevator controlCopy monitorAdvanced configurations to include complete hardware redundancy
92Geoffrey GRCNX What does the GRCNX do? GRINX The GRCNX contains the customer’s database, card population and access rules. It monitors the contact inputs and relay controls.The GRCNX is “blind” to the actual access device as it has already been decoded by the GRINX.
93Geoffrey GRCNX-8/16 Features Standard FeaturesUp to 16 Card Reader configurations Using 8 Communication Channels (2 Readers Per Channel)Standard 1 MB Memory dynamically allocates 1000s of cardholders and transactionsTwo 3-Amp SP/DT Outputs and 8 Supervised or Unsupervised Inputs 7-Amp Hour Gel Cell Battery Backup for Standby OperationFlash Memory Provides Firmware Upgrades via Software Communication LinkBuilt-In Noise SuppressionBuilt-In Surge Suppression
94Geoffrey GRCNX-8/16 Features Optional FeaturesUp to 7MB of Additional Memory (8MB Total) for Larger Databases (GMEMNX-3, GMEMNX-7)I/O Expansion Module Allows 8 Additional Supervised or Unsupervised Inputs and 12 3 AMP SP/DT Outputs for a Total 16 Inputs and 14 Relays (GIONX)Plug-in IP Addressable Board Allows Communications over Local or Wide Area Networks (TCP/IP) (GIPRCNX)Plug-in Modem can be used for Primary Dial-Up Communications or as Secondary Alarm Communication when Using Network Connection (GMODNX)GMEMNX-3GMEMNX-7GIONXGMODNXGIPRCNX
97Geoffrey GRCNX-2 Features Standard FeaturesStandard 1 MB Memory dynamically allocates 1000s of cardholders and transactions16 Supervised or Unsupervised Inputs, Two 3-Amp SP/DT Outputs and 4 Solid State Relays2 Card Reader ConfigurationDirect Connect to Reader HeadsFlash Memory Provides Firmware Upgrades via Software Communication LinkBuilt-In Noise SuppressionBuilt-In Surge SuppressionDoes not require GRINX for reader hook upOptional FeaturesPlug-in IP Addressable Board Allows Communications over Local or Wide Area Networks (TCP/IP)Plug-in Modem Allows Dial Up Connection
99The GRINX is the System’s “Decoder” Geoffrey GRINXThe GRINX is the System’s “Decoder”GRCNXThe GRINX initially decodes the technology of the Reader (card reader, biometric device, etc.The GRINX then sends all encoded information to the Reader Controller (GRCNX) which verifies user access based on the end user database.
100GRINX FeaturesFlash Memory Allows Download of Different Firmware Programs from PC to Allow Connection to Different Reader Technologies and Multiple Formats of Bit Patterns of CardsHas 7 Contact Inputs and 1 or 2 Output Relays (GRINX-1, GRINX-2)Can work in “degraded” mode (reads one or more site codes) if Communication Failure occurs between the Reader Controller and the Reader Interface (Note: Software Configurable per device).
102Geoffrey Pre-Wired Enclosures Advantages:Pre-wired and pre-tested enclosures with on-board power supplies reduce setup timesPlug & Use Design – Snap on/off board replacement with pre-wired field connectors (Supports reader heads, door strikes contact inputs, data and power)Excellent solution for consistent regional or nationwide installationReduces manpower requirements during installation and decreased disruption in client’s daily businessMakes service and maintenance easy because the enclosure gives consistency to every site and reduce the training curve for personnel
104The GIONX24 is the Easy Way to Expand Geoffrey GIONX24The GIONX24 is the Easy Way to ExpandGRCNXElevator or Alarm Control Can Be Integrated Using the GIONX24. GIONX24 Elevator Control is subject to GRCNX Memory Requirements. GIONX24 can attached directly to a Parent GRCNX8/16 or to a Child GRCNX8/16.
105GIONX24: To Easily Expand A System Provides 24 supervised contacts and 24 SP/DT OutputsCan be used as a child to a parent GRCNX8/16 in conjunction with other Reader Controllers and Reader InterfacesAny input can be associated with any output response or many output responsesOne or more GIONX24s can be used to provide alarm control or elevator floor control; each GIONX24 is capable of up to 24 floors (1 contact per floor subject to GRCNX memory requirements)
106Universal Triggers16th-17th June 2003Carmel Indiana
107Universal TriggersEnables an action or a series of actions to occur in response to a trigger eventThese trigger/action events can be sent over any or allCIMsControllersReadersContactsRelays
109A two door system can easily be expanded. Serial connection
110GXLT2: RS232 to RS485 Translator Features GXLT2 enables PC to communicate with up to 16 GRCNX2sIdeal, cost effective solution for smaller systemsDirectly communicates with the PC (Max distance: 50ft)Communication between the CIM and GXLT2 is via RS232 protocol. Communication between GXLT2 and GRCNX2 boards is via RS485 protocolMax distance between GXLT2 and GRCNX2: 4,000 feet
111Simply put…Geoffrey Quick Install Saves hours of programming and verification time during setupIs designed exclusively to work with the GXLT translator board and the GRCNX2Works with magnetic stripe, proximity, stand alone keypad and Wiegand output readers
112How Quick Install Works: The user is supplied with a database that has many essential access control features predefinedThe database is consistent and organized – System Manager, Automatic Override, Manual Override Definition, Manual Override and Cardholder Definition Modules are virtually preprogrammed
113Quick InstallDevices in the hardware map are color coded and easily customized:CIM-greenCIM ports-redcontrollers-grayreaders-yellowrelays-dark bluecontacts-maroon
114Quick InstallTo “Activate” a device, simply type in the appropriate information and check “Installed”
115Quick Install Features Each predefined override task has all necessary actions predefined as wellExample: Door contact open causes an alarmDescription field names can be changed by the user to something more meaningfulExample: “RCNX2 #1; Reader 1” can be changed to “3rd Floor Computer Room”
116Quick Install Features Geoffrey guarantees to not have any programming or typographical errors during the initial setupCards with encoded IDs are shipped with the system to be used in conjunction with Geoffrey supplied readers for testing.
117Quick Install Limitations No Global Anti-Passback (Anti-passback can be obtained by creating one IN and one OUT reader on a GRCNX2)No global transaction across controller board (No triggered event on one controller board can cause an action on another controller board)Door Force Open will only work using the Geoffrey standard definition (The DOD must be defined on Input 2 or Input 4 for the RCNX2 boards. The GRCNX2 can distinguish between Door Open Detect and Door Forced Open and can be an alarmed event)
118Redundant Recovery Solutions 16th-17th June 2003Carmel Indiana
119What is Redundant Recovery (RR)? An automated method of quickly reconfiguring Reader Controllers and Geoffrey software components to use an alternate SP, Data Directory, Server or CIM when some [catastrophic] failure occurs
120Why do customers need RR? Minimize “down time” of Geoffrey system in a catastrophic situationMinimize the loss of data to only a few seconds or minutes instead of all data from failure to last backup which could be hours, days or weeks
121How does Geoffrey RR work? Geoffrey has customized Microsoft® SQL Server Replication technology to provide an application that requires little human intervention and allows for automated switchover of CIMs, SPs and/or Servers
122Workstations 1-25+ Main CIM Cardholder Transactions Manual Override CommandsAlarmed EventsUniversal TriggersAuthorized Operator initiates Geoffrey RR Application to begin automatic switchoverMain SPWorkstations 1-25+Main Server
124Why is Human Intervention Required? RR does not monitor the Geoffrey system to determine communication failures and switch to alternate configurations automaticallySome failures may not require the system to be switched over to the backup devicestemporary network traffica device rebootingsome other non-critical issue
125How is RR initiated?RR procedures are initiated by a human operator via the RR Application – a separate application from the Geoffrey System Launcher that does not rely on communication with the SP. In an emergency, this communication may be lost.
129What is the benefit of the RR Application? The RR Application aids the operator by only having to login to the RR Application.The Operator does not need to login to each individual workstation to change the Geoffrey Registry SettingsAll Reader Controllers are contacted and redirected to communicate with the alternate CIM
130Geoffrey Redundant Recovery System Summary Minimize downtimeMinimize loss of dataCustomized, reliable Microsoft technologyOperator initiated to prevent erroneous or unnecessary switchoverReader Controllers and workstations are automatically re-addressed and directed to communicate with backup devices through RR applicationAlarms, transactions, triggers, etc are automatically rerouted to backup devices
131Sample System Configurations 16th-17th June 2003Carmel Indiana
141Main File Server – Dallas GMT-06:00 New York GMT-05:00Los Angeles GMT-08:00Denver GMT-07:00Chicago GMT-06:00Main File Server – Dallas GMT-06:00
142Geoffrey Version 5.1 Software 16th-17th June 2003Carmel Indiana
143Geoffrey Software: Features that Benefit You CompatibilityStandard Operating Systems – Windows 2000/NT/XPODBC compliant database (Microsoft SQL)Auto backups available with SQL Agent SoftwareConvenient drag and drop featuresOutlook bar navigationExpandabilityExpansion can be over direct wire, dial up communication, local or wide area networkRetrofitImport existing personnel from other systems (e.g. Human Resources)
144Geoffrey Software: Features that Benefit You Security StandardsMeets bank industry data center security standardsSecure individual administration rights over part or all of the systemRun secure individual reports by loginToolsVideo imaging/Integrated BadgingGlobal anti-passbackOptionsVisitor tracking software – optional web interface availableDigital video retrieval for event/video recallCustomized user reports via Crystal Reports WriterSoftware can run as a single client or multi-client
145A look into Version 5.1: How Geoffrey Extends Time or Expires Cardholder Access Real Time or Pre-Set Activation, Extension or ExpirationChange AccessSystem Wideby AreaBy Area Setby Cardholder CategoryBy Individual Cardholder
146A look into Version 5.1: Wizards Make it Easy Add new cardholdersDuplicate access permissions for new cardholdersCreate and launch custom reportsEasily operate optional guest pass software
147A look at Version 5.1: Tools & Options Auto schedule dial up updates to controllers“Advanced Find” allows quick and easy search of the databaseOptional Guest Pass System with Web Enabled Software and Wizard to easily add new guests
149Security Tour Checkpoints Any card swipe or contact active can be a checkpointGeoffrey allows and unlimited number of checkpoints to be entered into any tourA transaction is generated whether a checkpoint is reached or not
150Security ToursGeoffrey allows and unlimited number of tours to be definedUser Defined Tour NamesUser Defined number of minutes between each checkpoint – 1 minute minimum, virtually unlimited maximumSet read-only or administrative rights to each view of a tour and see all checkpoint readers/contacts regardless of system security permissionsOne cardholder walking per tour
151Security Tour Transactions Color-coded transactions report:Start/StopPaused/ResumedTimed outOut of sequenceStandard reports available with softwareAll transactions can be alarmed and fully integrated with Geoffrey Graphics Package
155Other Features Window of time (+/-) time for to each checkpoint Reader Initiated Start or Workstation Initiated StartAdvanced find features includedRight click to restart tour where “out of sequence” notification appeared allowing tour to continue without starting at initial checkpoint
15912 min (±2 min) 5 min (±2 min) 15 min (±5 min) 10 min (±5 min) Security DeskCheckpoint #712 min (±2 min)Checkpoint #15 min (±2 min)15 min (±5 min)Checkpoint #5Checkpoint #610 min (±5 min)20 min (±7 min)Checkpoint #325 min (±10 min)Checkpoint #2Checkpoint #4
160What Offline Lock Integration Means Combines the efficient system layout and easy programming with the convenience of offline lock capabilityNo other parent device is required, the operator programs the offline lock into Geoffrey and then downloads the permissions to their PDA as usual and programs the individual offline locks.
161Benefits: Program the online system and offline devices simultaneously Relock delay is user definableUnlimited number of credentials to be assigned to each cardholder including online access cards, ibutton or PIN or any combination (e.g. access card & PIN or ibutton & PIN). PIN only or PIN & card vary per offline deviceEach offline lock can have its own magnetic stripe template.
162Benefits:Activation and expiration dates are user definable per credential. Offline credential expiration defaults to one year from the date of activation.Schlage offline locks support up to 16 interval time zones and 32 holidays intervals, the operator can create these time zones and holidays in Geoffrey and designate them as “offline”. Holiday function is programmed in Geoffrey as passage, secured, lockout, etc as modeled after LockLink Express®.
163How programming works: Program credentials in GeoffreyProgram Offline DeviceOffline Lock Module will indicate that programming is necessaryDownload credentials to PDA via Uplink
164How transaction history works: Using PDA, download transactions from offline deviceOperator is able to run reports on offline lock device transaction history and archived dataUse Uplink to upload data to Geoffrey Offline Lock ModuleOffline Lock Module will synchronize data
166Online Support for the VIP Lock Complete monitoring of door from the locksetDoor position, latch position, valid and invalid credential, request to exit mechanical key override contained in the door hardwarePanel interface board connects to third party access control panelPanel interface board accommodates up to 4 VIP locksetsMortise, cylindrical and exit device lock applicationsConnect interface board directly to panel via RS485
167Offline Support for the CL Lock Offline locking solution for college campusesManage large student and faculty populationsLock and system software can accommodate an unlimited number of key cards and unique PIN codesDefine access plan, user types, and campus locks via user-friendly GUILock definition feature allows you to restrict access based on gender and allows for ADA-specific timing.Access plan is customizable which allows the user to use their own nomenclature to name properties of their access plan.