Rich Ames :Training NetTech

Slides:



Advertisements
Similar presentations
Yokogawa Network Solutions Presents:
Advertisements

SK-NET™ Tutorial SK-NET™ is a Windows® based software program designed to monitor and control a network of up to 100 Secura Key SK-ACP 2-door control panels.
S2 Training Guide OVERVIEW 1. … DESKTOP 3/31/2017.
SK-NET™ 4.0 Tutorial SK-NET™ is a Windows® based software program designed to monitor and control a network of Secura Key SK-ACP 2-door control panels.
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
NetTech S2 NetBoxTM Rich Ames :Training
GALVESTON COUNTY, TX P-CARD TRAINING GALVESTON COUNTY.
DATA ACQUISITION SmartLog X3 DescoEMIT.com Rev:
Total HVAC Control from anywhere Easy control that can save a fortune
Technical Tips. Getting Started with emPower™ Learn-in your new Z-Wave-enabled Alarm.com module following the same process as before: – Perform a Module.
Medicaid Alternative Benefit Plans (ABP) Processing
DNR-322L & DNR-326.
KX-NS1000 Initial Set Up For step by step : 16 May,
Remote Monitoring and Management Solutions ®
Operating System Customization
FireClass FC501. What’s FC501 ? An entry level Triple Circuit Single Loop addressable system featuring Intelli-Zone mapping An “out of the box” panel.
Linkage Connecting system components. Allows configuring automatic actions Triggering outputs based on specific inputs Used for removing human reliance.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Training.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
Confidential Document 1 EverAccess Product Overview By Julian Garcia.
04/26/2011Marshall Electronics, Inc. © H.264 Cameras and Servers Sales & Technical Training Presented By: Jim LucasNigel Hamley, MBKS Product ManagerManager.
Monitoring systems COMET types MS55 & MS6 MS55/MS6 Configuration.
Copyright © 2013 FingerTec Worldwide Sdn.Bhd. All rights reserved.
1. 2 LXU800 User’s Manual 1.Installation – Windows XP UI Features Introduction Data Connection & Disconnection.
Lesson 10 Operating System Customization
Advanced Networking for DVRs
AXIS 2460 System Overview  AXIS ETRAX 100LX  ARTPEC-1  4 MB FLASH  32 MB RAM  Up to 4 internal IDE hard disks  Linux 2.4.
Ch 11 Managing System Reliability and Availability 1.
SmartLog X 3 TEAM Basic SmartLog X 3 TEAM Basic DescoEMIT.com USER STATUS USER EDIT TEST LOG ADMIN TEST MACHINE SCHEDULE INSTALL System Requirements:
© 2007 NeoAccel, Inc. NeoAccel SGX Installation Guide Dear Customer: We are pleased to provide you with our training presentation for our SSL VPN-Plus.
Configuring the MagicInfo Pro Display
NV V5.7 Product Presentation. Brand New Professional GUI  Multiple User Interface for different look and feel  Audio indicator on camera (play audio.
NetVuze Precision Network Meter standalone, easy to use, networked with data logging.
TrekView DMS Instructions. 1. Log in to TrekView DMS.
10 February Doors Software Overview. 10 February This presentation is an overview of the basic fundamentals of the Doors software. –Host computer.
WCR 12/2002.
• INDEX • CHAPTER 1. Installation • CHAPTER 2. Function introduction
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
Troubleshooting Windows Vista Security Chapter 4.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
SUSE Linux Enterprise Desktop Administration Chapter 12 Administer Printing.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
3 rd Party Integration – Paxton Apr, Agenda Solution Partner Introduction Integration Introduction Product Demo Technical Issue Escalation Quick.
Computer and Information Science Ch1.3 Computer Networking Ch1.3 Computer Networking Chapter 1.
NetVu Console Product Training V2.0 US.
Windows monitoring Unit objectives: Monitor the operating system Monitor system performance Backup and restore operating system files and data.
MCS-Connect Revision - 12/22/2015.
LOGO Yeastar Technology Co., Ltd. Enterprise Communication.
Confidential Document 1 EverAccess Product Overview By Rodney Guinto.
iVMS-5200 Pro V3.3.0 Introduction
Zones 1 to 8 Siren Keypad Power 12V Data and clock By default: Zone 1 Entry Exit 2 Follower 3 Instant 4 Instant 5 Instant 6 Instant 7 Instant 8 Panic.
NIMAC for Accessible Media Producers: February 2013 NIMAC 2.0 for AMPs.
Run the on your PC to start the firmware configuration process Run IP Config Tool.
Online Testing: What is an SRF and Why Should I Care? District and Campus Coordinators, Technology Staff, and Test Administrators.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Business Objects XIr2 Windows NT Authentication Single Sign-on 18 August 2006.
American Diploma Project Administrative Site Training.
CACI Proprietary Information | Date 1 PD² SR13 Client Upgrade Name: Semarria Rosemond Title: Systems Analyst, Lead Date: December 8, 2011.
IT Desktop Management GoToMeeting – Online Meeting Service Organizer/Presenter Guide May 2007 Prepared by Angela Mars IT Education and Training.
American Diploma Project Administrative Site Training.
American Diploma Project Administrative Site Training.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
ICAICT201A USE COMPUTER OPERATING SYSTEM. USING THE CONTROL PANEL The Control Panel contains many options for configuring your computer, including: adding.
Local Alarm Station Data Acquisition, Storage and Visualization for Radiation Portal Monitor (RPM).
SIMPLE & MODULAR PC BASED DOOR ACCESS CONTROL v1.00
IP-AK2 Access Control Solution
How to Create and Start a Test Session
Presentation transcript:

Rich Ames :Training NetTech _________________________________________________________

Security Administrator S2 System Architecture Internet Temp Probe Door Lock Portal NetDoor Node IP Network Reader Video Recorder Analog Camera Photo ID Camera Photo ID Badge Printing Security Administrator IP Camera IP Camera (PTZ) IP Network Security Monitor NetBox Node NetBox Temp Probe Door Lock Reader Portal Alarm Remote Support Alarm Panel Door Lock Portal Reader 6 5 4 3 2 1 Elevator Gate Reader Portal Lighting

Network Controller, Node & Expansion Blades

NetDoor Node, with Access Blade

S2 System IP Network NetDoor Node Internet Controller Node 192.168.1.201 NetDoor Node Internet IP Network Controller 192.168.0.250 Node 192.168.0.245 192.168.0.237 NetDoor Node Node 192.168.0.220

S2 Hardware Standard (Solid State) Limitations S2 Net Box Nodes per System 24 Card Readers per System 140 Tested/Certified Access Cards per System 60,000 Card Formats 32 Simultaneous Users 10 Alarm Input Points 500 Output Dry Contacts Temperature Probe Inputs Online event history log 50,000 records Time specifications 100 Threat Levels 8 Holidays 30 Cards per person

S2 Hardware Enterprise (Hard Disk) Limitations S2 Net Box Nodes per System 256 Card Readers per System 3500 Access Cards per System 150,000 Card Formats 32 Simultaneous Users 25 Alarm Input Points 7168 * Output Dry Contacts Temperature Probe Inputs Online event history log 50,000 records Time specifications 100 Threat Levels 8 Holidays 30 Cards per person

Enterprise System Enterprise Controller

S2 Combo Board Controller LED NC to NN NC to NN Speed NN Count N Com Connection Activity Node LED Action Co-Processor NN Com Power NN to NC Speed NN to NC Activity

Initmode Starting point with new NetBox Controller Set IP Address (Controller starts on “0” subnet) Set Time (Controller) Email Settings Initmode (turn off?)

Localization Date Formats Languages 05/31/2004 31/05/2004 2004/05/31 English - Spanish Thai - Italian French - Japanese Portuguese - Chinese

Network Port Usage

Securing NetBox Data: Assumption: Interactions between the various networked components in any Network are not inherently secure. For the S2 System, each of these pathways is secured.

Secure by Design Minimal security vulnerabilities: Network Security The NetBox is a “locked down” networked information appliance. S2 controls the software/firmware that is on it. The NetBox has a single purpose. It is not a general purpose computer. Minimal chance for virus attacks Network Security User Login, User Roles, Session Token SSL Encryption Authentication & Tamper Detection

Access Blade & NetDoor Blade REX (Input) Buzzer (Alarm > Output) DSM (Input) Door Lock (Alarm > Output) Card Reader (Reader/Keypad) Reader 1 Reader 2 1 2 3 4 Temp Input Outputs Inputs Net Door

Access Control Blade 4 Inputs 4 Outputs Two card reader connectors Readers using standard Wiegand output up to 128 bits are supported. 500 feet (152 meters) Four Supervised Inputs Door contacts and REX devices. Standard two wire inputs (supervised or unsupervised). 2000 feet (610 meters) Four Relay Outputs Strike output, door opener, buzzer. Standard 3 pin normally open or normally closed. NOTE: Inputs and Outputs not used for door hardware can be used for other functions. 4 Inputs 4 Outputs 2 Wiegand Readers

Alarm Inputs 8 Standard two wire inputs. A variety of supervised and unsupervised inputs can be configured: PIR, Exit Request, Alarm button. Door Status Monitor Input blade barcode numerals begin with “01.”

Temperature Inputs 8 Standard two wire inputs. S2 temperature probe. Max distance 500 ft. (1000 ft with Category 5 wire) Operating Range: -55º C to 100º C (-67° F to 212° F) Temperature blade barcode numerals begin with “08.” NOTE: For distances up to 500 feet (152.4 meters) use Category 3 cable. For distances over 500 feet up to 1000 feet (304.8 meters) use Category 5 cable.

Output Blade Output devices: Strikes, Mag locks, sounders, etc. Eight 3-pin output relays Standard normally open or normally closed Form C Relays Suitable for controlling many strikes, but a step up relay should be used for magnetic locks. Max ratings: 30 Volts DC or AC, 2.5 Amps inductive or 5.0 Amps non-inductive Requires appropriate suppression: MOVs or diodes Output devices: Strikes, Mag locks, sounders, etc.

Slot/Connector Positions Expansion Slots Slot/Connector Positions

The Portal Access or Egress Point Associate Inputs and Outputs Door Gate Turnstile Associate Inputs and Outputs Readers, Keypads Locks Rex, DSM

Access Blade & Portal Portal Access Blade Buzzer (Alarm > Output) REX (Input) DSM (Input) Buzzer (Alarm > Output) Door Lock (Alarm > Output) Card Reader (Reader/Keypad)

10 Steps to Gain Simple Access Wire and connect a Reader and Door Lock. Define a Reader Define an Output (Lock) Define a Portal with Reader and Lock

Basic Access Requirements Portal Reader Lock

10 Steps to Gain Simple Access Wire and connect a Reader and Door Lock. Define a Reader Define an Output (Lock) Define a Portal with Reader and Lock Define a Card Format

Decoding Credentials Test and Compare to determine format Decode content

Basic Access Requirements Portal Reader Lock

10 Steps to Gain Simple Access Wire and connect a Reader and Door Lock. Define a Reader Define an Output (Lock) Define a Portal with Reader and Lock Define a Card Format Define an Access Level for Readers/Groups

Basic Access Requirements Portal Reader Lock Access Level Reader(s) Time Spec

10 Steps to Gain Simple Access Wire and connect a Reader and Door Lock. Define a Reader Define an Output (Lock) Define a Portal with Reader and Lock Define a Card Format Define an Access Level for Readers/Groups Add a Person Assign a Card Assign an Access Level

Basic Access Requirements Portal Person (Card Holder) Record Reader Lock Access Level Reader(s) Time Spec

10 Steps to Gain Simple Access Wire and connect a Reader and Door Lock. Define a Reader Define an Output (Lock) Define a Portal with Reader and Lock Define a Card Format Define an Access Level for Readers/Groups Add a Person Assign a Card Assign an Access Level Present the card to the reader to unlock the Door

Basic Access Requirements Portal Person (Card Holder) Record Reader Lock Access Level Reader(s) Time Spec

NetBox Navigation

Card or Keypad vs Card + PIN Card or Keypad entry: Reader defined Reader only Keypad Format Credential format Portal Reader Only Card + PIN Reader or Reader + Keypad For Keypad Reader Keypad

Personal Information Optional Tabs User Defined Tab Contact Other Contact User Defined Vehicles (Parking) User Defined Tab 20 fields available User Defined Labels for Tab and Fields. Show? Y/N Use fields for sorting and filtering reports

Photo ID License required (Badge) Supports Canon PowerShot digital cameras A70, A75, A80, A85, A95, A510, A520, A620, A640, G3, G5, G6, G7, G9, Pro 1, S3 IS, S5 IS, S70, S80 and SX100 IS

Support Information Your Company Contact Information On “Dealer Info” Page On “About” page

Support Information Your Company Contact Information On Dealer Page On “About” page

Inputs Two Pin Relays Supervision Types Used to monitor status or receive input Supervision Types Dual Resistor NO or NC Four States: Normal, Alarm, Short, Open Parallel Resistor NO or NC Three States: Normal, Alarm, Open/Short Series Resistor NO or NC Unsupervised NO or NC Two States: Normal, Alarm

Dual Resistors

Normally Closed Parallel Resistor

Normally Closed Series Resistor

Normally Closed Unsupervised

Normally Open Parallel Resistor

Normally Open Series Resistor

Normally Open Unsupervised

Output Relay Connectors Normally Not Energized Normally Energized

Local to Node Events Output activated by Portal Status Timed or for Length of Status.

The Portal Access or Egress Point Associate Inputs and Outputs Events Door Gate Turnstile Associate Inputs and Outputs Readers, Keypads Locks Rex, DSM Events Local to Node Outputs System Wide Event Actions and Alarms

Momentary and Scheduled Actions Access Portals for impromptu unlock/lock Momentary – quick unlock and relock Scheduled Portal Unlock Used to temporarily unlock for one-time activity Start time and date or Now End time and date or after X period of time Comment is a good idea – it documents unlock reason

Time Specs & Holidays Holidays: normal function does not apply unless specified as part of the controlling Time Spec. Define Beginning Date/Time and Ending Date/Time 3 Holiday Groups: Must be in at least one group. Holidays are not part of Access Level unless specified in the Time Spec.

Time Specs & Holidays Time Spec is a period of time definition 2 standard time specs (Cannot be changed) Always Never Specify Start and End Times Days of the week and Holidays that apply

Time Specs: Where are they used? Access Level: Time Spec Floor Groups: Free Access Time Spec Portal Groups: Unlock Time Spec Alarm Panel: Auto Arm Time Spec Input Groups: Auto Arm Time Spec Output Groups: Auto Activate Time Spec Events – Enabled Time Spec Portals: Keypad Time Spec, Exit Reader Time Spec Exit Keypad Time Spec

First in Unlock, (Monitored Unlock) Works with Portal Group Unlock Time Spec Set up in System Rules Requires a special Access Level (You should limit who can do this) Set Unlock access level (required to activate unlock time spec) Set Re-Lock access level (automatic relock at end of time spec) Set reset time: resets to locked starting position. Portal Group must have Unlock Time Spec and First In Unlock Rule Unlocks Door(s) with badge read during unlock time spec Relock at end of unlock time spec or with Relock Access Level badge read.

Threat Levels Pre-defined to match US Homeland Security Definition and color coding. You can add your own (snow day) You can upload your own Threat Icon Use to mass change Access ability - Quick Lock down - Must Assign Threat Level Groups to all Access Levels Activated by Event or Manually by pre-authorized person. Must reset after Threat Level has changed Manually (may require password) Input Event with change Threat Level action Make sure someone has access during Lock Down.

Passback and Tailgate Violations Definitions: Passback is when a card is “passed back” to another person so both can gain access on same card. To Tailgate is to gain access without a valid card read and without forced entry. Time may be used to determine passback violation. Regions are used to determine either violation At least two regions required for passback violation. At least three regions required for Tailgate violation.

Regions Uncontrolled Region 1 Uncontrolled Reader A: In Uncontrolled Reader B: In Uncontrolled Portal: Main Entrance Reader 1. Reader A Access to Region 1 Region 1 Passback? - Time only Tailgate? - No Uncontrolled Region 1 Uncontrolled

Regions Uncontrolled Region 1 Uncontrolled Reader A: In Uncontrolled Reader B: In Uncontrolled Reader C: In Region 1 Reader D: In Region 1 Portal: Main Entrance Reader 1. Reader A Access to Region 1 Reader 2. Reader C Access to Uncontrolled Region 1 Passback? - Time or Region Tailgate? - No Uncontrolled Region 1 Uncontrolled

Passback and Tailgate Violations Definitions: Passback is when a card is “passed back” to another person so both can gain access on same card. To Tailgate is to gain access without a valid card read and without forced entry. Time may be used to determine passback violation Regions are used to determine either violation At least two regions required for passback violation. At least three regions required for Tailgate violation. Actions to be taken (defined in Region definition) Soft - Log entry but allow access Hard - Log entry and deny access Ignore – allow access.

Regions Region 2 Uncontrolled Region 3 Region 1 Uncontrolled Reader D: In Region 3 Reader E: In Region 2 Portal: Lab Back Door Reader 1. Reader E Access to Region 3 Reader 2. Reader D Access to Region 2 Region 3 Passback? - Time or Region Tailgating? - Region Uncontrolled Region 3 Region 1 Uncontrolled

Regions Region 2 Uncontrolled Region 3 Region 1 Uncontrolled Reader B: In Region 1 Reader C: In Region 3 Portal: Lab Front Door Reader 1. _________________ Access to ________ Reader 2. _________________ Uncontrolled Region 3 Region 1 Uncontrolled

Technical and Installation Information * For a password (must register on website): www.s2sys.com Support Phone: (508) 663-2505

S2 Support Central - Downloads

Miscellaneous Information Photo ID URL – Storage location for Person Pictures Default on Controller /upload/pics Off-board location NAS Photo ID Layout – default layout for badges Enrollment Reader – for assigning access cards to People Default Card Format – Can change when issuing cards Hide Unpermitted Access Levels – Only allows certain User Roles to see Access Levels PIN entry timeout – System wide time allowed for PIN entry after card read. ODBC Report user password – password protection for ODBC connection direct to Network Controller for user defined reports. Log Archive Interval – Time interval between automatic archive creation of Activity Log. Temperature Scale – For Temperature input unit of measure. Unacknowledged Alarm Audio – Wave file to play once per minute during unacknowledged alarm (System Wide Action)

Configure Remote Nodes Portable Node Configuration Utility Finds Nodes on network Displays Node Address, Netmask and Gateway Assign Network Controller

Backups (Backup is only needed when you haven’t) (Murphy’s IT corollary) Automatic Backup daily. System holds up to 6 weeks Sunday is a full backup … all others are differential backups. Seventh week starts overwrite of oldest backup. Backup writes to CFC Optional to NAS and FTP site. Must set up NAS or FTP address and password. Will not overwrite old backups. Use “get” to off-load backup to laptop or off-site. Save, Shutdown or Reboot save to ROM is automatic (v3.0 or higher).

Backups to NAS or FTP sites FTP Backup (File Transfer Protocol) web site. Network Storage (NAS=network attached storage).

System Upgrade Email Upgrade File (need i-button number, - serial number -) Backup System Upload patch file Apply Upgrade

Node Upgrade Activity Log Node is back on-line Node Disconnect for Upgrade

IP Camera Configuration The Install Guide has a list of IP cameras that we have tried but any IP Camera should work. System ships with a growing set of camera types. Camera Types are user configurable – see manufacturer’s documentation for pan, tilt, and zoom (PTZ) URLs etc. SHOW THIS IN THE DEMO SYSTEM! No “approved device list”, any webcam should work; system ships with a growing set of camera types Camera Types are user configurable – see manufacturer’s documentation for pan, tilt, zoom URLs etc. Definition – browser address is video feed, control address is pan, tilt, zoom. May need DNS or IP forwarding for access from outside firewall. Presets – to return to “home”; enter on camera web site Views – PIP (picture in picture), Quadview Monitoring Desktop tabs for Cameras and views

IP Camera Configuration Camera Definition IP Address of Camera (No http://) IP Address of Control (No http://) Port If PTZ User Name Password SHOW THIS IN THE DEMO SYSTEM! No “approved device list”, any webcam should work; system ships with a growing set of camera types Camera Types are user configurable – see manufacturer’s documentation for pan, tilt, zoom URLs etc. Definition – browser address is video feed, control address is pan, tilt, zoom. May need DNS or IP forwarding for access from outside firewall. Presets – to return to “home”; enter on camera web site Views – PIP (picture in picture), Quadview Monitoring Desktop tabs for Cameras and views

IP Camera and NetBox Interface S 2 o B e r d o i w V PTZ Setup s e IP Address r U I

Events Something that requires action Acknowledgment may be required Door Forced Door Held Input in abnormal state Designated Alarm Input Motion Detected Invalid Entry Attempt Acknowledgment may be required

Events Actions triggered by Event Send an SMS (text) message Lock a Portal * Unlock a Portal * Momentarily unlock a Portal Activate a Relay * Deactivate a Relay * Arm Input or Input Group Pulse Output or Output Group Send an Email Send an SMS (text) message Arm Alarm Panel Disarm Alarm Panel Move a Camera to a Preset (IP cameras must be set up before you can use them in an Event) Save the event to an Activity Log Record Video Set a Threat Level

Putting Events to Work Portal Status: System Wide Actions React to Door State React to Card Read Input Action: Off-normal event Input activates Action(s)

Putting Events to Work Access Level Actions taken on entry With Valid Entry Alarm Panel Actions based on Panel or Zone Arm Failure Activity in Armed Area

Putting Events to Work Temperature Events: Temp too High or too Low or Not Reading Node Status: Node Tamper, Timeout or Disconnect Alarm

Putting Events to Work Video Action: Record Video or Notify of Failed Camera Normal activates when Camera returns to normal Motion activates Recording Fail activates when camera fails or stops communicating

Conceptually, the DVR and NVR are treated the same DVR or NVR S 2 B r o w s e U I V i d Setup

Floorplans Used to Monitor Activity or Status of Portals – temporarily unlock Cameras – thumbnail Temperature – Graph of last hour, day, week. Link Detailed Floor Plans to General Floor Plans Setup Sequence Upload jpg files Define Floorplan Place Resources Set Place Resource type Resource select Save Floorplan

The Five Steps to DVR/NVR Setup 1: Complete the set up of the DVR/NVR. 2: Point the S2 NetBox to the DVR/NVR. 3: Verify live video from the NetBox interface. 4: Set up Video Motion Detection from DVR/NVR. 5: Set up Video Recording Actions from the NetBox.

1: Complete the set up of the NVR. NVR Windows UI S 2 Milestone Service S 2 Milestone Generic Event Builder Video Server

1: Complete the set up of the NVR. Install the software: NVR Systems software components. S2 OVIDService Handles communications between NVR and the S2 Netbox. Service should start itself. Service creates its own Event Log. Make sure you set “Overwrite events as needed” Service should add itself to the Windows Firewall (requires Windows XP SP2). S2 Generic Event Builder (Included with OVID Service) Creates correct Start, Stop and PTZ events for each camera.

To open the Windows Firewall applet select Settings : Control Panel : Windows Firewall

1: Complete the set up of the DVR. I U r e s w o r B DVR

1: Complete the set up of the DVR. Make sure you set up the cameras first, and verify that you can see live video through the DS2 interface. Be aware of browser capabilities. DM is promoting use of Java over ActiveX. JRE 1.4.2 or 5.0 required. We are integrating their Java applet into our S2 NetBox interface.

2: Point the S2 NetBox to the Milestone Server S2 Browser UI Milestone Video Server Setup

2: Point the S2 NetBox to the DM DVR. S2 Browser UI Setup

3: Verify live video from the NetBox interface. S2 Browser UI V DVR or NVR

4: Set up Video Motion Detection from NVR/DVR 2 o B e r d o i w V s Setup VMD e r U I DVR or NVR VMD Events

5: Set up Video Recording Actions from NetBox Events, VI, Triggers i V Recording Events DVR or NVR VMD Events

Alarm Panels Identify 2 Inputs for “zone” and “armed” status from panel One Output to allow arming or disarming from NetBox Auto Arming Output to sound warning device. Warning duration Auto Arming Time Spec (armed period). When the panel should be armed. Auto Arm Inactivity Time Length of time for panel to show all zones as inactive. Arm Panel request timeout – time to wait for armed status input. 5 seconds longer than panel’s grace period. Disarm reader group – card read for disarm access level to disarm panel. Disable reader group – disabled (deny access) readers when panel is armed. Events Specify Event to occur when there is failure to arm. Event to occur when activity detected during armed period.

Elevator Control

Floors are mapped to button outputs 6 5 4 3 2 1 Elevator 1 Output 1 Output 2 Reader 1 6 5 4 3 2 1 Elevator 2 Output 3 Output 4 Reader 2 Floor 6 Floor 5

Elevator Access Levels 6 5 4 3 2 1 YES OK?

Floor Groups and Free Access Time Spec 6 5 4 3 2 1 Elevator 1 Output 1 Output 2 Reader E1 Elevator 2 Output 3 Output 4 Reader E2 Restricted Access Free Access

Other uses of Elevator Controls Floor 6 Thermostat Floor 5 Thermostat Front Entrance

Personal Information Access Control Photo ID User Defined (optional) Badge Access Level PIN Photo ID User Defined (optional) User Labels and fields Display all or some Contact (optional) Other Contact (optional) Vehicle (optional) Login User Roles Widget Desktop Layouts Recent Activity

User Roles Predefined Categories Custom User Roles Partition Monitor – Monitor menu only Partition Administrator – Monitor plus Administration menus Partition (System) Setup – Setup plus Monitor and Administration menus Custom User Roles Threat Level Group – Affects user system access Monitor limitations Camera groups: view, go to presets, PTZ Portal Groups: view, momentary unlock. extended unlock extended lock Elevator Groups: view Event Groups: view, acknowledge, clear actions Floorplan Groups: view Report Groups: run, edit Layout Groups: run Reader Groups: view photo IDs Access Levels: assign

User Roles Administrator: Person Record limitations View, Assign, Add, Edit, Delete, Lookup Add Administration Privileges Add Setup Privileges

History Reports History Reports Access History - General Event History Portal Access Count by User - Custom Reports

Custom Report

System Reset and Evaluation Reset to Factory Defaults Do Not Remove Power until after License Page Use for configuring before going to the site. Be sure to wait for single beep. Leave S2 NetBox Powered up and Plugged in Tear out Evaluation page Fill in Leave with instructor

Thank you for your attention! Thanks for taking S2 NetTech Training _________________________________________________________