You are on page 1of 192

AC2000 Web

Version 6.8

A2SE68-UG-0119-1.2

Notice
The information in this manual was current when published. The manufacturer reserves the right to revise and
improve its products. All specifications are therefore subject to change without notice.

Copyright
Under copyright laws, the contents of this manual may not be copied, photocopied, reproduced, translated or reduced
to any electronic medium or machine-readable form, in whole or in part, without prior written consent of 2013 Tyco
Security Products. All Rights Reserved.

Trademarks
The trademarks, logos, and service marks displayed on this document are registered in the United States (or other
countries). Any misuse of the trademarks is strictly prohibited and Tyco Security Products will aggressively enforce its
intellectual property rights to the fullest extent of the law, including pursuit of criminal prosecution wherever necessary.
All trademarks not owned by Tyco Security Products are the property of their respective owners, and are used with
permission or allowed under applicable laws.
Product offerings and specifications are subject to change without notice. Actual products may vary from photos. Not
all products include all features. Availability varies by region. Contact your sales representative for more information.

Licence information
Your use of this product is governed by certain terms and conditions.

Support
If you require technical assistance using CEM products, please contact the CEM Support team using the following
telephone number:
Telephone:+44(0)2890 456656
Email: cem.support@tycoint.com
Please provide our support engineers with as much information as possible. This may include:
Site name
Product name and model
CEM software version
Description of the problem

Publication Date
7th March 2013

Contents
1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Logging in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1
1.2 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2

2 Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

3 Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.1 Using the Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7
3.2 Total Swipes Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .8
3.3 Parked Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
3.4 Top Current Alarms Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
3.5 Invalid Swipe Analysis Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13
3.6 Licensing Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
3.7 Alarm Acknowledgement Analysis Widget. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
3.8 Muster Zones Swipes Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
3.9 Muster Zone Occupancy Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .24
3.10 Cards Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
3.11 Diagnostics Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
3.12 Logged On Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
3.13 Locked Out Accounts Widget. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .28
3.14 System Widget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30

4 Oneshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
4.1 Sending a Oneshot command . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
4.2 Extended Opening . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
4.3 Broadcast Open/Broadcast Close . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
4.4 Device History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .33
4.5 Viewing Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35

5 Mimic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5.1 Alarm list fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
5.2 Filtering and Sorting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .39

5.3 Alarm Actions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

6 Online Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
6.1 Online Status interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

7 Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
7.1 Generating a Standard Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
7.2 Generating an Absentee Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
7.3 Generating an Access Level Changes Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
7.4 Generating an Alarm Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
7.5 Generating a Broadcast Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
7.6 Generating a Card Parking Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
7.7 Generating a Card Parking RZ Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
7.8 Generating a Device Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
7.9 Generating a Device Access Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
7.10 Generating a Device Configuration Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
7.11 Generating a First and Last Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
7.12 Generating a Guard Tour Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
7.13 Generating a Personnel Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
7.14 Generating a Reader Activity Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
7.15 Generating a Transaction Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
7.16 Generating a Custom Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

8 Room Booking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
8.1 Timetable Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
8.2 Setting up Rooms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
8.3 Booking Rooms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
8.4 Editing Bookings and Rooms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

9 RTD. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
9.1 Creating a Group of Devices and Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
9.2 Creating and managing Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

9.3 Selecting a Group to monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77


9.4 WEB RTD List views . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
9.5 Detail List tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80

10 Zonal Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
10.1 Before you begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
10.2 Creating the Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
10.3 Assigning Zones to devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
10.4 Editing a zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
10.5 Deleting a Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86

11 System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
11.1 Network/Mail Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .88
11.2 Server Time Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .89
11.3 Software Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
11.4 System Shutdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .90
11.5 View Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91
11.6 SMS Server Config. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .91
11.7 System Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92

12 Tools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
12.1 Transaction Load . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
12.2 Search Auditlogs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .95

13 emerald Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
13.1 File Upload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .98
13.2 Information Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103
13.3 Remote Apps Allocation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104
13.4 Local Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107

14 Reader Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109


14.1 Device Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .110
14.2 Check DB Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .111
14.3 Device Defrost . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112

14.4 Initialise Reader Controller (RTC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113

15 AC2000 Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115


15.1 Licensing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
15.2 Card Parking Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
15.3 Data Housekeeping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
15.4 External Systems Interface Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
15.5 Personnel Clear Down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
15.6 Reader Controller Config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
15.7 Web Login Config.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
15.8 LDAP Config. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
15.9 Dashboard Widget Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135

16 Backup/Restore. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
16.1 Backing Up AC2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
16.2 Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
16.3 Upload Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141

17 Visitor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
17.1 Visitor Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
17.2 Visitor Batch Request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
17.3 Visitor Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

Appendix A: Removing Internet Explorer security certificate warning . . . . . . . . 167


A.1 To remove the security certificate warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

Appendix B: Custom WEB Report fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168

B.2 access_devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168


B.3 access_levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168
B.4 alarmlog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .168
B.5 alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .169
B.6 bc_hist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170
B.7 card_formats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171
B.8 company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .171
B.9 current_notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .173
B.10 device_inputs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174
B.11 device_topology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .174
B.12 device_types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
B.13 extra_access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
B.14 gtzinfo . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
B.15 hwunit_outputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .175
B.16 lnk_site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
B.17 machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
B.18 outcomes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .176
B.19 park_hist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177
B.20 park_rx_hist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177
B.21 personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .177
B.22 rf_issue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
B.23 rtc_topology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
B.24 tour . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
B.25 tour_events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
B.26 tour_history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
B.27 transaction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .180
B.28 vehicle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .182
B.29 visitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .184

Chapter 1
Introduction
AC2000 WEB is a suite of web applications, utilities and widgets that can configure, manage and
report on the AC2000 system.
Before you start using AC2000 WEB, you will need:

Access to the web via a secure connection

A username and password

Permission to access the application (granted in User Options)

1.1 Logging in

Choose
languages
Enter Username
Enter Password

Figure 1 AC2000 WEB log in

1. Open a web browser.


2. Enter the Server IP Address e.g. https://192.168.1.10
If the IP address has been changed from the default, enter the new IP address.

CHAPTER 1 : Introduction

3. Enter the username and password.


4. Tick the authorisation checkbox if required.
5. Click Login.

1.2 Home Page


The AC2000 WEB Home page is a graphical menu containing icons which open applications
and utilities.
Logged
Back
in user
Button

Change
Layout

Search
feature

Figure 2 AC2000 WEB Home page menu

Hovering over a category with the mouse pointer displays a menu of applications for that
category (when in circular form). Clicking the icon opens the application.
Clicking the Back Button on any screen, takes the user back a level to the parent page. The
user may click the Back Button until back at the Home page.
The Search feature is used to find applications quickly by typing the application name or
partial name into the Search field. When two or more characters are typed, all applications
with those letters are displayed on the screen.
For example; typing ba will display all applications containing those letters. In this case, two
applications are displayed: Backup and Upload Backup. The more characters are typed, the

A2SE68-UG-0119-1.2

AC2000 Web

further the search results narrow. To clear the Search field, click on the X on the right side of
the search field.

Partial app.
name typed
in Search
field

Search
results based
on partial
name search
Figure 3 Web menu Search feature

Note
The Search feature is only displayed on the Home page menu and not on subgroup pages.
Clicking the Change Layout button changes the arrangement of the menu from circular to a
grid layout.

Figure 4 AC2000 WEB menu grid layout

1.2.1 Exporting as a CSV file


Information can be exported to Comma, Separator, Value (csv) files as either a .csv or .txt file.
1. Click Export.

CSV radio
button is
selected by
default

Delimiter
dropdown

File extension
dropdown

Export

Figure 5 Export dialogue with CSV selected

2. Select the appropriate delimiter from the dropdown menu. Comma, Tab, Semicolon or
Pipe can be selected.
3. Select whether to export the report as a .csv or a .txt file.
4. Click Export.

CHAPTER 1 : Introduction

1.2.2 Exporting as a PDF file


Exporting information as a pdf file reduces the risk of data being tampered with by a casual
user.
1. Click Export.
2. Select the PDF radio button.
PDF radio button

PDF Options

Export
Figure 6 Export dialogue with PDF selected

3. Select the Paper Size.


4. Select whether to print in portrait or landscape.
5. Place a tick next to Cover Page if one is required. The Cover Page contains information
about the report type and criteria selected.

Figure 7 Example report cover page

6. Click Export.
7. Follow the browser instructions to open or save the created PDF file.

1.2.3 Printing
1. Click Print.
2. Select a printer then Print.

A2SE68-UG-0119-1.2

Chapter 2
Applications
The Applications menu contains widgets and applications which monitor, manage and report
on the AC2000 system.
To open the Applications menu, log into AC2000 WEB and select Applications.

Dashboard
The Dashboard is a collection of widgets displaying system and cardholder
information.

Oneshot
The Oneshot application sends open commands to selected devices in the
AC2000 system.

Mimic
The Web Mimic application displays a real time list of AC2000 system alarms
which can be acknowledged and reset.

Online Status
The Online Status application displays the online or offline state of devices.

Reports
The Reports application produces user-defined reports using data from the
AC2000 system.

Room Booking
The Room Booking application allows a user to reserve predefined rooms for
a period of time.

RTD
The RTD application shows a live view of transactions and alarms.

Zonal Control
The Zonal Control application manage zones on a site to prevent tail-gating
and enforce anti-passback.

CHAPTER 2 : Applications

A2SE68-UG-0119-1.2

Chapter 3
Dashboard
The Dashboard is a suite of widgets displaying system, cardholder and alarm information. The
Dashboard has an interactive interface which can be configured to turn animation off/on; show/hide
widgets and display/minimise widget information.

Important
The Dashboard Widget Allocation application is used to allocate which Dashboard Widgets are available to
users. See Dashboard Widget Allocation on page 135.

3.1 Using the Dashboard


To open the Dashboard select Applications | Dashboard.

Figure 8 Dashboard interface (default layout) with minimised widgets

3.1.1 Repositioning widgets


Widgets can be repositioned on the Dashboard by clicking and dragging the widgets Title Bar.
When a widget has been moved its position is automatically saved.

CHAPTER 3 : Dashboard

Each widget has a display pane and a toolbar with options to refresh, minimise or close.
Refresh
Removes the widget
from the dashboard
Collapses the widget
Figure 9 Widget toolbar

3.1.2 Widget properties


Each widget has its own properties which are accessed by clicking Edit on the title bar.

Edit button: to view widgets properties


Figure 10 Widget settings button

3.1.3 Configuring the Dashboard using the Settings widget


The Dashboard is configured using the Settings widget. You can use the widget to enable or
disable animation and select which widgets are fully displayed or minimised. The default layout
can be restored if the Dashboard has been previously configured.

Figure 11 Dashboard settings

1. To turn animation off or on, select or deselect the Animation checkbox as necessary for
each widget.
2. To show widgets that are currently hidden, select the Show checkbox as necessary for
each widget.
3. To minimise widgets, select the Min checkbox as necessary for each widget.
4. To restore the default Dashboard settings, click Restore To Default.

3.2 Total Swipes Widget


The Total Swipes widget shows all the transactions on the site per day, week or month. A
swipe can be a transaction from either a cardholder or a vehicle.

A2SE68-UG-0119-1.2

AC2000 Web

Number of
swipes
Selected days
swipes
Navigation
options
Figure 12 Total Swipes widget showing frequency of swipes by day

3.2.1 Viewing the Total Swipes in more detail


Each bar in the Total Swipes chart represents the period of time the widget is configured to
display, so a monthly chart displays the number of swipes for each month in the year and so
on. To view a report in more detail, select the Bar or Area from the chart. This displays the
chart for the next level down (going from month to week to days).
Use the navigation buttons to view a different time period or
dates.

Previous

Viewing the next level up


Click Up to display the total swipes chart for the next greater time
period e.g. monthly, if selected from a weekly chart.
Up

Next

Viewing different dates


You can view a chart for different dates by using the Previous and Next buttons at the bottom
right of the widget. These buttons show the previous and next reports according to the period
of time configured on the widget e.g. the following week, day or month.
1. Select Next to display the following period of days/weeks/months.
2. Select Previous to display the following period of days/weeks/months.

CHAPTER 3 : Dashboard

3.2.2 Configuring Total Swipes


The default setting of the widget is to display all the card swipes for the week in a bar chart,
refreshing at 15 minute intervals. To change how the information in the chart is displayed, click
Edit on the title bar.

Turn filtering off and on


Select Daily, Weekly or
Monthly

Select bar, area or line


graph

Select the time in minutes the widget updates

Saves the settings (returns to chart display)

Figure 13 Total Swipes properties

Filtering
The Filter radio buttons enable filtering by device and/or date in the widgets display view by
making the Device and Date dropdowns visible.
1. To turn filtering on, click the Filter radio button.
2. To turn filtering off, click the All radio button.

Changing the Default display (date range) setting


The Default display dropdown menu is used to define the date range in days.
1. Select an option (Daily, Weekly, Monthly) from the Default display dropdown menu for the
chart to display.

Refresh
It is possible to change the frequency the widget updates the invalid swipes. Using the
Refresh dropdown menu select the time in minutes. (Choose between 5, 10,15, 30, 55
minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click the
Save button to apply changes and return to the widgets display view.

10

A2SE68-UG-0119-1.2

AC2000 Web

3.3 Parked Widget


The Parked Widget shows how many parked cards are on the system. A 'parked' card is an
expired card that can no longer be used for access within a site. Cards are automatically
parked in AC2000 when they expire or when their parking exemption period runs out.

Figure 14 Parked card widget

3.3.1 Configuring Parked


The default setting of the widget is to refresh in 15 minute intervals. To change the Refresh
rate, click Edit from the title bar.
1. Using the Refresh dropdown menu select the time in minutes. (Choose between 5, 10,15,
30, 55 minutes and one hour).
2. Click Save.

3.4 Top Current Alarms Widget


The Top Current Alarms widget shows the most common types of alarms occurring on
the system.
No of Alarm
occurrences
shown as
percentage of
total Alarms

Device address Device name

Alarm type

No of Alarm occurrences

Figure 15 Top Current Alarms widget

11

CHAPTER 3 : Dashboard

3.4.1 Configuring Top Current Alarms


The default setting of the widget is to display the top ten current alarms, refreshing at 15
minute intervals. To change how the information in the chart is displayed, click Edit on the title
bar.
Select how many alarms
to display
Saves the widget
settings (returns to
chart display.)
Select the time in minutes the widget updates
Figure 16 Top Current Alarms properties.

Show Top
To set how many current alarms to display, select a number between 1 and 24 in the Show
Top dropdown list.

Refresh
It is possible to change the frequency the widget updates the invalid swipes shown by the
widget. Using the Refresh dropdown menu select the time in minutes. (Choose between 5,
10,15, 30, 55 minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click the
Save button to apply changes and return to the widgets display view.

12

A2SE68-UG-0119-1.2

AC2000 Web

3.5 Invalid Swipe Analysis Widget


The Invalid Swipe Analysis widget displays a chart showing invalid swipes across a system. The
frequency of invalid swipes is shown in each segment of the chart and is limited by a date range
(Default display) as defined in the widgets properties.
Hovering over a chart segment shows the type of invalid swipe as well as the amount. Clicking on one
of the segments opens a table showing details relative to that invalid swipe type. The invalid swipe
types that can be displayed are: Retry PIN, Wrong zone, Card parked, Card expired, Biometric invalid,
Lost/stolen card, Wrong timezone, Passback failure, Not in system, Card expiring and Door held.
.
Invalid
Swipes date
range

Chart legend

Graphic display
showing
number of
invalid swipes

All Details button

Previous / Next buttons


changes chart by date range

Figure 17 Invalid Swipe Analysis widget

3.5.1 Interacting with the chart

Hovering the mouse over a segment shows


Invalid Swipe type with amount of swipes
Figure 18 Invalid swipes (hovering over chart)

Hovering over a segment


When Hovering the mouse pointer over any of the chart segments the segment changes
colour and a tool tip appears showing the type of invalid swipe and the frequency of invalid
swipe types within the date range.

13

CHAPTER 3 : Dashboard

Clicking a segment
Clicking on one of the chart segments or the chart legend shows further information relating to
that type of invalid swipe. The information is displayed in a table showing the Count (frequency
of swipes), Company name, Surname and Forenames. Clicking OK closes the window.
Print invalid swipes

Save invalid swipes


(.csv or .pdf format)

Click OK to close window


and return to chart
Figure 19 Invalid swipes table format

14

A2SE68-UG-0119-1.2

AC2000 Web

3.5.2 Showing all Invalid Swipes


To show all invalid swipes for all invalid swipe types click the All Details button. This opens a
scrollable list in table format showing all invalid swipes grouped by invalid swipe type.
Save all Invalid Swipes
Print all Invalid swipes
Date range

Invalid Swipes grouped


by Retry PIN

Invalid Swipes grouped


by Wrong Zone

Click OK to close window


and return to chart view
Figure 20 Invalid Swipe Analysis showing all invalid swipes

3.5.3 Configuring Invalid Swipes Analysis


To change the type of data the Invalid Swipe Analysis widget displays click Edit on the Invalid
Swipes title bar. The Invalid Swipe Analysis properties window is displayed.
Default display
dropdown menu
defines the date
range the invalid
swipes are shown.
(7 days, 30 days
and 90 days.)

Outcomes:
check/uncheck to
show invalid
swipes shown in
the widget.
Save: saves the
widget settings
(returns to chart
display.)

Refresh: Select
the time in minutes
the widget updates
Figure 21 Invalid Swipe Analysis properties

Changing the Default display (date range) setting


The Default display dropdown menu is used to define the date range in days.
1. Click Edit on the Invalid Swipe Analysis title bar to show Invalid Swipe Analysis properties
2. Select the Default display dropdown menu to show (7 days, 30 days, 90 days) for the chart
to display dropdown menu.

15

CHAPTER 3 : Dashboard

Outcomes
To show and hide what kind of invalid swipes are shown in the widget, check/uncheck the
boxes in the Outcomes panel of the widget properties.

Refresh
It is possible to change the frequency the widget updates the invalid swipes shown by the
widget. Using the Refresh dropdown menu select the time in minutes. (Choose between 5,
10,15, 30, 55 minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click the
Save button to apply changes and return to the widgets display view.

16

A2SE68-UG-0119-1.2

AC2000 Web

3.6 Licensing Widget


AC2000 is licensed in parts, rather than one licence for an entire system e.g. separate licences
for workstations and applications. The Licensing widget lists the number of licences held and
shows how many are still available. It is minimized on the dashboard by default.

Figure 22 Licensing widget

The charts represent the proportion of free (available) licences from the total number held for
each licence type. If the number of free licences drops below 5%, the section changes from
green to red.

3.6.1 Adding Licenses


Click Licensing in the title bar to go to the Licensing page.

3.6.2 Configuring Licensing


The default setting of the widget is to refresh in 15 minute intervals. To change the Refresh
rate, click Edit from the title bar.
1. Using the Refresh dropdown menu select the time in minutes. (Choose between 5, 10,15,
30, 55 minutes and one hour).
2. Click Save.

17

CHAPTER 3 : Dashboard

3.7 Alarm Acknowledgement Analysis Widget


The average time taken to respond to alarms in AC2000 can be viewed using the Alarm
Acknowledgement Analysis widget. Alarm response times are calculated as a daily average of
the time taken to Acknowledge or Cancel an alarm. The average alarm response times are
reported graphically in the widget and can display the analysis across any time period ranging
between one year and one day. To display Filter options select the Filter radio button in the
Edit menu.

Device selection
Date range

Submit
Alarm response
selection

Navigation options

Figure 23 Alarm Acknowledgement Analysis widget

3.7.1 Viewing the results


The average response times to Ack/Can alarms are displayed by the widgets chart.
Use the navigation buttons to toggle between charts for different
time periods.

Previous

1. Click Next to view the chart for the following time period.
2. Click Previous to view the chart for the previous time period.
3. Click Up to view the chart over a longer time period e.g. a
month, from a weekly chart.

Up

Next

4. Click Refresh to return to the Daily Averages page.

3.7.2 Interacting with the chart


The chart displays more information when hovering the mouse pointer over a bar or point, and
by clicking directly into it.
1. Hover the mouse pointer over a bar (bar chart) or a point (line or area chart) to display
alarm data for that day, week or month.

18

A2SE68-UG-0119-1.2

AC2000 Web

Hovering over a bar shows


the data used to calculate the
acknowledgement analysis

Figure 24 Viewing the alarm data

2. Click a bar (bar chart) or select a point (line or area chart) to display the results for the next
shortest time period.
Note
If the chart is already displaying the daily averages over a week, then clicking a bar shows a
chart starting from the selected day and the remaining days in that week.
3. Click Refresh to return to the Daily Averages page.

3.7.3 Filtering the results


By default the chart shows alarm analysis for all devices over the current week. More specific
information can be shown by configuring the device, date range and alarm response
configuration settings.

Select all or
one device
Submit

Set the date range


up to a maximum of
365 days
Select to view Ack
and Can times

Figure 25 Filter options

19

CHAPTER 3 : Dashboard

1. Select a device from the Device list to see results for that device only.
2. Set the date range by entering start and end dates in the From and To fields.
3. Click the corresponding Ack/Can checkboxes to include Acknowledge and/or Cancel
responses.
4. Click Submit to apply the changes.

3.7.4 Creating an Alarm Acknowledgement Analysis report


Clicking the Details button produces a report showing the alarm acknowledgement analysis
for the selected time period. The report can be saved (as a .csv file) or printed.
Click to print the report
Click to save
the report

Figure 26 Alarm Acknowledgement Analysis report

3.7.5 Configuring Alarm Acknowledgement Analysis


To change the type of data the Alarm Acknowledgement Analysis widget displays click Edit on
the Alarm Acknowledgement Analysis title bar.
.
Switch
filtering on

Week, month
or year
Bar, line or area

Select to include average time taken to Ack or Can alarms


Figure 27 Configuration settings

20

A2SE68-UG-0119-1.2

AC2000 Web

Filtering
The Filter radio buttons enable filtering by device, date and Ack/Can response in the widgets
display view by making the Device and Date dropdowns and Ack/Can checkboxes visible.
1. To turn filtering on, click the Filter radio button.
2. To turn filtering off, click the All radio button.

Changing the Default display (date range) setting


The Default display dropdown menu is used to define the date range in days.
1. From the widget title bar, click Edit.
2. Select an option (Week, Month, Year) from the Default display dropdown menu for the
chart to display.

Graph
To show and hide average acknowledge (Ack) and cancel (Can) times shown in the widget,
check/uncheck the boxes in the Ack/Can panel of the widget properties.

Ack/Can
To show and hide average acknowledge (Ack) and cancel (Can) times shown in the widget,
check/uncheck the boxes in the Ack/Can panel of the widget properties.

Saving properties
When the widgets properties have been modified the new settings must be saved. Click Save
to apply changes and return to the widgets display view.

21

CHAPTER 3 : Dashboard

3.8 Muster Zones Swipes Widget


The Muster Zones Swipes widget shows the swipes in and out of a site's muster zones. At the
top level it displays the number of swipes within the zones for that day. At detail level
cardholder information is shown to display the personnel who performed the transactions and
at what time
.
Select
Muster Zone

Click Submit to
filter transactions
by Date, In and
Out
Select date box to view
transactions by day

Select to view In
type transactions

Select to view Out


type transactions

Figure 28 Viewing Muster Zone transactions

3.8.1 Viewing the Muster zones swipes for a different date


By default the chart shows muster zones swipes for the current day. To view the swipes for a
previous day:
1. Click the date box.
2. A calendar displays. Select the new date and the chart updates.

3.8.2 Viewing the swipes for a different Muster zone


By default the chart shows swipes for the topmost muster zone. To view the swipes for other
zones:
1. From the Zone dropdown list, select a muster point.
2. Click the Go button.

3.8.3 Viewing the Muster zone swipes in more detail


By default the chart shows the swipes in and swipes out of a
muster zone for the whole day, in units of an hour. However, it
is possible to view the swipes in one hour blocks, and see
which personnel performed the swipes.

Details Previous

1. Select which type of swipe to display by selecting or


deselecting the Ins and Outs check boxes as appropriate
2. Click the appropriate bar or area on the chart to view in
more detail for that period

Up

Next

3. Alternatively, select the Details button to view details for the entire hour
4. To return to the day view, select Up

22

A2SE68-UG-0119-1.2

AC2000 Web

3.8.4 Configuring Muster Zones Swipes


The default settings of the widget is to show in and out swipes of a muster zone as a bar chart,
refreshing every 15 minutes. To change these settings, select Edit from the title bar.

Check or uncheck to
show in/out swipes

Lists the available


zones

Select bar, area or line


graph

Select the time in minutes


the widget updates

Saves the widget


settings (returns to
chart display.)
Figure 29 Muster Zones Swipes widget properties

Show Ins and Outs


To show and hide In and Out swipes shown in the widget, check/uncheck the boxes in the
INs/OUTs panel of the widget properties.

Default Zone
To set a default zone to display each time the widget is opened, select the appropriate zone
from the Default Zone list.

Graph
Select a type of chart to display the widget information in. To set the default chart type, choose
bar, line or area from the Graph list.

Refresh
It is possible to change the frequency the widget updates the invalid swipes shown by the
widget. Using the Refresh list select the time in minutes. (Choose between 5, 10,15, 30, 55
minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click Save
to apply changes and return to the widgets display view.

23

CHAPTER 3 : Dashboard

3.9 Muster Zone Occupancy Widget


The Muster Zone Occupancy widget lists the muster zones by date and how many personnel
are in the site's muster zones. It can also show the occupancy in greater detail by listing which
personnel are in which zone, and the times of the card swipes.
Print

Details

Muster point name

Save

Number of transactions
in muster zone

Figure 30 Muster Zone Occupancy widget

3.9.1 Viewing Muster Zone occupancy in more detail


The List button shows a table listing personnel and the muster zones they are currently in. To
view the table, select List.

3.9.2 Printing the Muster Zones Occupancy list


To print the current view of the Muster zone occupancy list:
1. Click the Print button.
2. Select a printer and click Print.

3.9.3 Saving the Muster Zones Occupancy list


To save the current view of the Muster zone occupancy list in .csv or .pdf format:
1. Click the Save button.
2. Choose the location and click Save.

3.9.4 Configuring Muster Zone Occupancy


The default setting of the widget is to refresh in 15 minute intervals. To change the Refresh
rate, click Edit from the title bar.
1. Select the interval from the Refresh dropdown menu.
2. Click Save.

24

A2SE68-UG-0119-1.2

AC2000 Web

3.10 Cards Widget


The Cards widget shows the status of all the cards on the AC2000 system.
Available card formats

Save

Print

Card details

Figure 31 Cards widget interface

The State columns shows which cards have been validated (With Card) and those that have
been issued but not yet validated (Without Card).

3.10.1 Viewing different card formats


By default the Cards widget displays all the available cards on the system with all the details
related to that card. The Card Format dropdown menu displays information relating to the
selected card format or card type.
To view a summary of one card format only, select the relevant format from the Card Format
dropdown menu.

3.10.2 Saving card information


By clicking the Save icon as shown in Figure 31 card status information can be saved in .CSV
format.

3.10.3 Configuring Cards


To change the type of data the Cards widget displays click Edit on the title bar.
Select the
applications to
include card data

Select card Format


or Type

Saves the widget


settings

Select the time in


minutes the widget
updates
Figure 32 Invalid Swipe Analysis properties

25

CHAPTER 3 : Dashboard

Applications
To select which applications the widget references for card data, check/uncheck the boxes in
the Applications panel of the widget properties.

Refresh
It is possible to change the frequency the widget updates the invalid swipes shown by the
widget. Using the Refresh dropdown menu select the time in minutes. (Choose between 5,
10,15, 30, 55 minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click the
Save button to apply changes and return to the widgets display view.

26

A2SE68-UG-0119-1.2

AC2000 Web

3.11 Diagnostics Widget


The Diagnostics widget shows the state of the system's health by detailing the system
diagnostics.

Click to view
details

Figure 33 Diagnostics widget interface

3.11.1 Configuring Diagnostics


By default the Diagnostics widget displays the status of the Last Backup and System
Processes applications. To change the type of data displayed click Edit on the Diagnostics title
bar.

Select the
applications to
display
Save the
widget settings
Select how often the widget updates
Figure 34 Diagnostic widget properties

Applications
To select which applications the widget includes diagnostic information for, check/uncheck the
boxes in the Applications panel of the widget properties.

Refresh
It is possible to change the frequency the widget updates the invalid swipes shown by the
widget. Using the Refresh dropdown menu select the time in minutes. (Choose between 5,
10,15, 30, 55 minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click the
Save button to apply changes and return to the widgets display view.

27

CHAPTER 3 : Dashboard

3.12 Logged On Widget


The Logged On widget shows the number of users that are currently logged into the AC2000.
It can also display user and workstation information in greater detail as a list.
Number of users
logged on
Details
Figure 35 Logged on interface

3.12.1 Viewing which users are logged on


To display information about cardholders that are logged on to the system, select Details.

3.12.2 Configuring Logged On widget


The default setting of the widget is to refresh in 15 minute intervals. To change the Refresh
rate, click Edit from the title bar. Using the Refresh dropdown menu, select the time in
minutes. (Choose between 5, 10,15, 30, 55 minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click the
Save button to apply changes and return to the widgets display view.

3.13 Locked Out Accounts Widget


The Locked Out Accounts widget shows either a list of currently locked out AC2000 users or a
historical report of previously locked out accounts.
Note
Last Lockout information and Lockout Alarms are only available if Lockout Alarms are enabled
using the AC2000 Configured application.

3.13.1 Enabling lockout alarms in the AC2000 Configured application


1. Login to the AC2000 Floatbar.
2. Open Advanced Configuration | Configured.
3. Locate the enable_lockout_alarms parameter and change the value to Y.
4. Click Save.
Note
If there are any users logged into AC2000 Web whilst this setting is changed they must log out
and back into the web pages to update the widget Locked Out Accounts widget view.

28

A2SE68-UG-0119-1.2

AC2000 Web

3.13.2 Currently locked out accounts


The default view of the widget is the Current Lockouts view.
Lockout Alarms view selector

Save

Current
Lockouts view
selector

Print

Unlock
account
Locked account

Date/time of last
successful login

Date/time of last
account lock out

Figure 36 Current locked out accounts

Unlocking a user account from the widget


1. Click the padlock next to the user to be unlocked.
2. Click Yes.
The widget will automatically update with the new information.

3.13.3 Lockout alarms


Selecting the Lockout Alarms button allows the user to create a report of all locked out alarms
between two defined dates.
Submit
Save
Print
Date selection
fields

Date range or
current report

Report results
Figure 37 Locked out alarms report

Configuring a lockout alarms report


1. Define a date range by selecting a From and To date.
i.

Select a month using the navigation buttons.

29

CHAPTER 3 : Dashboard

ii.

Select the start day by clicking on the appropriate date.


Month navigation buttons

Currently
selected day

Figure 38 The date selection calendar

2. Click Submit to run the report.

3.13.4 Configuring Locked Out Accounts widget


The default setting of the widget is to refresh in 15 minute intervals. To change the Refresh
rate, click Edit from the title bar. Using the Refresh dropdown menu, select the time in
minutes. (Choose between 5, 10,15, 30, 55 minutes and one hour.)

Saving properties
When the widgets properties have been modified the new settings must be saved. Click the
Save button to apply changes and return to the widgets display view.

3.14 System Widget


The System widget shows the user currently logged into the AC2000 CDC, along with the
current time and date.

Figure 39 System widget interface

The System widget is not configurable. However, clicking Refresh Page updates the details on
the widget with any changes.

30

A2SE68-UG-0119-1.2

Chapter 4
Oneshot
The Oneshot application is used to send open commands to selected devices in the AC2000 system.
Three types of open commands can be sent to a device:
Oneshot:

sends a one time open command to a device.


(e.g. opens a door)

Extended Opening:

sends an open command to a device keeping the device open for three
minutes (default duration) if the Door mode for the device is set to
Passenger in the AC2000SE Devices application. (Note: the length of
time the device stays open for is configurable.)

Broadcast Open/Closed:

sends an open command to a device keeping the device open


indefinitely, until a Broadcast Closed command is sent.

31

CHAPTER 4 : Oneshot

To open the Oneshot application select Applications | Oneshot.

Device Selector:
Select all devices or devices grouped
by controller

Add Filter displays


Filter text box and
Open check box
Refreshes
interface
showing devices
and their states.
(Note: Device
state not
displayed in real
time)

Sorts devices
by Address,
Location, or
open/close State

Device List pane

Deselects a
Device
Shows History of
selected device

Oneshot
Sends an open
command to a

Extended Opening sends open


command keeping door open as
defined in the Passenger Time
property in the Devices
application.

Broadcast Open
sends a permanent
open command to the
selected device

Broadcast Close sends


a close command to a
selected device

Figure 40 Oneshot user interface

4.1 Sending a Oneshot command


Oneshot sends an open command to a door keeping it open for the period of time specified in
Lock open time in the AC2000 Devices application (default setting is 5 seconds). To send a
Oneshot command:
1. Select the Device in the Device List pane.
2. Click the Oneshot button.
3. Enter a Reason for the Oneshot in the dialogue screen.
Note: This is only available if ONESHOTHISTORY property is set to Y in the Configured
application.
4. Close the Oneshot feedback screen.

4.2 Extended Opening


Extended Opening keeps a door open for an extended period of time if the device controlling
the door is in Passenger mode. (If a device is in Passenger mode the Passenger time
property in the Devices application specifies the amount of time the door may be open for.)
If a device is not in Passenger mode and the Extended Opening button is clicked a Oneshot
command is sent to the device.

Setting a door to Passenger Mode


1. Open the AC2000 Devices Application.
2. In the Attached Devices pane, double click the device to open it.

32

A2SE68-UG-0119-1.2

AC2000 Web

3. Select the Configuration tab.


4. In the Device Configuration area select the Common tab.
5. Scroll down to select Door mode.
6. Click the Edit button.
7. In Element Options area use the dropdown menu to select Passenger.
8. Click Save. (The Device is now in Passenger mode.)
Note
Not all devices can be put into Passenger Mode.

Set Passenger time value


1. Open the AC2000 Devices Application.
2. In the Attached Devices pane, double click the device to open it.
3. Select the Configuration tab.
4. In the Device Configuration area select the Common tab.
5. Select Passenger time from the list of properties.
6. Click the Edit button.
7. In the Element Value text box enter the time (in minutes) for the door to stay open.
8. Click Save.

4.3 Broadcast Open/Broadcast Close


The Broadcast Open command opens a door for an unlimited period of time. A door that has
been sent a Broadcast Open command will stay open until a Broadcast Close command is
sent to it.

4.4 Device History


To Email, Save or Print a devices history select the device from the Device List pane and click the
History button.
In order to show the Broadcast History and OneShot History the Value setting must be set to Y in the
Configured application.

33

CHAPTER 4 : Oneshot

Go to Previous/Next page listing devices

Sorting data

List of devices
(17 devices listed
per page)

Print
history

Back to main
Oneshot screen
Email device history listing

Save history to file

Figure 41 Device history interface

4.4.1 Email a devices history


1. Click the Email button to mail a devices history as an attachment in CSV format.
(If necessary change the From and Subject Email to and Message information.)
2. Click the Send button.
Fields automatically populated
from Mail Server Settings.
(Possible to manually type into)

Sent to one or multiple recipients


by inserting each email address
on a new line

Message text box

Figure 42 Email history

Note
Before a devices history can be emailed the Mail Server Settings must be configured. To open
the Mail Server Settings, from the AC2000 WEB main menu select System | System
Configuration | Network/Mail Config.

4.4.2 Exporting to CSV


1. Click the EXPORT TO CSV button.
2. Save the CSV file to a location on the workstation.

34

A2SE68-UG-0119-1.2

AC2000 Web

4.5 Viewing Devices


Use the Device dropdown menu to select all connected devices or devices grouped by
controller. The results are shown in the Device List pane.

4.5.1 Sorting Devices


Devices shown in the Device List pane can be sorted in alpha/numeric order by clicking either
of the three headings in the Device List pane; Device Address, Device Location or State.

4.5.2 Filtering Devices


Clicking the Filter button
displays the Filter text box and Open check box. The Filter
textbox and Open check box work on conjunction with one another allowing devices to be
filtered by more than one set of criteria.
E.g. To show all rooms that have devices in an open state, type room in the Filter text box and
tick the Open tick box.

4.5.3 Using the Filter text box


Devices shown in the Device List pane can be shown or hidden (filtered) according to criteria
entered in the Filter text box. Device are filtered by address, location or state when any alphanumerical character is entered in the text box.

The Filter text box and Open check box are


displayed when the Add Filter button is clicked

Add Filter toggle button

Figure 43 Adding a filter

35

CHAPTER 4 : Oneshot

36

A2SE68-UG-0119-1.2

Chapter 5
Mimic
The Mimic application displays a real time list of AC2000 system alarms and provides a limited level of
interaction such as acknowledging and resetting alarms.
For full alarm and event interaction the Alarm +Event Display application should be used.
To open the Mimic application select Applications | Mimic.
Most recent alarm

Add filter

Pause feed
Summary
information

Page display

Alarm list

Deselect

Acknowledge / reset

Figure 44 The Web Mimic user interface

Most recent alarm

Displays information about the most recent alarm to occur on the


system.

Add filter

The alarm list can be filtered by Alarm Type.

Pause Feed

This pauses the refreshing of the list; this is useful at installation or


test when many alarms may be triggered on the system causing the
list to change rapidly. Alarms triggered when the feed is paused will
be displayed once mimic is not paused.

Important
If pause is being used on a live system care should be taken to ensure that the list is restarted once finished.

37

CHAPTER 5 : Mimic

Summary information

Displays a summary of the number of alarms on the alarm


list, the number of these alarms that are unacknowledged and
how many alarms are displayed on the current page.

Page display

Provides list display options 15, 50, 100 alarms per page or
display all. The arrows provide the means of navigating
between multiple pages.

Alarm list

A list of the current alarms on the system including important


information about each alarm.

Deselect

Used to remove an active selection from the alarm list.

Acknowledge / reset

Alarms must be acknowledged to remove them from the list.


Some alarms also require a further step of resetting the
alarm. Both the acknowledge and reset functions are
accomplished using this button.

5.1 Alarm list fields


The alarm list contains important information about each alarm split into distinct fields.

Status
The status field works in conjunction with the status indicator icon to show the current status of
the alarms in the list.
Status indicator icon

Alarm status

Figure 45 Alarms status information

The alarm status information is the same as in Alarm + Event Display.


Red

The alarm needs to be acknowledged.

Green

The alarm has been acknowledged and needs reset.

Blue

The alarm requires a reset at the device e.g. a lock not


engaged requires that the lock becomes re-engaged.

Alarm type
A description of the type of alarm being displayed.

Location
The physical location of the device signalling the alarm as set in the Devices application and
whether it was triggered on a device input such as a door forced alarm or on the device itself
such as a tamper alarm for a reader.

Address
The AC2000 system reader address of the device triggering the alarm and the input number
that is triggering the alarm.

Priority
The priority of the device alarm as set in the Devices application.

38

A2SE68-UG-0119-1.2

AC2000 Web

Date-Time
The date and time that the alarm occurred.

5.2 Filtering and Sorting


The alarm list can be sorted and filtered for ease of use when there are large numbers of
alarms visible.

5.2.1 Sorting the alarm list


The alarm list can be sorted by any of the header fields available.
1. Click on the field to be used to sort the list. An arrow will appear next to the field to signify
the direction of the sort.
Sort direction arrow (ascending)

Figure 46 Sorting the alarm list by field

i.

The default sort direction is ascending.

2. To change the direction of the sort click the field name again. This changes the direction of
the sort and of the arrow.

5.2.2 Filtering the alarm list


The filter returns results based on the Alarm Type.
1. Click the Add Filter button at the top right of the screen. This will activate the filter by
revealing a blank text box beside the button.
2. Type the Alarm Type filter criteria into the filter text box. This is a live function that will
automatically update the alarm list as the filter criteria is typed.

Removing the filter


To remove the filter click the Remove Filter button which has replaced the Add Filter button.

5.3 Alarm Actions


Alarms can be acknowledged and reset using the Web Mimic page.
Note
The Web Mimic page is not a replacement for the Alarm & Event Display (AED) application.
Functions such as batch acknowledgement of alarms, using visual maps and adding notes to
alarms are only available in AED.

5.3.1 Acknowledging alarms


When an alarm has been received by the system, depending on the company's defined
policies there may be several operations to complete before the alarm can be acknowledged.
For example, in the case of a door forced alarm, you may have to request a security officer to
attend the situation. Only when the security officer is contacted can the alarm be
acknowledged.

1. Select the alarm to be acknowledged from the list.

39

CHAPTER 5 : Mimic

2. Click the Acknowledge button at the bottom of the screen.


Depending on the type of alarm acknowledging an alarm will lead to one of several outcomes.
i.

Some alarms will reset after acknowledgement and disappear from the list.

ii.

Some alarms will require manual cancellation. The Status will read Needs Reset and
the status icon will turn green.

iii. Some alarms require a device reset. The Status will read Needs Device Reset and
the status icon will turn blue.

5.3.2 Resetting alarms


When a device has been acknowledged and requires resetting one of two additional steps
must be taken to clear the alarm from the list.

Needs devices reset


When the device needs reset the physical trigger at the device must be neutralised e.g. a lock
not engaged alarm the lock must be re-engaged.

Needs reset
1. Select the alarm to be reset from the list.
2. Click the Reset button at the bottom of the screen.

40

A2SE68-UG-0119-1.2

Chapter 6
Online Status
The Online Status page is used to monitor device online or offline state. Online devices are highlighted
in green, offline devices are highlighted in red. The page automatically updates every 60 seconds.
To open the Online Status page select Application | Online Status.

6.1 Online Status interface


Online RTC
Offline RTC

Shows refresh date and time


Figure 47 Online Status interface

6.1.1 Using Online Status pages


Upon opening the Online Status page you can see whether an RTC is online or offline by the
colour coding. To view the devices attached to the RTC click on an RTC name. This opens the
RTC Online page.

41

CHAPTER 6 : Online Status

6.1.2 RTC Online page


Hovering over a device shows details

Green shows online device

RTC selector

Device Groups

Shows date and time of last update

Status summary

The RTC Online page shows a grid with all devices in a Device Group.

6.1.3 Viewing device details


To view a devices details:
1. Hover the mouse pointer over a device.
2. A pop-up screen displays the Devices
Address
Type
Mode
Location

6.1.4 RTC selector


When in the RTC Online page use the RTC selector to choose the RTC to be shown.

42

A2SE68-UG-0119-1.2

Chapter 7
Reports
The AC2000 WEB Reports application produces user-defined reports using data from the AC2000
system. Reports can be generated using the standard report template or customised to include more
specific information. The reports can be saved and reused or scheduled to run automatically.
To open the Reports application select Applications | Reports.
Report selection list

Report criteria
list
Viewing
pane

Custom report
setup
Report options

Figure 48 Web Reports user interface

43

CHAPTER 7 : Reports

7.1 Generating a Standard Report


Reports are generated either by loading a saved report or by creating a new report. Refer to
the report type sections for specific instructions on how to create that type of report.

7.1.1 Enabling reports in AC2000 Configured


Some reports must be first enabled in the AC2000 Configured application.
1. Log in to the AC2000 Floatbar.
2. Open Advanced Configuration | Configured.
3. Select the report to be enabled
4. Set the Value to Y.
5. Click Save.

7.1.2 Select a report type


The report types are available from the report selection dropdown list at the top left of the
Summary page.

Figure 49 Report types

7.1.3 Defining the report criteria


If you are generating a report for the first time, define the report criteria to determine what
information is to be included. Reports can contain standard criteria available from the report
criteria list, or custom criteria which are selected and entered by you.
For information about how to generate a custom report, refer to Generating a Custom
Report.

The criteria available to report on depends on the type of report selected

Standard criteria are: Date; Cardholder; Device; Alarm; Company; Outcome; Zone and
Access Type

7.1.4 Viewing a report


Once all the criteria are set click Generate.
At the bottom of each report is a toolbar containing the report output options.

Figure 50 Report output options

44

A2SE68-UG-0119-1.2

AC2000 Web

Emailing a report
Reports can be sent to recipients via email, as long as an SMTP email has been configured
(for instructions on how to do this, refer to Network/Mail Configuration on page 77).
1. Click Email.
2. Enter a subject.
3. Enter the recipients email address in the Email to box. If there is more than one recipient,
enter each address on a new line.
4. Click Send.

Exporting a report as a CSV file


Reports can be exported to Comma, Separator, Value (csv) files as either a .csv or .txt file.
1. Click Export.

CSV radio
button is
selected by
default

Delimiter
dropdown

File extension
dropdown

Export

Figure 51 Export dialogue with CSV selected

2. Select the appropriate delimiter from the dropdown menu. Comma, Tab, Semicolon or
Pipe can be selected.
3. Select whether to export the report as a .csv or a .txt file.
4. Click Export.

Exporting a report as a PDF file


Exporting a report as a pdf file reduces the risk of data being tampered with by a casual user.
1. Click Export.

45

CHAPTER 7 : Reports

2. Select the PDF radio button.


PDF radio button

PDF Options

Export
Figure 52 Export dialogue with PDF selected

3. Select the Paper Size for the report.


4. Select whether to print the report in portrait or landscape.
5. Place a tick next to Cover Page if one is required. The Cover Page contains information
about the report type and criteria selected.

Figure 53 Example report cover page

6. Click Export.
7. Follow the browser instructions to open or save the created PDF file.

Printing a report
1. Click Print.
2. Select a printer then Print.

Modifying a report
1. Click Modify Report.
2. The view returns to the criteria window. Redefine the parameters as necessary.

Creating a new report


This option is a shortcut to generate a new report. Do not use if the current report is needed
later as the configuration settings are lost when New Report is clicked.
1. Click New Report.
2. The view returns to the Summary page to create a fresh report. Define the parameters as
necessary.

46

A2SE68-UG-0119-1.2

AC2000 Web

7.1.5 Saving a report


When the same reporting criteria settings are used frequently e.g. the same specific devices
selected, the report can be configured once and then saved to be reused. Reports are saved
according to type and are not visible when generating a different type of report.
1. From the report options list in the left pane, click Save / Load Report.

Enter a name for the report. The name will remain in CAPS and cannot contain
any special characters.
2. Click Save.

Saved reports

Load Delete
Figure 54 Saving a report

Loading a saved report


Load a saved report to generate a new report using the same criteria settings.
1. From the report options list, click Save / Load Report.
2. Locate the report to be loaded from the list and click Load.

Deleting a saved report


1. From the report options list, click Save / Load Report.
2. Select the report to be removed and click Delete.

7.1.6 Schedule the report


Saved reports can be scheduled to run automatically using the Scheduler.
1. From the report selection list, click Scheduler.

47

CHAPTER 7 : Reports

2. Click Schedule a Report.


Saved reports
Schedule
name
How often the
report runs
When the
report runs

Email
settings

CSV file
settings

Figure 55 Scheduling a report

3. Select the report to be scheduled from the dropdown list.


4. Type a name for the scheduled job. No spaces or special characters can be used in the
report names.
5. Select the frequency of the report. AC2000 will amend the date criteria each time the
report is run to match the new date.
6. Select a time for the report to run.
7. Type the email subject of the report.
8. Create an email address that will appear in the From section of the email.
9. Add email addresses that the report is to be sent to. For multiple email addresses a new
line must be used.
10. Select the CSV data delimiter.
11. Select whether to save the report as a .csv or a .txt file.
12. Click Save to confirm the changes and view the report schedule summary.

Figure 56 Report schedule summary

48

A2SE68-UG-0119-1.2

AC2000 Web

7.2 Generating an Absentee Report


The Absentee Report shows a list of cardholders that have not swiped on selected reader(s)
within the defined period of time. The report may include standard and custom criteria. For
instructions on how to create a custom report, refer to Generating a Custom Report.
From the report selection list, select Absentee and configure the report as described.

7.2.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.2.2 Selecting the devices


By default all devices are selected.
1. From the report criteria list, click Device.
2. Select the device(s) to be excluded from the report by clicking the corresponding
checkboxes.
3. All devices can be selected or deselected using the options at the top right of the report
window.

7.2.3 Selecting cardholders


The report can include all cardholders, or some cardholders based on their company or
specific search criteria. All cardholders are included by default. To filter the results choose one
of the options.
From the report criteria list, click Cardholder.

Cardholders grouped by company


1. Click the By Company radio button.
2. Click the checkboxes next to the companies you want included in the report.
3. Alternatively, click Select All to include them all (or Deselect All to exclude them).

Specific cardholders
1. Click the Specific Cardholders radio button.
2. Select the search criteria from the Search on dropdown.
3. Enter the search term in the Search for field and click Find.
4. Check the results are correct in the Search Results dropdown and click Add to criteria.

49

CHAPTER 7 : Reports

5. Repeat steps 2-4 until all the desired cardholders can be seen in the Current Criteria box.

Viewing the Absentee report


Once all the criteria are set click Generate.

Figure 57 The Absentee report

7.3 Generating an Access Level Changes Report


The Access Level Changes report shows which cardholders have had changes made to their
access permissions, and when. It contains date and cardholder information and is a useful
check to ensure access permissions have been set correctly.
From the report selection list, select Access Level Changes and configure the report criteria
as described.

7.3.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.3.2 Selecting cardholders


The report can include all cardholders, or some cardholders based on their company or
specific search criteria. All cardholders are included by default. To filter the results choose one
of the options.
From the report criteria list, click Cardholder.

Cardholders grouped by company


1. Click the By Company radio button.
2. Click the checkboxes next to the companies you want included in the report.
3. Alternatively, click Select All to include them all (or Deselect All to exclude them).

Specific cardholders
1. Click the Specific Cardholders radio button.
2. Select the search criteria from the Search on dropdown.

50

A2SE68-UG-0119-1.2

AC2000 Web

3. Enter the search term in the Search for field and click Find.
4. Check the results are correct in the Search Results dropdown and click Add to criteria.
5. Repeat steps 2-4 until all the desired cardholders can be seen in the Current Criteria box.

Viewing the Access Level Changes report


Once all the criteria are set click Generate.
When adding new users to a new system, the report displays a change in their access level
from none to the assigned level.

Date and time of


change

Name of cardholder
or vehicle registration

Access level before


the change

Access level after the


change

User who made


the change

Figure 58 Access Level Changes report

7.4 Generating an Alarm Report


An Alarm report shows a list of system alarms and any action taken against them. The report
may include standard and custom criteria. For instructions on how to create a custom report,
refer to Generating a Custom Report.

Configured application field: EnableAlarmReport

From the report selection list, select Alarm and configure the report criteria as described.

7.4.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

51

CHAPTER 7 : Reports

7.4.2 Selecting the devices


By default all devices are selected.
1. From the report criteria list, click Device.
2. Select the device(s) to be excluded from the report by clicking the corresponding
checkboxes.
3. All devices can be selected or deselected using the options at the top right of the report
window.

7.4.3 Selecting the alarms


By default all alarm types are selected.
1. From the report criteria list, click Alarm.
2. Select the alarm(s) to be excluded from the report by clicking the corresponding
checkboxes.
3. All alarms can be selected or deselected using the options at the top right of the pane.

7.4.4 Viewing the Alarm Report


Once all the criteria are set click Generate.
Displays any notes
added to the alarm

Location of the alarm (reader


address and device location)

Name of alarm

Time and date of


alarm occurrence

Input number the alarm


was triggered on

Time and date


alarm was
acknowledged

Login details of user that


acknowledged the alarm

Time and date alarm


was cancelled

Login details of user that


cancelled the alarm

Figure 59 Alarm report

7.5 Generating a Broadcast Report


A Broadcast report displays a list of any broadcast zone activity on the system. The report may
include standard and custom criteria. For instructions on how to create a custom report, refer
to Generating a Custom Report.

Configured application field: BROADCASTHISTORY

From the report selection list, select Broadcast and configure the report criteria as described.

7.5.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.

52

i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

A2SE68-UG-0119-1.2

AC2000 Web

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.5.2 Selecting the devices


By default all devices are selected.
1. From the report criteria list, click Device.
2. Select the device(s) to be excluded from the report by clicking the corresponding
checkboxes.
3. All devices can be selected or deselected using the options at the top right of the report
window.

7.5.3 Selecting the zones


By default all zones are selected.
1. From the report criteria list, click Zone.
2. Select the zone(s) to be excluded from the report by clicking the corresponding
checkboxes.
3. All broadcast zones can be selected or deselected using the options at the top right of the
report window.

7.5.4 Viewing the Broadcast report


Once all the criteria are set click Generate.
Location of the alarm - reader
address and physical device
location

Name of the broadcast


zone triggered

Output triggered by
the broadcast

User that triggered


the broadcast

Type of broadcast:
O - Open

Reason for broadcast if


manually triggered

Date and time of


broadcast trigger

C - Closed

Figure 60 Broadcast report

7.6 Generating a Card Parking Report


A Card Parking report displays a list of parked cards on the system. The report may include
standard and custom criteria. For instructions on how to create a custom report, refer to
Generating a Custom Report.

Configured application field: EnableParkReport

From the report selection list, select Card Parking and configure the report criteria as below.

53

CHAPTER 7 : Reports

7.6.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.6.2 Selecting the company


By default all companies are selected.
1. From the report criteria list, click Company.
2. Select the company(s) to be excluded from the report by clicking the corresponding
checkboxes.
3. All companies can be selected or deselected using the options at the top right of the report
window.

7.6.3 Viewing the Card Parking report


Once all the criteria are set click Generate.
Name or reg number
associated with any card
transaction logged

Company ID that the


card record is
associated with

Hotstamp number
of the card

Company name that


the card record is
associated with

Access level that the


card was associated
with before parking

Date the card


became parked

Figure 61 Card Parking report

7.7 Generating a Card Parking RZ Report


The report may include standard and custom criteria. For instructions on how to create a
custom report, refer to Generating a Custom Report.
From the report selection list, select Card Parking RZ and configure the report criteria as
described.

54

A2SE68-UG-0119-1.2

AC2000 Web

7.7.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


Alternatively, Duration can be left with Date Range selected. Enter an end date and time in
the Until Date field.

7.7.2 Selecting the company


By default all companies are selected.
1. From the report criteria list, click Company.
2. Select the company(s) to be excluded from the report by clicking the corresponding
checkboxes.
All companies can be selected or deselected using the options at the top right of the report
window.

7.7.3 Viewing the Card Parking RZ report


Once all the criteria are set click Generate.

Name or reg number


associated with any card
transaction logged

Company ID that the


card record is
associated with

Hotstamp number
of the card

Access level that the


card was associated
with before parking

Company name that


the card record is
associated with

Date the card


became parked

Figure 62 Card Parking RZ report

7.8 Generating a Device Report


A Device report displays a list of all transactions and alarms on selected devices on the
system. The list can be filtered to display specific company or cardholder transactions. The
report may include standard and custom criteria. For instructions on how to create a custom
report, refer to Generating a Custom Report.

Configured application field: EnableDeviceReport

From the report selection list, select Device and configure the report criteria as described.

7.8.1 Selecting the devices


By default all devices are selected.

55

CHAPTER 7 : Reports

1. From the report criteria list, click Device.


2. Select the device(s) to be excluded from the report by clicking the checkboxes next to
them.
All devices can be selected or deselected using the options at the top right of the report window.

7.8.2 Selecting cardholders


The report can include all cardholders, or some cardholders based on their company or
specific search criteria. All cardholders are included by default. To filter the results choose one
of the following options.
From the report criteria list, click Cardholder.

Cardholders grouped by company


1. Click the By Company radio button.
2. Click the checkboxes next to the companies you want included in the report.
3. Alternatively, click Select All to include them all (or Deselect All to exclude them).

Specific cardholders
1. Click the Specific Cardholders radio button.
2. Select the search criteria from the Search on dropdown list.
3. Enter the search term in the Search for field (this is mandatory) and click Find.
4. Check the results are correct in the Search Results dropdown and click Add to criteria.
5. Repeat steps 2-4 until all the desired cardholders can be seen in the Current Criteria box.

7.8.3 Viewing the Device report


Once all the criteria are set click Generate.
Displays notes associated
with any alarms

Type of event e.g.


Card Swipe or Alarm

Time and date of device event

Physical location of the device

AC2000 device address

Nature of the event logged

Name or reg number


associated with any card
transaction logged

Figure 63 Device report

7.9 Generating a Device Access Report


A Device Access report displays a list of cardholders and their access levels on the selected
device(s) (not the device information). The report may include standard and custom criteria.
For instructions on how to create a custom report, refer to Generating a Custom Report.

Configured application field: EnableAccessReport

From the report selection list, select Device Access and configure the report criteria as
described.

56

A2SE68-UG-0119-1.2

AC2000 Web

7.9.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.9.2 Selecting the devices


By default all devices are selected.
1. From the report criteria list, click Device.
2. Select the device(s) to be excluded from the report by clicking the checkboxes next to
them.
3. All devices can be selected or deselected using the options at the top right of the report
window.

7.9.3 Selecting the access types


You can include any access type, the primary access level or extra access levels.
1. From the report criteria list, click Access Type.
2. Select the appropriate option, as described below:
Any - all access levels
Primary Access Level - assigned to cardholders
Extra Access Levels - temporary extra access assigned to cardholders

7.9.4 Viewing the Access Type report


Once all the criteria are set click Generate.
Surname or reg number
associated with any card
transaction logged

Cardholder forename

Hotstamp number of card Access level associated


associated with cardholder with the cardholder

Cardholder payroll number

Company associated with


the cardholder

Company ID associated with the cardholder

Figure 64 Access Type report

57

CHAPTER 7 : Reports

7.10 Generating a Device Configuration Report


A Device Configuration Report displays the AC2000 system configuration information of the
selected device(s). The report may include standard and custom criteria. For instructions on
how to create a custom report, refer to Generating a Custom Report.
From the report selection list, select Device Configuration and configure the report criteria as
described.

7.10.1 Selecting the devices


By default all devices are selected.
1. From the report criteria list, click Device.
2. Select the device(s) to be excluded from the report by clicking the checkboxes next to
them.
3. All devices can be selected or deselected using the options at the top right of the report
window.

7.10.2 Viewing the Device Configuration report


1. Once all the criteria are set click Generate.
Device configuration information

Input configuration information

Show/Hide All Inputs

Hide input
information

Expand device to view


input information

Figure 65 Device Configuration report

7.11 Generating a First and Last Report


A First and Last report displays a list of the first and last swipes a cardholder(s) has made at
designated in/out readers. For example, it can be used to confirm contractor times for entering
and leaving a site.

Configured application field: EnableFLReport

From the report selection list, select First and Last and configure the report criteria as
described.

7.11.1 Setting the date range


By default a daily date range is set for today. To set a different date range:

58

A2SE68-UG-0119-1.2

AC2000 Web

1. From the report criteria list, click Date.


2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.11.2 Selecting the devices


By default all devices are selected.
1. From the report criteria list, click Device.
2. Select the device(s) to be excluded from the report by clicking the checkboxes next to
them.
3. All devices can be selected or deselected using the options at the top right of the report
window.

7.11.3 Selecting cardholders


The report can include all cardholders, or some cardholders based on their company or
specific search criteria. All cardholders are included by default. To filter the results choose one
of the following options.
From the report criteria list, click Cardholder.

Cardholders grouped by company


1. Click the By Company radio button.
2. Click the checkboxes next to the companies you want included in the report.
3. Alternatively, click Select All to include them all (or Deselect All to exclude them).
4. When the criteria has been set, click Generate.

Specific cardholders
1. Click the Specific Cardholders radio button.
2. Select the search criteria from the Search on dropdown list.
3. Enter the search term in the Search for field (this is mandatory) and click Find.
4. Check the results are correct in the Search Results dropdown and click Add to criteria.
5. Repeat steps 2-4 until all the desired cardholders can be seen in the Current Criteria box.

7.11.4 Selecting an Outcome


An outcome is the result of a card swipe, such as card valid or wrong zone. By default all
outcomes are selected.
1. From the report criteria list, click Outcome.
2. Select the outcome(s) to be excluded from the report by clicking the corresponding
checkboxes

59

CHAPTER 7 : Reports

3. All outcomes can be selected or deselected using the options at the top right of the report
window.

7.11.5 Viewing the First and Last report


Once all the criteria are set click Generate.
Surname or reg number
associated with any card
transaction logged

Location of the first swipe reader address and physical


device location

Time and date of the


first card swipe

Location of the second swipe


- reader address and physical
device location

Time and date of the


last card swipe

Company name that the


card record is associated
with cardholder

Company ID of the
cardholder or vehicle

Payroll number of
the cardholder

Figure 66 First and Last report

7.12 Generating a Guard Tour Report


A Guard Tour report displays the system guard tour routes and card swipes carried out at each
position. The report may include standard and custom criteria. For instructions on how to
create a custom report, refer to Generating a Custom Report.

Configured application field: EnableGuardTourReport

From the report selection list, select Guard Tour and configure the report criteria as described.

7.12.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.12.2 Selecting a tour


You can include all tours, or specific tours or guards. By default all tours are included. To filter
the results by either tour or guard:
From the report criteria list, click Tour.

Specific tour
1. Click the Specific Tour radio button.
2. Select the search criteria from the Search on dropdown list.
3. Enter the search term in the Search for field and click Find.
4. Check the results are correct in the Search Results dropdown and click Add to criteria.

60

A2SE68-UG-0119-1.2

AC2000 Web

5. Repeat steps 2-4 until all the desired tours can be seen in the Current Criteria box.

Specific guard
1. Click the Specific Guard radio button.
2. Select the search criteria from the Search on dropdown list.
3. Enter the search term in the Search for field and click Find.
4. Check the results are correct in the Search Results dropdown and click Add to criteria.
5. Repeat steps 2-4 until all the desired guards can be seen in the Current Criteria box.

7.12.3 Viewing the Guard Tour report


Once all the criteria are set click Generate.
Name of the guard tour

Unique serial number for the


guards personnel record

Name of the guard


swiping on the tour

Location of the first swipe - reader address


and physical device location

Specific tour event


e.g. Tour started,
tour completed

Time and date of the


card swipe event

Figure 67 Guard Tour report

7.13 Generating a Personnel Report


The Personnel report displays a list of cardholders currently on the system. The report may
include standard and custom criteria. For instructions on how to create a custom report, refer
to Generating a Custom Report.
From the report selection list, select Personnel and configure the report criteria as described.

7.13.1 Selecting the access type

Configured application field: EnablePersonnelReport

You can include any access type, the primary access level or extra access levels.
1. From the report criteria list, click Access Type.
2. Select the appropriate option, as described below:
Any - all access levels
Primary Access Level - assigned to cardholders
Extra Access Levels - temporary extra access assigned to cardholders

7.13.2 Selecting the access level


By default all access levels are selected.
1. From the report criteria list, click Access Level.
2. Select the access level(s) to be excluded from the report by clicking the corresponding
checkboxes.

61

CHAPTER 7 : Reports

3. All access levels can be selected or deselected using the options at the top right of the
report window.

7.13.3 Selecting the timezone


By default all timezones are selected.
1. From the report criteria list, click Timezone.
2. Select the timezone(s) to be included in the report by clicking the corresponding
checkboxes.
3. All timezones can be selected or deselected using the options at the top right of the report
window.

7.13.4 Selecting the company


By default all companies are selected.
1. From the report criteria list, click Company.
2. Select the company to be excluded from the report by clicking the corresponding
checkboxes.
3. All companies can be selected or deselected using the options at the top right of the report
window.

7.13.5 Selecting the card format


By default all card formats are selected.
1. From the report criteria list, click Card Format.
2. Select the card format(s) to be included in the report by clicking the corresponding
checkboxes.
3. All card formats can be selected or deselected using the options at the top right of the
report window.

7.13.6 Viewing the Personnel report


Once the criteria are set click Generate.
Cardholder name

Company ID
cardholder is
associated with

Payroll number

Card format assigned


to the cardholder

Company name

Level type - Primary


or Extra Access

Access level
associated with
the cardholder

Hotstamp number of
the card associated
with the record

Timezone
associated with
cardholder

Expiry date of
card associated
with the record

Figure 68 Personnel report

62

A2SE68-UG-0119-1.2

AC2000 Web

7.14 Generating a Reader Activity Report


The Reader Activity report generates a display of the number of card swipes on selected
reader(s) within defined date and time criteria.

Configured application field: EnableReaderActivityReport

From the report selection list, select Reader Activity and configure the criteria as described.

7.14.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.14.2 Selecting the devices


By default all devices are selected.
1. Select the device(s) to be excluded from the report by clicking the corresponding
checkboxes
2. All devices can be selected or deselected using the options at the top right of the report
window.

7.14.3 Setting the time period


You can report on reader activity over the period of 15 minutes, 30 minutes or an hour.
1. From the report criteria list, click Time Period.
2. Set the time interval by clicking the corresponding radio button.

7.14.4 Viewing the Reader Activity Report


Once all the criteria are set click Generate.
Date of activity

Reader swipe count totals displayed in time intervals

Reader address

Figure 69 Reader Activity report

63

CHAPTER 7 : Reports

7.15 Generating a Transaction Report


A Transaction report displays all card transactions on the selected device(s) within the defined
criteria. The report may include standard and custom criteria. For instructions on how to create
a custom report, refer to Generating a Custom Report.

Configured application field: EnableGlobalTransactionReport

From the report selection list, select Transaction and configure the criteria as described.

7.15.1 Setting the date range


By default a daily date range is set for today. To set a different date range:
1. From the report criteria list, click Date.
2. Enter a start date and time in the Start Date fields.
3. Use the Duration date range dropdown to set a time period for the report.
i.

Select Days and enter how many days to include

ii.

Select Weeks and enter how many weeks to include

iii. Select Months and enter how many months to include


4. Alternatively, Duration can be left with Date Range selected. Enter an end date and time
in the Until Date field.

7.15.2 Selecting the devices


By default all devices are selected.
1. Select the device(s) to be excluded from the report by clicking the corresponding
checkboxes.
2. All devices can be selected or deselected using the options at the top right of the report
window.

7.15.3 Selecting cardholders


The report can include all or some cardholders (filtered by company or other search criteria).
All cardholders are included by default. To filter the results choose one of the options.
From the report criteria list, click Cardholder.

Cardholders grouped by company


1. Click the By Company radio button.
2. Click the checkboxes next to the companies you want included in the report.
3. Alternatively, click Select All to include them all (or Deselect All to exclude them).
4. When the criteria has been set, click Generate.

Specific cardholders
1. Click the Specific Cardholders radio button.
2. Select the search criteria from the Search on dropdown.
3. Enter the search term in the Search for field and click Find.
4. Check the results are correct in the Search Results dropdown and click Add to criteria.

64

A2SE68-UG-0119-1.2

AC2000 Web

5. Repeat steps 2-4 until all the desired cardholders can be seen in the Current Criteria box.

7.15.4 Selecting an outcome


An outcome is the result of a card swipe, such as card valid or wrong zone. By default all
outcomes are selected.
1. From the report criteria list, click Outcome.
2. Select the outcome(s) to be excluded from the report by clicking the corresponding
checkboxes.
3. All outcomes can be selected or deselected using the options at the top right of the report
window.

7.15.5 Viewing the Transaction report


Once the criteria are set click Generate.
Surname or reg number
associated with any card
transaction logged

Card swipe outcome

Date and time of the


logged transaction

Personnel serial
number of the
cardholder

Company ID of
the cardholder

Device address and


Hotstamp number of the
physical location of the
card associated with the
reader that the transaction cardholder
is logged on

Cardholder
payroll number

Company name
associated with the
cardholder

Figure 70 Transaction report

65

CHAPTER 7 : Reports

7.16 Generating a Custom Report


Create a custom report to view information that is not included in a standard report e.g. alarm
location and time (in an Alarm report). Add custom criteria to the report by selecting and
renaming the corresponding database field for the data you want to include. Any fields from the
database tables may be added to the report.
Not all reports can be customised. If Report Setup is not visible in the report criteria list then
the custom report option is not available.
1. From the report selection list, select the report type.
2. Click Report Setup.
3. Click the Enable Custom Report radio button.

7.16.1 The custom report interface


The name of the column
as it will appear in the
report. (Field name)

Fields that are included in the


column. There is no limit to the
number that can be included

Add a new field to the column


Move the
column down
a position on
the report.

Remove the
column

Move the
column up a
position on
the report.

Remove the
current field

Add a new
column

Clear the current


report columns

Load the default


columns and fields

Figure 71 The custom reports default columns and fields

7.16.2 Configuring the criteria


The custom report fields and criteria are pre-populated with commonly used columns and
fields. Add new data to the report by configuring the columns and fields as described below.

66

A2SE68-UG-0119-1.2

AC2000 Web

Adding columns
The columns in the custom report form the field heading in the generated report. New columns
are added to the report by clicking the Add Column button at the bottom of the screen.
Newly created
column
Add Column

Figure 72 Adding a new column

Renaming a column
Columns are renamed by placing the cursor in the Column field and typing in the required
name. This name will appear as the field header in the generated report.

Renamed column

Figure 73 Renaming a column

Changing the order of columns


The order in which columns appear on the report can be changed. The top column on the
custom report configuration corresponds with the leftmost column in the report. To move the
column up or down the list use the arrows to the right of the column.
Move Up or Down

Figure 74 Changing the order of columns

Removing a column
Click the corresponding Delete icon to remove a column.

Adding and removing fields to and from a column


Select fields from the list to add data to the columns. A list of each of these fields and their
meanings are included in this document. There is no limit to the number of fields that can be
added to a column. To add a field to a column:
1. To add a field to a column click the Add Field button.
2. To remove a field from a column click the Remove Field button.
Add field
Remove field

Figure 75 Adding and removing fields

Clearing the custom columns and fields


Click Clear to remove all of the columns and fields.

Restoring customer report defaults


Click Load Defaults to restore the default columns and fields.

Generating the custom report


Once all the criteria are set click Generate.

67

CHAPTER 7 : Reports

68

A2SE68-UG-0119-1.2

Chapter 8
Room Booking
Room Booking is a web application that allows a user to reserve predefined rooms for a period of
time, between 30 minutes and 24 hours, midnight to midnight. Users can edit and delete bookings
(meetings) and authorised users can also add, edit and delete rooms.
Note
A user must have the web Room Booking function assigned to them in the AC2000 User
Options application.
To open Room Booking select Applications | Room Booking

8.1 Timetable Overview


The main Room Booking web page is a Timetable displaying existing bookings. It is used to
book meetings and edit predefined rooms.

Date
selector

Timetable

Booked
meeting

Add/
edit/delete
rooms

Add a new
booking
Figure 76 Room Booking Timetable

69

CHAPTER 8 : Room Booking

There are two Timetable formats:

All rooms for one day

Specific room for five days

The Timetable displays information depending on the room selection. If All is selected, each
column displays a room name. If a specific room is selected, each column displays a date.

8.1.1 Displaying all rooms for one day


This option displays a list of all predefined rooms for a selected day. To view all available
rooms select All from the Rooms drop down list. The name of each room is displayed
alphabetically in the column header at the top of the Timetable. A maximum of five rooms can
be displayed at one time. If there are more than five rooms available use the navigation arrows
below the Timetable to scroll to the previous and next room.

Date
selector

Room
names

Room
unavailable

Add/
edit/delete
rooms

Add a new booking

Room
navigation
buttons

Figure 77 Viewing all rooms for one day

This view displays the minimum Available From time to the maximum Available To time
across all predefined rooms. These times are the earliest time the room can be reserved from
and the latest time the room is available to. The Timetable displays only the available times to
restrict each room to the relevant period. If a room is not available within these times, the area
is greyed out and no bookings can be made for the room at that time.

8.1.2 Specific room for five days


This option displays a specific room for a maximum of five consecutive days. To view a room
select the Room name from the Rooms drop down list. Use the date selector and the
navigation arrows to view specific dates.

8.2 Setting up Rooms


Before the Room Booking system can be used, rooms must be added to the system.
Note
The option to configure rooms is set up using application checkpoints in AC2000 User Options.
See the AC2000 Setup Guide.

70

A2SE68-UG-0119-1.2

AC2000 Web

8.2.1 Adding a room


3. Select EDIT ROOMS
Room Description

Maximum
occupancy

Available
From & To
times

Add
room

Delete
room
Add
device
Return to
Timetable
Figure 78 Adding a new room

4. Enter a unique Room Description in the Add New section.


5. Enter a Maximum occupancy. This is the maximum number of people that can occupy
the room at one time.
6. Enter the Available From and Available To times. Default values are 7:00 to 19:00.
7. Click ADD.
A Devices window opens displaying all available emerald readers connected to the CDC.

Select
emerald
reader

Devices

Figure 79 Adding a reader to a room

8. Select an appropriate reader to assign to the new room.


Note
A reader can not be assigned to two different rooms, however, a room can have more than one
reader e.g. a room with two doors can have a reader at each door.

Add reader to room


Close
Devices
window
Figure 80 Adding a reader to a room

71

CHAPTER 8 : Room Booking

9. Click OK.
10. Click RETURN to return to the Timetable.
Note
Cancelling closes the form and does not assign a reader to the new room

8.3 Booking Rooms


Rooms can be booked between the Available From and Available To times on a specific
date. A room can be block booked for one full day. Meetings can be set to repeat on particular
days if required as long as they do not conflict with another pre-booked meeting.

8.3.1 Adding a booking


To add a booking, select the appropriate room from the Rooms drop down list. Select the
area on the Timetable to represent the required time. More than one time slot can be selected
to book a longer period of time.
Date of
booking

Time of
booking

Description
Repeat
booking

Show
Notice
Background
Color

Add booking
Figure 81 Adding a new booking

1. Select a row (time slot) on the Timetable for a room on a specific day.
i.

To book a longer time period hold the Control (Ctrl) key and select multiple rows.

ii.

To block book one full day select the column header.

Note
To block book a full day, there must be no existing bookings scheduled for that day.
2. Click ADD BOOKING.
3. Enter a unique Description for the booking. This field has a max length of 80 characters.
4. Select the Repeat option. If this setting is applied, the meeting will be placed into all
relevant time slots from the date the booking is made.

72

A2SE68-UG-0119-1.2

AC2000 Web

Bookings that Repeat will show a Repeat icon in the description on the Timetable. Hovering
over this icon will display how often the booking repeats.

Repeat
icon

Figure 82 Repeating a booking

5. Select to Show Notice. This is defaulted to No.


Showing Notice displays an image on the emerald reader associated with the room that is
booked. This displays the details of the booking and how long the room is booked for.
6. Select a Color to represent the new booking on the Timetable.
7. Click OK.
Note
Cancelling closes the form and deselects rows.

8.4 Editing Bookings and Rooms


8.4.1 Editing a booking
Existing bookings can be amended, however, the room, booking start and end times cannot
be changed.
1. Open the Timetable.
2. Select a booking to edit.
3. Edit the details as appropriate.
4. Click OK to save the changes.
Note
Cancelling closes the booking form and does not save the changes.

8.4.2 Deleting a booking


1. Open the Timetable.
2. Select a booking to delete.
3. Click Remove.
A warning message is displayed verifying you want to remove the booking.
4. Click OK.

8.4.3 Editing a room


After rooms are added to the system they can be edited to change the Room Description,
Maximum occupancy, Available From and Available To times.
1. Open the Timetable.
2. Select EDIT ROOMS.
3. Select the Room to amend.

73

CHAPTER 8 : Room Booking

4. Enter the new room details as appropriate.


5. Click UPDATE to apply the changes.

8.4.4 Deleting a room


Predefined rooms can be deleted from the system.
Note
A room can not be deleted if future bookings exist for that room. Deleting a room will remove
all past bookings.
1. Open the Timetable.
2. Select EDIT ROOMS.
3. Select the Delete icon next to the Room to delete.

Figure 83 Delete room icon

A warning message is displayed verifying you want to proceed.

Figure 84 Deleting a room warning message

4. Click YES.
The deleted room no longer appears on the list of Rooms.

74

A2SE68-UG-0119-1.2

Chapter 9
RTD
The RTD (Rolling Transaction Display) application shows a live view of transactions and alarms.
To open RTD select Applications | RTD.

9.1 Creating a Group of Devices and Alarms


Before RTD can display transactions and alarms as they occur, you need to create the device
and alarm groups. When Rolling Transaction Display is run for the first time a new group must
be created. The new group contains the selected devices and alarms which the RTD will
monitor. Selecting devices and alarms makes it simpler to monitor different sets of devices and
alarms on site.

75

CHAPTER 9 : RTD

Enter a Group name

Select each
tab to show
devices and
alarms to be
added to
a group

Select
Devices to
be added to
the group

Click to delete the Group

Click to save the Group

Figure 85 RTD: creating Device and Alarm Groups

1. Enter a name in the Group Name text box.


2. Select the Devices to be added to the group.
3. Click the Alarms tab and select the alarms to be added to the group.
4. Click Save.

9.2 Creating and managing Groups


Additional groups can be created at any time and existing groups can be edited to add or
remove devices and alarms.
Enter the RTD page and click
the CREATE button to create a
new group

Select an existing group and


click EDIT to add or remove
devices or alarms

Figure 86 RTD: Creating and editing groups

9.2.1 Creating an additional group


Click the Create button at the bottom of the page. See Creating a Group of Devices and
Alarms on page 75 for instructions on how to add devices and alarms to a group.

9.2.2 Editing existing groups


1. Using the RTD Group to monitor dropdown menu select the group and press the EDIT
button at the bottom of the page.
2. Select and deselect devices and alarms to be added or removed from the group.

76

A2SE68-UG-0119-1.2

AC2000 Web

3. Click the SAVE button at the bottom of the page.

9.2.3 Deleting a group


1. Using the RTD Group to monitor dropdown menu select the group and press the EDIT
button at the bottom of the page.
2. Click the DELETE button at the bottom of the page.

9.3 Selecting a Group to monitor


Before monitoring can begin, one of the predefined group must be selected.
1. Select a Group from the RTD group to monitor dropdown menu.
2. Click the arrow button next to the dropdown menu.
Select the group to monitor
Click the arrow button to go to
Simple List view
Figure 87 RTD: selecting a group to monitor

77

CHAPTER 9 : RTD

9.4 WEB RTD List views


RTD is made up of four tabbed windows. The Simple List, Detail List and Image tabs are used
to view transactions as they occur on the system. However, each of the tabbed windows
provides a different way of viewing events and associated information as the
transactions/alarms occur.
The Setup tab is used to configure how transaction/alarm events are selected as they are
displayed in each of the three display views.

Displays information as Transaction and Alarm events occur


Switch between Auto and Manual
mode (default)
Figure 88 Web RTD display lists and view

9.4.1 Setup tab


The Setup tab is used to configure how the transaction/alarm events are viewed in the Simple
List, Detail List and Images tabs.

Manual mode
The system is configured to be in Manual mode by default. When Web RTD is in Manual mode
you must select the transaction/alarm events in order to see more details.
Auto Mode: last transaction/alarm is automatically selected

Manual Mode: the default setting, transaction/alarm events


must be manually selected to see further details
Figure 89 RTD Setup tab and display modes

Auto mode
If Auto mode is selected the last transaction/alarm event is automatically highlighted showing
details of each event as it occurs in real time.
If the system is running in Auto Mode it is not possible to use Oneshot or Extended Opening
and the buttons will not be visible.

Important
If you log out of Web RTD or use another AC2000 Web application, the software reverts to Manual mode and all
previously viewed alarms/transactions are no longer visible.

78

A2SE68-UG-0119-1.2

AC2000 Web

9.4.2 Simple List tab


The Simple List view displays transactions and alarm entries in real time. If the RTD is set in
Auto mode the last occurring transaction/alarm is highlighted by default and shows the
relevant details in the Top pane.
If the RTD is in Manual mode (default setting) each entry must be selected manually to see the
entry details in the Top pane.
The Pause Feed button is used to pause incoming transaction and alarm entries

Top pane
Shows details of the selected
alarm/transaction.

Viewing entries
Arrows scroll through pages. The
dropdown menu defines how many
entries are shown per page.
Sorts entries by headings
List pane
Each alarm/transaction can be
selected showing details in the Top
pane
(If RTD is running in Manual mode as
set in the Setup tab, the last
transaction/alarm event is
automatically highlighted showing
information in the Top pane.)

Click to select a group

Deselects entry

Click to Oneshot a selected device

Click to use Extended Opening


on a selected device

Figure 90 RTD Simple List view

Depending on the transaction or alarm that occurs, the details relative to that event are shown
in the Top pane. See the table Information shown on Simple List view on page 79 for the
information shown in the Top pane.

Application

Field name

Personnel

Forename, Surname, Job Title, Company, Device Address, Device


Location, Access Level, Event Time, Expiry Date, Outcome, Hotstamp

Visitor

Forename, Surname, Job Title, Company, Device Address, Device


Location, Event Time, Outcome, Hotstamp

Vehicle

Car Registration, Make, Model, Company, Device Address, Device


Location, Access Level, Event Time, Expiry Date, Outcome, Hotstamp

Alarm

Alarm, Device Address, Device Location, Event Time


Table 1: Information shown on Simple List view

By default each page in Simple List view shows seven entries until the number of entries is
changed using the dropdown menu. A maximum of 200 entries can be listed on one page and
the arrows scroll through each of the pages.

79

CHAPTER 9 : RTD

Using Oneshot in Simple view


To Oneshot a device:
1. Select the entry in the List pane where the device is listed.
2. Click the Oneshot button.

Using Extended Opening in Simple View


Extended Opening is used to open a door for a longer period of time.
To use Extended Opening on a device:
1. Select the entry in the List pane where the device is listed.
2. Click the Extended Opening button.

Pausing Feed
It is possible to stop transactions and alarms events being listed by clicking the Pause Feed
button. (The button turns red when the incoming feed is paused.)
After five minutes of the system being paused, a nag screen opens informing the user.

9.5 Detail List tab


The Detail List view shows transactions and alarm entries alongside the details in one row.
The Pause Feed button is used to pause incoming transaction and alarm entries.

Selected entry is highlighted in


blue, allowing Oneshot or
Extended Opening to be used on
the device

Click to select a group


Deselects entry

Click to Oneshot a selected device

Click to use Extended Opening


on a selected device

Figure 91 RTD Detail List showing selected entry

Using Oneshot in Detail List view


To Oneshot a device:
1. Select the entry containing the device.
2. Click the Oneshot button.

80

A2SE68-UG-0119-1.2

AC2000 Web

Using Extended Opening in Detail List view


Extended Opening is used to open a door for a longer period of time than Oneshot.
To use Extended Opening on a device:
1. Select the entry containing the device.
2. Click the Extended Opening button.

Pausing Feed
You can stop transactions and alarms events being listed by clicking Pause Feed (the button
turns red when the incoming feed is paused). After five minutes of the system being paused, a
nag screen opens informing the user.

Application

Fieldname

Personnel

Forename, Surname, Company, Device Address, Device Location,


Access Level, Event Time, Job Title, Hotstamp, Expiry Date, Outcome

Visitor

Forename, Surname, Company, Device Address, Device Location,


Access Level, Event Time, Job Title, Hotstamp, Expiry Date, Outcome

Vehicle

Car Registration, Make, Company, Device Address, Device Location,


Access Level, Event Time, Model, Hotstamp, Expiry Date, Outcome

Alarm

Alarm,DeviceAddress,DeviceLocation,EventTime
Table 2: Information shown on Detail List view

9.5.1 Image tab


Using the Image tab provides another way to view transactions and alarms as they occur. The
difference between this view and the other views is that transactions are not listed.
RTD must be running in Auto mode for transactions and alarms to be automatically updated in
Image view. If RTD is running in Manual mode, the Image view will not update. However it is
possible to Oneshot a device and use Extended Opening.

81

CHAPTER 9 : RTD

The Pause Feed button is used to pause incoming transaction and alarm entries.

Click to select a
group
Deselects entry

Click to Oneshot a selected device


Click to use Extended Opening on a selected device

Figure 92 RTD Image view

Application

Fieldname

Personnel

Forename, Surname, Device Address, Device Location, Outcome,


Transaction Time

Visitor

Forename, Surname, Device Address, Device Location, Outcome,


Transaction Time

Vehicle

Car Registration, Make, Model, Device Address, Device Location,


Outcome, Transaction Time

Alarm

Alarm,DeviceAddress,DeviceLocation,Outcome,TransactionTime
Table 3: Information shown on Image view

82

A2SE68-UG-0119-1.2

Chapter 10
Zonal Control
Zonal Control can be used by a System Administrator to manage zones on a site to prevent
tail-gating and enforce anti-passback. Zonal Control is similar to the AC2000 Anti-Passback
Zones application but offers further flow control by ensuring a cardholder passes from one
zone to another before a device can be used.
In order to use the Zonal Control application you must enable the application by running
AC2000 Floatbar | Advanced Config. | AC2000 Configured and setting the zonal_control
value to Y.
Note: If Zonal Control is enabled the AC2000 Anti-Passback Zones application is disabled
and the application will not load though it will be visible on the AC2000 Floatbar.
To run Zonal Control open AC2000 WEB | Applications | Zonal Control
(Zonal Control will only be visible on the AC2000 WEB Menu if Zonal Control is enabled.)

10.1 Before you begin


It is advisable you draw a plan of the site or building showing the location of each device. This
will help you understand how Zonal Control works and which zones are to be assigned to
each device.

83

CHAPTER 10 : Zonal Control

Device address
Device location

Zone name

Figure 93 Example Floor Plan A

In the floor plan outlined in Figure 93, an In and Out device is shown at each door. Each device
is labelled with its address and location and each zone has a unique name.

10.2 Creating the Zones


When creating a zone give it a unique name, enable/disable it and set the timeout value.
1. Open the Zone Control application and click the CREATE ZONE button.
2. Enter a name in the Zone textbox.

Enter Zone name


Enable/disable Zone
Set timeout value

Figure 94 Add Zone Definition screen

3. (Optional) Click Zone Disabled if you want to create the zone but not have it activated.
This effectively turns on/off the Zone.
4. Enter a Timeout value in seconds, minutes, hours, days or set it to indefinite.
(The value entered in Timeout determines the length of time before the device can be used
again by the same cardholder. If Timeout is set to Indefinite there is no time limit set.)
5. Click Save.

84

A2SE68-UG-0119-1.2

AC2000 Web

10.3 Assigning Zones to devices


Once the Zones have been created, add an In Zone and Out Zone to each device. Refer to
your site plan to help you with this.
The In Zone is the zone the cardholder will be moving in to and the Out Zone is the zone the
cardholder is coming from.
In the example shown in Figure 95, the device FRONT ENTRANCE IN has ZONE FOYER
defined as the In Zone (the cardholder is going to) and Out Zone set to ZONE OUTSIDE (the
zone the cardholder is coming from).
Figure 95 Site plan and Device Configuration example

1. Click the Device Config. button.


2. Select a device by ticking the corresponding check box (on the same row).
i.

Using the Out Zone dropdown list, select the Out Zone that the cardholder is coming
from.

ii.

Using the In Zone dropdown list, select the In Zone that the cardholder is going to.

3. Click Apply. (The Zones are added to the devices row.)

85

CHAPTER 10 : Zonal Control

Filtering
If there are many devices on a system you can filter devices to display only the ones you want.
The Filter button displays all devices based on the alpha-numeric criteria entered in the Filter
text box. The data entered in the filter works across all fields, Device Address, Device
Location, In Zone, Out Zone.

Filter lists all devices


with word ROOM in
any of the records.

Figure 96 Filtering devices

10.4 Editing a zone


If a zone has previously been created it is possible to rename it, enable/disable it and change
the Timeout value.
1. Select a Zone from the dropdown list.
2. Click the EDIT button. (Make required changes.)
3. Click SAVE.

Enter Zone name


Enable/disable Zone
Set timeout value

Figure 97 Editing a Zone

10.5 Deleting a Zone


Disable a zone before deleting it (see Editing a Zone). To delete a zone:

Click DELETE to remove a Zone


Figure 98 Deleting a Zone

1. Select the Zone from the dropdown list.


2. Click the DELETE button.
3. Click OK to confirm the deletion.

86

A2SE68-UG-0119-1.2

Chapter 11
System
The System menu is used to configure AC2000 system settings, view log files and perform
administrative tasks.
To open the System menu, log in to AC2000 WEB and select System.

Network/Mail Config
Network/Mail Config configures the CDC and mail server settings.

Server Time Config


Server Time Config configures the Time and Date settings including Country
Time Zone preferences.

Software Update
Software Update patches the system with software updates.

System Shutdown
System Shutdown shuts down and restarts the system.

View Log Files


View Log Files displays system changes data in log files.

SMS Server Config


SMS Server Config configures the system to send text messages.

System Information
System Information displays system information in more detail.

87

CHAPTER 11 : System

11.1 Network/Mail Configuration


The Network option allows you to change the CDC's IP address.
1. Select System | Network/Mail Configuration.
2. Enter the Network settings.
IP Address
Netmask
Gateway

Figure 99 Network settings

Important
If the server IP address has been changed, the workstation's IP address will also need to be changed so that it
can connect to the server. This is done by updating the cdc host and lm host files. For instructions on how to do
this, please refer to the Modifying AC2000 IP Addresses document.

3. Select Set IP.


The Mail Configuration option allows you to configure the email settings, so that you can
send event notifications via email.
4. Enter the Mail Server settings.

Figure 100 Mail settings

5. Click Set SMTP.

88

A2SE68-UG-0119-1.2

AC2000 Web

11.2 Server Time Config


Server Time Config. is used to configure the Time and Date settings including Country Time
Zone preferences.
1. Select System | Server Time Configuration.

Figure 101 Server Time Configuration settings

2. Configure the settings, as per the table below.


Setting

Description

Local Time

Enter the local time setting for your country. The date
format is YYYY-MM-DD HH:MM:SS. Click Set Local Time
to save the detail entered.

UTC/GMT Time

Enter the Universal Time Coordinated time setting for


your country. The date format is YYYY-MM-DD
HH:MM:SS.
Click Set UTC/GMT Time to save the detail entered.

Time Zone

i. Select from the dropdown list the best match for your
country's time zone.
ii. Click Set Time Zone to save the selected Time Zone.
Note: If the time zone for your country does not exist in
the dropdown list, it is possible to add a POSIX
representation of it to the system.
iii. Click Advanced
iv. Enter the correct POSIX string of characters to set
your countries Time Zone in the POSIX Time Zone
textbox.
v. Click Set POSIX Time Zone to save the changes.

NTP Servers

Enter the NTP Server IP address(es). If entering a


backup server, separate the addresses with a space.

3. Click Set to confirm each change.

89

CHAPTER 11 : System

11.3 Software Update


The Software Update option allows you to patch the CDC when required.

Figure 102 CDC software update

1. Select System | Software Update.


2. Click Browse, and navigate to the location of the patch file.
3. Click Upload, to load the file unto the server. The installation of the patch will start
automatically.

11.4 System Shutdown


The System Shutdown option shuts down and restarts the system properly (minimizing the risk
of data corruption).
1. Select System | Shutdown.
2. Click Shutdown to turn the panel off. The message The system will now shutdown
displays.

3. Click Restart to shutdown and reboot the panel. The message The system will now
reboot displays.

90

A2SE68-UG-0119-1.2

AC2000 Web

11.5 View Log Files


As data is added, removed or edited in AC2000, the system records all the changes and detail
in log files.
1. To view the log files, select System | View Log Files.
Select to display log files from the
CDC, Serial Controller or RTC

Select to download all log


files for the selected
controller as a.zip
compressed file

Select an
individual log file to
open and display

Figure 103 The log files page

2. Select the controller from which the log files are to be viewed.
3. View the log files.
i.

Select an individual log file to open and view from the list or

ii.

Click Download Zip to download a.zip compressed archived of all log files on the
selected controller.

11.6 SMS Server Config.


SMS Server Config. is used to configure the system to send text messages.
Configure the settings to enable SMS capability.

Figure 104 SMS Server Config settings

91

CHAPTER 11 : System

11.7 System Information


System Information displays detailed information about the system and has the option to
print the data or export it to a .csv or .pdf file.
To open System Information select System | System Information
To change the name of the Site enter a valid description in Site Name and click SET.
Enter Site Name

Set Site Name

Figure 105 Setting a Site Name

The data has been divided into five information groups:

General

Cards

Controller

Devices

Licenses

System
Information
Groups

Print

Export to
.csv or .pdf
file

Figure 106 System Information

Click PRINT to print the information exactly how it appears on the screen.
Click EXPORT to export the information to a .csv or pdf. file.

92

A2SE68-UG-0119-1.2

Chapter 12
Tools
The Tools menu contain the options to restore archived transaction data and view log files
showing data relating to any system changes. Both tools are only available to system
administrators (level 4).
To open the Tools menu, log in to AC2000 WEB and select Tools.

Transaction Load
Loads data back into the database from flat files to assist with running reports.

Search Auditlogs
Audits recorded changes to the database

93

CHAPTER 12 : Tools

12.1 Transaction Load


The Transaction Load application allows you to load data back into the database from flat files
which have been archived after the retention period for the purpose of running reports.
1. Select Tools | Transaction Load.
Enter the start date and time of
when the transaction would have
occurred. Format:

Enter the end date and time of


when the transaction would
have occurred. Format:

YYYY-MM-DD HH:MM:SS

YYYY-MM-DD HH:MM:SS

Select All or a selection of devices


from the devices list which are to
be loaded back into the database.

If the user wishes to load


transactions by a specific
company number, enter this
number here.

If the user wishes to load


transactions by a specific
Personnel Serial Number, enter
this number here.

If the user wishes to load


transactions by a specific
hotstamp number, enter this
number here.

Figure 107 The transaction load page

2. Once the criteria has been selected / entered click Run.


This will load the data back into the database. A new page opens detailing the outcome of the
transaction load.

94

A2SE68-UG-0119-1.2

AC2000 Web

12.2 Search Auditlogs


The Search Auditlogs allows you to audit all changes to the database (provided your
authorisation level is 4 or above), since all changes are recorded.
1. Select Tools | Search Auditlogs.
Enter the start date and time of
when the transaction would have
occurred. Format:
YYYY-MM-DD HH:MM:SS
Enter the end date and time of
when the transaction would have
occurred. Format:

Select either Normal or Brief


from the dropdown list

YYYY-MM-DD HH:MM:SS

Normal will display a list of all


field names and values
Brief will display only the data
entered separated by a |

Select from the list, the table(s)


on which to search on

Enter the name of the field to


search by

Enter the search value of the field


to be searched by

Enter the name of the user to


search by

Figure 108 Searching auditlogs

2. Once the criteria has been selected / entered click Run.

12.2.1 Example 1
Search the Access Groups table in order to find the AC2000 user who added a reader into a
particular reader group.
Table 4: Example 2 settings

Setting

Description

Start and End times

Enter the Start Time and End Time around


the time the change was made.

Output Format

Normal

Table

Personnel

Field Name

access_group_devs, access_group

12.2.2 Example 2
Search the Devices table to identify which AC2000 user mass deleted devices from the
Devices application.
Table 5: Example 3 settings

Setting

Description

Start and End times

Enter the Start Time and End Time around


the time the change was made.

Output Format

Normal

Table

Devices

95

CHAPTER 12 : Tools

96

A2SE68-UG-0119-1.2

Chapter 13
emerald Configuration
The emerald Configuration menu contains applications that are used to perform administrative
tasks on emerald touch screen terminals. From here images are uploaded to display on the
terminals and Remote Apps are assigned to cardholder groups.
To open the emerald Configuration menu, log in to AC2000 WEB and select
emerald Configuration.

File Upload
File upload uploads adverts and checklists to display on an emerald device.

Information Page
Information Page uploads images which display when the Information Remote
App button is touched.

Remote Apps Allocation


Remote Apps Allocation is used to assign Remote Apps to cardholder groups.

Local Access
Local Access is used to assign temporary access to a cardholder.

97

CHAPTER 13 : emerald Configuration

13.1 File Upload


The File Upload page is used to upload adverts and checklists to emerald which display when
the device is in an idle state.
To open the File Upload application select emerald Configuration | File Upload.

Edit groups
Edit Files

Figure 109 File upload window

When uploading adverts to emerald devices for the first time, you will need to follow a process
of creating groups of devices, uploading advert files, then applying the adverts to the selected
group of devices.

13.1.1 Creating a group


An emerald can only display one advert, so each available device can only belong to one
group at a time.
To create a group:
1. From the Group dropdown on the File Upload page, click the corresponding Edit button.
2. Enter a name for the new group and click Add.
3. From the Group dropdown list, select the new group.
4. From the list of available devices, select the devices to be included in the group by clicking
the corresponding checkboxes.
.
Available groups

Available devices

Figure 110 Adding devices to a group

5. Click Save.
6. Click Return to return to the main File Upload page.
The first time the application is opened, a Default group is available which contains no devices.
You can delete this group or add devices to it (although it cannot be renamed).

98

A2SE68-UG-0119-1.2

AC2000 Web

Deleting a group
1. From the Group dropdown on the File Upload page, click the corresponding Edit button.
2. From the Group list, select the group to be removed.
3. Click Remove.

13.1.2 Uploading an Advert file


Adverts are image files which must be in JPG or PNG format. The recommended size is 272
pixels high by 370 pixels wide.
Once uploaded the available adverts display in the Files box where they can be selected to
apply to a group of devices.
1. From the File dropdown, click the corresponding Edit button.
2. Click Browse.
3. Select a file and click Open.

Selecting the
advert for upload

Previously
uploaded adverts

Figure 111 Uploading an advert

4. Click Upload.
5. Click Return to return to the main File Upload page.

Removing an advert from a device


From the Files box on the File Upload page, click the Remove button beside the advert
currently in use.

Advert
currently
in use

Remove advert
Figure 112 Removing an advert from a device

99

CHAPTER 13 : emerald Configuration

13.1.3 Uploading adverts to the devices


Once the advert files have been uploaded and are available, they can be applied to the device
groups.
1. From the main File Upload page, select the appropriate Group from the list.
2. From the File list, select the appropriate advert. You can preview the image by clicking the
View button.

View

Figure 113 Uploading an Advert to a group of devices

3. Click Send.

Applying a sequence of adverts


To apply a sequence of adverts to the emerald reader, upload the required adverts in the order
you want the sequence to be displayed.
Number of adverts
in the sequence
Advert
sequence

Figure 114 Applying a sequence of adverts

To delete an existing advert, click the Delete button beside the appropriate advert.

Delete
advert

Existing
adverts

Figure 115 Deleting an advert

100

A2SE68-UG-0119-1.2

AC2000 Web

13.1.4 Uploading a Checklist


Checklists are used to ensure a cardholder meets the correct criteria before entering a
controlled area. When the user swipes a card at an emerald terminal, they are presented with
a list of questions. The cardholder must acknowledge each question accordingly before
gaining access at the door.
1. From the main File Upload page select the file Type as CHECKLIST.

File Type
Group

Edit Groups

Add content to checklist


Figure 116 Creating a checklist

2. Select the appropriate Group from the list. For more information on Groups see section
13.1.1 Creating a Group.
3. Click ADD CONTENT.

Browse to
file
Upload
image to
create
checklist

Return to previous page

Upload
checklist

Figure 117 Adding content to a checklist

4. Click Browse.
5. Locate the required file and click Open. The image must be in JPEG or PNG format.
6. Click UPLOAD.

101

CHAPTER 13 : emerald Configuration

7. Type a content name. This is the name of the checklist e.g. Health and Safety.
8. Click OK.
9. Type an accompanying statement. This will be displayed next to the image in the
checklist and it must be no longer than 80 characters.
10. To add another image to the checklist repeat steps 3-8 above. A maximum of five images
can be added to a checklist.
11. Click SEND.
12. Click OK to acknowledge the warning message. The checklist will be available on the main
File Upload page.

Current
checklist
in use

View
Delete
Figure 118 Viewing the current checklist

To delete a checklist select the Delete button next to the required checklist.
To preview a checklist select the View button next to the required checklist.

102

A2SE68-UG-0119-1.2

AC2000 Web

13.2 Information Page


The Information Page is for System Administrators to upload an image to emerald. The
uploaded image displays when users touch the Information button on the reader.
To open the Information Page application select emerald Configuration | Information Page.
Upload files must be in JPG or PNG format. The recommended size is 394 pixels high by 272
pixels wide.
Select file
to upload

Click
to upload image

Display pane
shows uploaded
image

Figure 119 Upload Info Image page

13.2.1 Uploading an image to emerald


To upload an image to display when the Info button is touched:
1. Select emerald Configuration | Information Page.
2. Click Browse.
3. Select a file from the Choose file to Upload window and click Open.
4. Click Upload. (The uploaded image is shown in the Display Pane.)
5. Click OK.

13.2.2 Removing an image


To remove an image:
1. Select emerald Configuration | Information Page.
2. Click Remove.
Alternatively uploading a new image (as described above) replaces the existing image.

103

CHAPTER 13 : emerald Configuration

13.3 Remote Apps Allocation


Remote Apps Allocation is used to create groups of Remote Apps that can be made available
to emerald users via the AC2000 Personnel application.
To open the application select emerald Configuration | Remote Apps Allocation.

13.3.1 Remote Apps Allocation interface


Edit Group button

Remote Apps in the Group

Lists all
Groups

Remote
Apps not in
the Group

Deletes changes
Saves Remote Apps to Group
Figure 120 Remote Apps Allocation user interface

The application is made up of two panes. The left pane (blue area) displays available Remote
Apps and the right pane (grey area) shows the apps in a Group that will be shown on emerald.
The Group dropdown list allows you to switch between groups and shows the Remote Apps for
the selected Group in the grey pane.
Clicking an App moves it from the blue to grey area to add it to the selected Group. Clicking an
App in the grey area removes it from the Group. The Undo button reverts a group back to
when it was last saved.

104

A2SE68-UG-0119-1.2

AC2000 Web

13.3.2 Remote Apps


There is no restriction on the number or type of Remote Apps you can allocate to each group.
See below for a description of the available Apps.

Your Card Details

Your First & Last Swipes

Allows users to view their card details.

Shows the users first and last swipes for


each day for the last 30 days.

Info

PIN

Displays an image when the info button


is pressed.

Enables users to change their 4 digit PIN.

Recent Alarms

Devices with Most Alarms

Lists the most recent alarms within a 24


hour period on this emerald.

Lists all devices on a system where alarms


have been activated.

Recent Swipes

Timeline, Alarms & Swipes

Shows the 20 most recent swipes on this


emerald.

Shows a combination of the 20 most recent


alarms and swipes for this emerald.

Daily Swipes

Alarms 3 Months

Displays a bar chart showing the


frequency of swipes for last seven days.

Displays alarms for last three months.

Muster Zone

Occupancy

Shows In and Out swipes for a muster


zone the emerald is within.

Shows the occupancy of the area this


emerald is in.

All Visits

Your Settings

Lists current visits on the system


including escorts name.

Shows your upcoming and ongoing visits.

Open/Close

OneShot

Sends an open/close command to a


Broadcast Zone.

Sends an open command to a device.

Alarms On/Off

Secure Zones

Shows or hides alarms that have been


created in the Alarm Filter application.

Displays the In, Out and invalid swipes in


Occupancy Zones.

Online Status

Suppress Device Alarms

Shows the online/offline status of RTCs


and devices.

Stops all alarms generated by the terminal


from being displayed, logged, and reported.

Device Settings
Enables configuration of the reader showing
the common configuration settings.

105

CHAPTER 13 : emerald Configuration

13.3.3 Groups
Groups are typically a type of cardholder e.g. security staff.
The Cardholder, Engineer and Security system groups are already in the application and are
pre-populated with Remote Apps. You can edit these groups to adjust the Remote Apps
allocated to them or delete them altogether.

Adding a Group
Add a new group if you need more than the three system groups or if they are not relevant to
your site. To add a group, create a new group and then allocate the Remote Apps.
1. From the Remote Apps Allocation window, click Edit.
2. In the text box enter a Group Name (e.g. Support, Managers, Security).
3. If appropriate tick the Default Group check box to make the group the default setting in
the Personnel Application.
4. Click Add.
Select to set the group as the default in Personnel

Name the new group

Figure 121 Adding a Group

5. Click Return.

Deleting a Group
To delete a group from the system:
1. In the Remote Apps Allocation window, click Edit.
2. From the list of available groups click the corresponding Delete icon.

13.3.4 Adding Remote Apps to Groups


To add Remote Apps to a group, ensure the group name is selected in the Group list. Once
allocated, the Remote Apps Group is visible in the AC2000 Personnel application.
1. Drag and drop (or click) a Remote App icon from the blue area to the grey area.
2. To remove a Remote App, click it in the grey pane.
3. When the required Remote App icons are in the Group, click Save.

Editing a Remote Apps Group


To edit the Remote Apps in a group:
1. In the Remote Apps Allocation window select the Group from the dropdown menu.
2. Drag and drop or click the Remote App icon to add or remove it from the group (grey area).

106

A2SE68-UG-0119-1.2

AC2000 Web

13.4 Local Access


Local Access is a web application that grants specified personnel the authority to assign extra
access to other cardholders using an emerald terminal.

Important
The extra access being assigned must be available within the cardholders current card format. For further
information on card formats see Access Permissions in the AC2000 Setup Guide.

To open Local Access select emerald Configuration | Local Access

13.4.1 Allocating assignable Access Levels to personnel


The Local Access page is used to search for an authorised cardholder that can issue extra
access to another cardholder.

Searching for an authorised cardholder


Select cardholder

Search
criteria
Search
Figure 122 Searching for an authorised cardholder

1. Select the field to Search on from the drop down list.


2. Enter a valid description to Search for.
3. Click SEARCH.
Searching for an authorised cardholder using the Surname field may return multiple results.
4. Select the required authorised cardholder from the drop down list.
5. Click Select Cardholder.
If only one authorised cardholder is returned, that cardholder is automatically selected.

Personnel
details

Access Level
Timezone

Assigned
Access
Levels

Deselect

Save
Delete
Figure 123 Adding an Access Level

107

CHAPTER 13 : emerald Configuration

6. Select an Access Level from the drop down list. An Access Level can only be assigned
to an authorised cardholder once. After it has been assigned it will be removed from the
drop down list.
7. Select a Timezone from the drop down list.
8. Click SAVE.

13.4.2 Deleting an Access Level


To delete an Access Level after it has been assigned:
1. Select the Access Level row from the ACCESS LEVELS ASSIGNED list.
2. Click DELETE.
A warning message appears confirming you want to delete the Access Level.
3. Click YES.
4. A confirmation message appears to confirm the Access Level is deleted.

Figure 124 Deleting an Access Level confirmation

5. Click OK.

108

A2SE68-UG-0119-1.2

Chapter 14
Reader Setup
The Reader Setup menu in AC2000 Web contains a group of utilities that can be used to view
device (reader) information and perform some administrative tasks.
To open the Reader Setup menu, log in to AC2000 WEB and select Reader Setup.

Device Status
Device Status shows detailed system information for the selected device.

Check DB Updates
Check DB Updates shows what processes are running on the database and
the progress of any updates to the CDC or RTCs.

Device Defrost
Device Defrost upgrades a devices firmware by uploading an image file.

Init. Reader Controller


Init. Reader Controller initialises a reader controller (RTC). This should only
be performed as advised by CEM Systems Support.

109

CHAPTER 14 : Reader Setup

14.1 Device Status


Every device that is added to the system has a status file, which is updated regularly.
To view a devices status file:
1. Navigate to Reader Setup | Device Status.
2. Select the device for which the status is to be requested from the list in the Devices box.
3. Click Request.
4. Check the chosen device is selected in the Device dropdown.
5. Click Show.

Device list

Request
status
info
Show
status
info

Device
selection

Device status information


Figure 125 Device status page

110

A2SE68-UG-0119-1.2

AC2000 Web

14.2 Check DB Updates


The Check DB Updates utility displays a report of the most current updates to the database.
The report shows updates to the CDC or RTC and the progress of the change as a percentage
e.g. if the database is completely up to date following the addition of a device to an RTC. This
can provide a useful check to see if the CDC and RTCs are running correctly and the system is
being updated properly.
If the percentage column is showing as less than 100% following an update it is recommended
to contact CEM Systems Support.
To check the database updates, navigate to Reader Setup | Check DB Updates.
CDC or RTC being
updated

The task being performed


Progress of the update

Figure 126 Check database updates report

111

CHAPTER 14 : Reader Setup

14.3 Device Defrost


Device Defrost upgrades reader firmware. Defrosting means importing a device image file to
the reader's firmware, which then auto starts the upgrade process.
When a reader is being defrosted, it downloads an image from the panel. When the reader
receives this image it will reprogram. After the device has been reprogrammed it will auto
reboot. During the reboot the device will not be controlling access to the secured area for at
least 10 minutes.
1. Select Reader Setup | Device Defrost.
2. Click Browse and select the device image file that is to be loaded.
3. Click Upload.
4. Click OK.
.
Navigate to a device image file

Click to upload the file


Figure 127 Uploading a device image file
Delete file option

File selection

Device
type
selection

Device
preview
pane

Click Defrost to initiate device


defrost

Figure 128 Selecting devices to defrost

5. Select the firmware file to upload. If the file has been uploaded in error or is incorrect, click
Delete to remove it and start again.
6. Select the device type to be defrosted. This should match the firmware file type.
7. Select the devices to be defrosted (hold Ctrl to select multiple devices if required). Ensure
that the selected devices are of the correct type.
8. Click Defrost to complete the process. A message appears similar to the following:
Initiating defrost to device:XXXX with firmware file:<filename>

112

A2SE68-UG-0119-1.2

AC2000 Web

14.4 Initialise Reader Controller (RTC)


Initialising the Reader Controller will result in all of its processes being stopped, its database
being dropped and a new synchronisation of data in the panel's main database being copied
down to it.
This option should only be completed after consulting with CEM Systems Support.
To initialise the reader controller, select Reader Setup| Init. Reader Controller and click
Initialise.

Figure 129 The initialise controller button

113

CHAPTER 14 : Reader Setup

114

A2SE68-UG-0119-1.2

Chapter 15
AC2000 Setup
The AC2000 Setup menu contains options that are used to configure a new AC2000 system.
Use this menu after installation to enable licenses and configure application and RTC settings.
To open the AC2000 Setup menu log into AC2000 WEB and select AC2000 Setup.

Licensing
Licensing manages AC2000 licences by enabling available licenses.

Card Parking Config


Card Parking Config de-activates unused cards by disabling their access to
readers.

Data Housekeeping
Data Housekeeping archives historical data.

Ext. Sys. Interface Config


The External System Interface Configuration connects an external system to
AC2000.

Personnel Clear Down


Personnel Clear Down sets how long expired personnel records (and images)
are to be stored in the Personnel application.

Reader Controller Config


Reader Controller Configuration enables Serial DCMs (connected via an ECM
device) access communication on the system.

115

CHAPTER 15 : AC2000 Setup

Web Login Config


Web Login Config changes the number of attempts a user has before being
locked out of AC2000 WEB (and AC2000 Floatbar).

LDAP Config
LDAP Config. imports records from the Windows Active Directory Server to
the CDC.

Dashboard Widget Allocation


Dashboard Widget Allocation is used to create and manage groups of
Dashboard widgets that are assigned to AC2000 Web users.

116

A2SE68-UG-0119-1.2

AC2000 Web

15.1 Licensing
AC2000 System is licensed for workstations, devices and software. Licenses are viewed and
added in the Licensing option.

Figure 130 Licence list

15.1.1 Adding a Licence


1. Select AC2000 Setup | Licensing.

2. Enter the licence code


3. Click Add
When the licence has been successfully added, the message Licence code applied displays. If
there is an issue with the licence code entered, an error message displays.

15.1.2 Requesting a Licence


If you require a licence, contact CEM. Please provide the following details:

System ID (found at the top right of the Licensing main screen)

License type (workstation/device/software)

Number of licences (if applicable)

117

CHAPTER 15 : AC2000 Setup

15.2 Card Parking Configuration


Card Parking allows you to disable access to readers when a card has not been swiped on the
system for a defined period of time. Parked cards are moved into the PARKED access level
which has limited or no access.
By default, Card Parking is switched off.

Figure 131 Card Parking default view

15.2.1 Turn Card Parking On/Off


1. Click System Config | Card Parking Config.
2. Click TURN ON
3. To turn card parking off, click TURN OFF

15.2.2 Configuring Card Parking settings


When parking is turned on, there are three settings which can be updated.

118

Setting

Description

Unused Period

This is the number of days the card must be inactive on the system
before it will be parked.

Minimum Age

Minimum age on a card is set to 10 days. Unused period is set to 20


days. The cardholder has 10 days to swipe the card before it will
become parked. If the cardholder does not swipe the card again
within the 20 day Unused period, the card will become parked.

Parking Limit

If the number of cards to be parked exceeds this value any card


after the value set will not be parked; this is a safety feature to
prevent mass card parking.

A2SE68-UG-0119-1.2

AC2000 Web

15.3 Data Housekeeping


Each time detail is added to the system, or an alarm or event occurs, data is inserted into a
database. As time goes on, the database will eventually grow causing the space available for
storing data to decrease. Data housekeeping provides a mechanism for unloading data after a
certain length of days into flat files (these are data files which take less space than holding the
data in a database).
Note
Transactions can be reloaded into the controller for running reports.

15.3.1 Configuring the Data Housekeeping settings


1. Select AC2000 Setup | Data Housekeeping

Figure 132 Data housekeeping settings

2. To change a setting, enter the amount of days in the textbox and click Update.
Alarm History

How long historical alarm information is kept for.


The default is 30 days.

Transaction History

How long historical transaction history is kept for.


The default is 30 days.

119

CHAPTER 15 : AC2000 Setup

15.4 External Systems Interface Configuration


The External System Interface Configuration function allows you to connect an external
system to AC2000. When configuring the interface, you'll need to ensure that the correct
communication settings are applied in relation to either serial or Ethernet port setup.

15.4.1 Serial
To configure a serial port for the external system select the Serial option at the top of the page.
This will display a number of fields associated to the serial port.
1. Select AC2000 Setup | Ext. Sys. Interface Config.
2. Select the Serial radio button.

Figure 133 Serial settings

120

Setting

Description

Append Time

Appends the time on the end of the string in DDMMYYHHMMSS


format. To enable this, select the checkbox.

Enable Variables

Enables the Variables as defined in the External Systems


application. To enable variables, check the box.

Pad Length

Pads the end of the string with spaces if necessary, if fixed strings
are being used.

RTC/CTS

If the serial connection is using this, check the box.

Start String

This is a combination of alphanumeric and symbol characters


used identify to the external system the start of a sent message.
(Optional)

Termination String

This is a combination of alphanumeric and symbol characters


used identify to the external system the end of a sent message.
Default string is Control Line Feed.

Port

Enter the System Controller's port path on which the external


system is connected to. Default ttyS0 - 1st Serial Port. When
connecting a Serial External System to the system, be sure to
use Port 1 on the System Controller.

A2SE68-UG-0119-1.2

AC2000 Web

Bit Rate

Select the correct Bit Rate.

Data Bits

Select the number of data bits sent by the device being


connected.

Stop Bits

Select the number of stop bits sent by the device being


connected.

Parity

Select the parity that is to be used by the device being connected.

Age

Enter the Age in seconds. This value indicates to the system


which alarms to ignore after the alarm has reached a certain age.
If the value is set to 0, Aging is turned off.

15.4.2 Ethernet
1. Select AC2000 Setup | Ext. Sys. Interface Config.
2. Select the Ethernet radio button.

Figure 134 Ethernet settings

Setting

Description

Start String

This is a combination of alphanumeric and symbol


characters used to identify to the external system the start
of a sent message. (Optional)

Termination String

This is a combination of alphanumeric and symbol


characters used to identify to the external system the end
of a sent message.

External Host IP Address

Enter the IP address of the External System.

TCP Port Number

Enter the TCP Port to be used for communications.

Age

Enter the Age in seconds. This value indicates to the


system which alarms to ignore after the an alarm has
reached a certain age. If the value is set to 0, Aging is
turned off.

121

CHAPTER 15 : AC2000 Setup

15.4.3 Applying Updates


When the configuration settings for either an Ethernet or Serial port have been set it is
necessary to Update the system.
To apply an update, click Update.
The Update may take a long time, please wait displays. The update is complete once the
external System Interface is running message displays.

15.4.4 Viewing the code


Click Code to view the code for the External system interface settings.

Figure 135 External system interface settings code

15.4.5 Resetting to the default settings


If there is a problem with the configured port, it may be helpful to reconfigure the port back to
the initial settings.
Click Default settings.

122

A2SE68-UG-0119-1.2

AC2000 Web

15.5 Personnel Clear Down


Personnel Clear Down sets how long you want expired personnel records (and images) to be
stored in the Personnel application.

Figure 136 Personnel Clear Down settings

15.5.1 Unload Directory


The Unload Directory is a system folder where expired Personnel records and images can be
kept until they are permanently deleted. This folder is called se_clean and you can set how
long you want the records to be kept for in the folder (after they expire) before they are
permanently deleted.
1. To route expired records and images to the Unload Directory, keep the check box
selected.
2. To delete expired records and images straight away, deselect the Unload Directory
checkbox.

123

CHAPTER 15 : AC2000 Setup

15.6 Reader Controller Config


Reader Controller Config enables the addition of ECM modules and serial readers to
Ethernet Reader Controllers. Control of specific device addresses can be allocated to
individual ECMs and up to 16 ECMs can be added per device group.

Important
Access to the Reader Controller Config web application should be limited to users with administrator privileges.

1. Select AC2000 Setup | Reader Controller.


2. Select the controller to be configured.

Controller selection
Figure 137 Selecting the reader controller

15.6.1 Controller information


By default each Device Group is configured for ethernet devices only.
Last controller modification

Update
changes

Controller
device
groups

Add New ECM

Readers
Figure 138 Controller information

124

A2SE68-UG-0119-1.2

AC2000 Web

15.6.2 Adding serial readers to the controller


Only 16 reader addresses can be used per Device Group. Therefore a Device Group may
contain one ECM with 16 readers attached, 16 ECMs with one reader attached to each, or any
combination in between the two extremes.
1. Select the Device Group that the readers are to be added to and click Add New ECM.
Serial port
number
Add
ECM
Delete
ECM

ECM IP address

Ethernet
readers

Selected serial
readers

Figure 139 Adding serial readers to the controller

2. Enter the IP address of the ECM.


3. Enter the serial port number of the ECM, the default value is 10001.
4. Select which readers to attach to the ECM by clicking the blank device numbers. Selected
readers will turn blue and the corresponding ethernet reader number will be blanked.
Hovering the mouse cursor over a reader number provides information about any associated
device including the full reader address, reader type, configuration mode and physical location.
Reader information

Figure 140 The reader information call out

Note
A record should be kept of which reader addresses are serial and which are ethernet. The
AC2000 Devices application does not specifically display which readers have been allocated
as serial and ethernet.
5. Click Update.
If the update is successful, the application posts a notification acknowledging the changes.

Figure 141 Server response dialogue

6. Click OK.

125

CHAPTER 15 : AC2000 Setup

15.6.3 Editing ECM configuration


1. Select the controller to be configured.
2. Make the edits as required.
3. Click Update.
If the update is successful the application posts a notification acknowledging the changes.
4. Click OK.

126

A2SE68-UG-0119-1.2

AC2000 Web

15.7 Web Login Config.


Web Login Config changes the number of attempts a user has before being locked out of
AC2000 WEB (and AC2000 Floatbar). It is also used to insert an authorisation message, tick
box or both at the login screen.
Note: In the event of a user account becoming locked due to an exceeded number of log in
attempts, a System Administrator unlocks it using the User Options application in AC2000.
.
Select number of login
attempts user has and click
update
Click Browse to select
Text file (UTF format)
Add and remove text file
Authorisation message
Feedback area showing
current authorisation
message

Adds tick box to login screen

Figure 142 Login Auth Message settings

Note: The authorisation text file must be in .TXT format with UTF encoding. The Filename
cannot contain any special characters (including spaces).

15.7.1 Setting Web Login attempts


To change the number of Log in attempts a user has before being locked out of AC2000 WEB:
1. Select the number of log in attempts from the Account Login Attempts dropdown menu.
2. Click the Update button.

15.7.2 Adding an Authorisation message to the Log in screen


1. Click Browse and select the text file containing the authorisation message.
2. Click the Upload button.

15.7.3 Adding an Authorisation tick box to the login screen


Adding the authorisation tick box to the log in screen prompts users to confirm they are
authorised to view and use the web pages. Click the Tick only button to add the checkbox.

127

CHAPTER 15 : AC2000 Setup

15.8 LDAP Config.


LDAP Config. imports records from the Windows Active Directory Server to the CDC.
To open the LDAP select AC2000 WEB | System | LDAP
Figure 143 Web pages application

The Environment Settings screen is used to define the connection settings between the
Active Directory Server and the CDC. It is also used to select which AD fields will be used for
the import. (Records can be filtered and Unique Identifiers defined.) Using the Entry Change
Field Selection a field is defined that is used to identify any changes or entries to the CDC.
The Database Data screen is used to map the fields between the AD Server and the CDC.
The Database Field shows the AD Server fields as previously specified in the Environment
Settings screen. It is possible to both append and prefix characters to data when imported to
the CDC using the Leading Chars and Trailing Chars. In order to merge and join data the Front
Delimiter, (X) Instances, Rear Delimiter and (+/-) properties are used. It is possible to preview
the results (show examples of the mappings) once all settings have been defined.
The Schedule screen is used to specify when and how often data is imported between the AD
server and the CDC.
Note: There are some limitations when importing records from the Active Directory Server to
the CDC.

15.8.1 Environment Settings


Connection settings between the CDC and AD Server are specified using the Environment
Settings screen.

Connection settings between the Active Directory Server to the CDC

Specifies
record
location
based on
RFC2254
standards.

Select the
field to be
used as
the
Unique
Identifier

Lists and enables the selection of fields on the Active


Directory server

Field used to identify additions and changes to


records on the AD

Figure 144 Environment Settings screen

128

A2SE68-UG-0119-1.2

AC2000 Web

Environment Settings
Enter the AD Server name, the fully qualified Domain name and the LDAP search base. Tick,
Is a Group: if the search base is a group name. (Otherwise a distinct location is assumed.)
Once settings have been entered, click Check to verify the settings are correct.
Record Filter
Enter the Record Filter string (must adhere to RFC2254 standards). Click the target
insert default values:

to

Current Fields
All Fields listed are based on the values entered in the Record Filter and Search Base panes.
The maximum number of AD records listed is specified by the value entered in the Current
Fields text box.
Click
to list the fields in the AD server and check the field names to be made available for
the data import.
Unique Record Selection
The field name chosen in the Unique Record Selection dropdown menu is used to uniquely
identify each record.
Note: The field name chosen has to be selected in the Current Fields pane. For Active
Directory Server this is typically objectguid.
Entry Change Field Selection
Select the field used to identify any additions or changes to records on the AD server.
Note: The field name chosen must be selected in the Current Fields pane. For Active Directory
Server this is typically the file named usnchanged.
When all settings have been entered click Save Settings and then Next.

15.8.2 Recommendations
The field objectguid should be used to uniquely identify records as AD uses this field itself as
the unique id.
The field unchanged should be used as the means to identify records that have been changed
as this field is updated by AD following changes:
During import, user records can be retrieved from any AD Common Name (CN) or
Organisational Unit (OU).
It will be undesirable to import from some locations such as the standard Users CN (e.g.
CN=Users,DC=windomain,DC=net) as certain accounts such as 'Administrator', 'Guest',
etc, will be imported along with standard users.
It is recommended that a group be created, e.g. 'CardHolders', and that user records that are
to be imported are added to that group (this can be done as a multiple selection when editing
the properties of the group)
If a user is imported as a member of a group and the user is subsequently removed from the
group, their imported record will not be removed. However no updates to the imported record
will be performed.

15.8.3 Important Notes


If an imported user is deleted from AD and subsequently re-added e.g. to fix a problem with
their account, the AD record will be issued a new objectguid value. If a subsequent import is
performed, the users CDC record will then be expired and a new record created for them.

129

CHAPTER 15 : AC2000 Setup

15.8.4 Database Data


The Database Data section is used to map the data from the AD server to the CDC.
The fields selected in section 3.1 Environment Settings (Current Fields pane) are the field
names that are used in the LDAP Field.

Preview
data field
mappings
Figure 145 Database Data screen

Database Field
The Database Field column lists the fields in the CDCs personnel records.
Leading Chars
Up to four characters can be added at the beginning of the imported data.
LDAP Field
The LDAP Field dropdown menu lists the fields previously selected in the Current Fields pane
in the previous step. See Environment Settings on page 128.
Front Delimiter
The Front Delimiter can be 0 to 10 characters long. It can be used to split up the LDAP field. If
used the Front Delimiter cell is shaded blue.
(x) Instances
The (x) instances field counts the specified number of Front Delimiter instances.
Rear Delimiter
The Rear Delimiter Field can be 0 to 10 characters long. It can be used to split up the LDAP
field. If used the Rear Delimiter cell is shaded blue.
Trailing Chars
Trailing Characters can be appended to the end of data in a specific field.
(+/-)
The (+/-) buttons are used to combine the data from several (up to three) AD fields into one
CDC field. Up to three fields can be used.
Previewing Database Field Mappings
The Examples button shows an example of how the data will be imported based on the
selections and definitions made.

Figure 146 Preview database field mappings

130

A2SE68-UG-0119-1.2

AC2000 Web

15.8.5 Database Mapping Examples


The import expects date values (i.e. the 'dateofbirth' field) to be imported in the format
YYYY-MM-DD (Year, Month, Day). If the field is to be used then a mapping should be used to
change the import value date to the correct format.

Example 1: Splitting one AD field into three CDC fields


The separate Active Directory value(s) can be broken up using de-limiters and the combined
database result can be separated possibly e.g. by a comma in the trailing field
For example:
Database Fields 'address1','address2' and 'address3' can be populated from a single AD field
'postaladdress' whose format is 'house-number street, town, county', by using commas as the
front and rear delimiters.

Figure 147 Splitting AD fields

address1 is 'postaladdress' up to the 1st comma;


- use no front delimiters and a comma as rear delimiter to take text from the beginning of the
field up to the 1st comma.
address2 is 'postaladdress' from the 1st comma onwards and up to the 2nd comma;
- use 1 front delimiter (comma) with a comma as rear delimiter to take text from the first
comma onwards, up to the next comma.
address3 is 'postaladdress' from the second comma up to the end;
- use 2 front delimiters (comma) and 0 rear delimiters to skip data before the 2nd comma and
take the rest of the field.

131

CHAPTER 15 : AC2000 Setup

Example 2: Combining two Active Directory fields to one CDC field


Using the (+/-) buttons it is possible to add up to three fields from the Active Directory server
(LDAP Fields) to be used in one CDC field (Database Field).
In the example shown in the givenname and sn fields from the Active Directory (LDAP Field)
are combined to populate the badge_name field in the CDC. A space is inserted between the
first name and surname using the Trailing Chars field on the first name row.

CDC field

Two fields from the Active


Directory Server

A space is entered to separate the


data in givenname and sn

Adds AD fields to
the CDC field

Preview button

Preview shows result based on values set in Field mappings


Figure 148 Combining AD fields

132

A2SE68-UG-0119-1.2

AC2000 Web

Example 3: Reformatting dates when importing data from the AD to the CDC
If a persons date of birth is stored in the info field on the AD Server and you want to import the
data but change the format from DD/MM/YYYY to YYYY-MM-DD, follow the steps as outlined
below.

1. To extract the YYYY field and change the order, enter / as the Front Delimiter and change
the (x) Instances to 2. (This extracts everything after the second forward slash).
2. Enter in the Trailing Chars text box. (This adds the dash between the YYYY and the
MM.)
Click the Preview button to see how the date is reformatted.

Figure 149 Preview showing re-formatted YYYY field (graphic edited for demonstration purposes)

3. Click the + button in the (+/-) column on the dateofbirth row. (This adds a new section
under the dateofbirth field.)
4. Select info as the LDAP Field using the new dropdown list.
5. To extract the MM field, enter / as the Front Delimiter and select 1 under the (x) Instances.
6. Enter / for the Rear Delimiter (This extracts everything after the first forward slash and
before the second forward slash.)
7. Enter in the Trailing Chars text box. (This adds the dash between the MM and the DD).
Click the Preview button to see how the date is reformatted.

Figure 150 Preview showing YYYY and DD fields (graphic edited for demonstration purposes)

8. Click the + button in the (+/-) column on the dateofbirth row. (This adds a new section
under the dateofbirth field.)
9. Select info as the LDAP Field using the new dropdown list.
10. Enter / in the Rear Delimiter text box. (This extracts everything up to the first forward
slash.)
Click the Preview button to see how the date is reformatted.

Figure 151 Preview showing YYYY,DD and MM fields (graphic edited for demonstration purposes)

133

CHAPTER 15 : AC2000 Setup

15.8.6 Scheduling data import


The Schedule section is used to set when and how often the data is imported between the
Active Directory Server and the CDC. The Schedule section is divided into two panes.
Import
actions

Import
schedule

Saves configuration settings

Shows configuration settings

Figure 152 Scheduling screen

Actions
The Actions pane can be used to set permissible actions for the data being imported from the
AD server to the CDC.
Additions
Ticking the Additions check box allows new users to be added to the CDC.
Updates
Ticking the Updates check box determines whether an existing record can be updated.
For example, if the checkbox is ticked and a person changes address, their details will be
updated on the CDC.
Deletions
Checking the deletions button means that if records are deleted on the AD server, the
equivalent records will be marked as expired on the Personnel application.
Starting From
Each time a record is added, updated or deleted from the AD server the record is give a new
Unique Sequence Number (USN). The Starting From value refers to the USN from which the
import begins.
Trace level
The Trace Level dropdown list (0 - 5) determines the amount of information (Trace) displayed
or logged during the import procedure. If an import is scheduled the trace information is
appended to the log file on the cdc. Clicking Run Now, imports the data and displays the trace
information screen.

Add/Update Schedule
The Add/Update Schedule pane is used to specify the frequency the records from the AD
server populates the same records on the CDC.

Save Settings
Click Save Settings to save the settings as defined in the Scheduling pane.

Show Settings
Click Show Settings to view all current settings for the data import and scheduling.

Importing data
Click Run Now to run the data import.

134

A2SE68-UG-0119-1.2

AC2000 Web

15.9 Dashboard Widget Allocation


This application is used to limit which Dashboard widgets AC2000 administrative users can
use. Dashboard widgets are assigned to groups and administrative users are assigned
access to a group using the AC2000 User Options application.

Important
Any user requiring access to the Dashboard Widget Allocation application must have the Web AC2000 Setup
option assigned to them in the AC2000 User Options application.

15.9.1 Assigning Web AC2000 Setup in User Options


1. Open Administration | User Options in the AC2000 Floatbar.
2. Select the administrative user to be assigned the application.
3. Select the Applications tab.
4. From the Not Selected pane place a tick in the checkbox next to Web AC2000 Setup.
5. Click Save.

15.9.2 Dashboard Widget Allocation overview


Open AC2000 Setup | Dashboard Widget Allocation

Widget
groups
Allocated
widgets

Delete
selected
group

Edit selected group

Create
new
group

Figure 153 The Dashboard Widget Allocation application

The ALLOCATED pane displays the widgets assigned to the currently selected group. This
group is indicated by a grey selection box.
The current Default Group assigned to users is indicated by a green circle.
Selected group

Current default
group

Figure 154 Group selection indicator

135

CHAPTER 15 : AC2000 Setup

15.9.3 Creating a new widget group


1. Click CREATE.
Group Name

Default
Group
checkbox
Widget
allocation

Figure 155

2. Enter a unique Group Name.


3. To make the group the Default Group, place a tick in the checkbox. The Default Group is
assigned to all administrative users created in the User Options that have been granted
access to the Web Dashboard.
4. Select which widgets to include in the group by placing a tick in the checkbox next them.
5. Click Save.
6. Click OK.

15.9.4 Editing widget groups


1. Select the widget group to be edited.
2. Click EDIT.
3. Make the required amendments and click Save.
4. Click OK.

Deleting widget groups


1. Select the widget to be deleted.
2. Click DELETE.
3. Click OK.
Note
Before deleting a widget group, it must first be removed from all user profiles in the AC2000
User Options application.

136

A2SE68-UG-0119-1.2

Chapter 16
Backup/Restore
The Backup/Restore menu holds the AC2000 systems emergency backup response to a
system failure. From here backups are created, uploaded and restored.
To open the Backup/Restore menu, log in to AC2000 WEB and select Backup/Restore.

Restore
Restore initiates a system restore using an uploaded backup file.

Upload Backup
Upload Backup uploads the system backup file to a workstation.

Backup
Backup creates a system backup file.

137

CHAPTER 16 : Backup/Restore

16.1 Backing Up AC2000


AC2000 data can be backed up using one of several available methods. The backup method
selected dictates whether a full server backup or a data only backup is completed.
Full server backup
All data and the server operating system is backed up. Tape/DVD and Drive options only.
Data only backup
All data is backed up but not the operating system. Download File and FTP options only.

16.1.1 The importance of backing up


Important
Failure to regularly back up the system could result in the total loss of all data on an AC2000 system, including all
card records, reader configurations, transactions and personnel records. If a back up has not been configured
these cannot be recovered and the system will have to be rebuilt.

There are many factors that can cause a system failure that results in a loss of data including:

Server component failure

Unforeseen risks such as fire, flood, theft, malicious damage

Human error

16.1.2 Configuring backup


1. Using an internet browser, log into AC2000 Web.
2. Select Backup/Restore | Backup.

Figure 156 Backup configuration options

3. Select the appropriate backup option by clicking the radio button beside it.

Backup Option
Download File
FTP

AC2000 Lite

AC2000 SE/AE

Software Only Lite

Tape/DVD
Drive/USB

Table 6: List of compatible backup options for specific AC2000 systems

Note
AC2000 automatically runs a backup process as 00:01 every day. This file is then transferred
to the selected backup media.

138

A2SE68-UG-0119-1.2

AC2000 Web

Download file
The Download File option creates a backup of only the system data. This backup file is NOT
automatically transferred and must be manually downloaded to a secure location daily.
1. Click the Download File button.
2. Check that the Last Backup was complete successfully..

Figure 157 Last backup date

3. Click Download.

Figure 158 The download backup button

4. Click Save.
5. Browse to the location of the network device to save the backup file to.
6. Click Save.

FTP
The FTP option creates a backup of only system data.
The data is saved to a directory on an FTP server automatically at 00:01 every day.
1. Click the FTP button.

Figure 159 FTP settings

2. Complete the IP Address, Username, Password and Directory fields of the FTP server
that the backup file is saved to.
3. Click Save Settings.
Note
It is recommended that the FTP server is checked to ensure that the file has transferred.

Tape/DVD (SE and AE systems only)


The Tape/DVD option creates a complete backup of both the data and the server operating
system. It is recommended to backup to Tape rather than DVD. The backup will automatically
save to the media at 00:01 every day.
1. Click the Tape/DVD button.
2. Click Save Settings.
Note
It is recommended that the tape/DVD is replaced daily and stored in a secure location offsite in
line with organisational IT backup policies.

139

CHAPTER 16 : Backup/Restore

Drive (USB HD, USB memory stick, Removable HD)


The Drive option creates a backup of the database and system files.
The data is saved to a directory on an external drive. The backup will automatically save to the
media at 00:01 every day.
1. Attach the removable storage device to the server.
2. Click Initialise Media/Drive for Backup.

Figure 160 Initialising the media or drive for the Backup

This prepares the drive for the file by installing the media on the CDC and performing any
necessary formatting.
3. Click Save Settings.

Important
A failed backup will trigger an alarm in the AED application.

16.1.3 Creating a manual Backup


A backup is automatically set up to run each night. However, you can create a manual backup
using Run Backup.
1. Click Run Backup.
2. There will be no change on the page to let you know when the backup is created. Refresh
the web page and check the time of the Last Backup.

Figure 161 Successful Backup message

3. Select View Backup History. Check the last record with the expected start and finish
times, green display and that the outcome is successful.

16.1.4 Backup recommendations

140

It is important to implement a structured backup strategy in your organisation. Failure to


properly backup the system could result in a total and permanent loss of data.

Backups should be performed daily so that, in the event of a system failure, no more than
24 hours worth of data will be lost.

Backups should be stored in a separate secure location away from the AC2000 server to
protect them from the same risks.

If using the Download backup option, maintain a schedule to track that the downloads are
completed regularly.

If you require assistance to configure and maintain backups, contact CEM support.

A2SE68-UG-0119-1.2

AC2000 Web

16.2 Restore
Restore checks the backup file, and, if the backup file is OK, performs a system restore.
Note
When completing a restore on a new system the Operating System must be installed first.

Figure 162 Checking the backup file

1. To check the backup file, select Backup/Restore | Check.

Figure 163 Restoring a backed up server

2. If the backup file is OK, read the warning and click Restore.

Important
Any information added to the server since the backup was saved will be lost after the restore.

16.3 Upload Backup


Although backup files can be saved in a number of different locations, they can only be
restored from a local machine so need to be uploaded to your workstation first.

Figure 164 The upload backup page

Note
Ensure the appropriate backup option has been selected in Backup before uploading a
backup file.
1. Select Backup/Restore | Upload Backup.
2. Using the Browse button, locate the backup file you want to restore.
3. Click Open then Upload.

141

CHAPTER 16 : Backup/Restore

142

A2SE68-UG-0119-1.2

Chapter 17
Visitor
The AC2000 WEB Visitor menu is used to manage visits to a site from people who do not have
a company staff card. The Visitor applications are used to request upcoming and manage
ongoing visits.
To open the Visitor menu, log in to AC2000 WEB and select Visitor. Three options are
available within the Visitor menu:

Visitor Request
Visitor Request enables authorised personnel to create and schedule visits.

Visitor Batch Request


Visitor Batch Request adds multiple visitors in batches by importing their
details from a single file.

Visitor Management
Visitor Management handles visiting tasks on the day of the visit, including
card management, email notifications, and reports.

143

CHAPTER 17 : Visitor

The Visitor applications are used to assign and manage visitors to a site. The Visitor Request and
Visitor Batch Request applications add visitors details to the system. Visitor Management is used to
authorise, edit and reject visits.
The Visitor applications schedule and manage a visit as shown below.

Figure 165 Visitor applications

144

A2SE68-UG-0119-1.2

AC2000 Web

17.1 Visitor Request


The Visitor Request application enables authorised personnel to request visits. A Visitor
Request contains the visitor's details, who they are visiting (their Escort) and details of the visit.
To run the Visitor Request application select Visitor | Visitor Request. This displays the
Visitor Request interface.

Visitor
image

Visitor
details

Configured
fields

Document Live
upload
image
button
button

Upload
image
button

Add
Visitor
button

Figure 166 Visitor Request interface

17.1.1 Adding a new visitor


The Visitor Details interface captures personal information about the visitor. Surname,
Forename and Company are mandatory (additional mandatory fields can be created as
necessary using the Configure option on the Visitor Management page).
1. Enter the visitor's Surname. (Required)
Note
When a user begins to type details into the interface fields, a Search button appears under the
text fields, as this interface also functions as a search tool. This can be ignored if it is a new
visitor being added to the system.
2. Enter the visitor's Forename. (Required)
3. Enter the visitor's Company. (Required)
4. Enter the visitor's Telephone number
5. Enter the visitor's Email address.
6. Enter details in any Configured fields that have optionally been enabled by the AC2000
system administrator.
7. Click Add Visitor to proceed if not uploading an image at this stage.
Note
If adding an image at this stage, only click Add Visitor after Adding an Image, as described in
the next section.

145

CHAPTER 17 : Visitor

17.1.2 Adding an Image


Images attached to a visitors record can be used when creating the Visitor Pass. There
are three ways to attach images:
Documents (e.g. a passport scan in JPEG or JPG format which will not be shown on
the pass.
Live Images (screen grabs from a web cam)
Images (JPEG or JPG format)

Adding scanned image types (Documents)


1. Click the Documents button.
2. Browse to the file, select it and click Open.
3. Press Upload button.

Adding a Live Image


1. Click the Live Image button.
2. Click Capture to save the image to the system.

Uploading an image (requires Java)


1. Click the Upload Image button.
2. Locate the image file and double-click..

Selection pane

Editing pane

Paintbrush button for editing image

Figure 167 Selecting an image

3. The image is placed inside the editing pane. If the image needs editing, click the
Paintbrush button at the bottom right of the image frame.
4. Click Add

. The image uploads and the view returns to the Add Visitor window.

5. Click Add Visitor to complete adding the visitor details.

146

A2SE68-UG-0119-1.2

AC2000 Web

Cropping an image
a. Make the selection to exclude and click Crop.
Undo Crop
Filters
Close

Redo

Resize

Save

Figure 168 Cropping an image

b. Click Save.

Resizing an image
a. Click the image once to enable the toolbar and click Resize.
b. Select the new size from the dropdown menu.
c.

Click OK.

d. Click Save.

17.1.3 Searching for an existing visitor


Visitors whose details are already on the system (from a previous visit) can be searched for by
either partially filling or filling the fields.
1. Enter details in the search criteria.

Search
criteria
Search
button

Figure 169 Searching for a visitor

2. Click the Search button.

147

CHAPTER 17 : Visitor

3. The first record matching the search criteria is displayed. The total number of records
matching the search criteria is also displayed with arrow buttons to browse between them.
The record being displayed and the total
number of results returned by the search

Search
arrows
Figure 170 Number of records returned and search arrows

4. If no results are returned, click Clear to blank all search criteria fields
Note

The Search button changes to Clear after a search is performed.


OR
5. Click Select Visitor to proceed.
Note

The Add Visitor button changes to Select Visitor when search results are displayed.

17.1.4 Adding an Escort


All visitors must be accompanied by an employee from the host company. The employee is
called an escort and each visitor's escort is selected from the Personnel application. The
Visitor Request cannot proceed until an escort has been selected.
Note

Visitor Escorts must hold a validated card and visitor permissions in Personnel before they
are available as a visitor Escort.

Searching for an Escort


Escorts can be searched by Surname, Forename, Hotstamp number, and Company.
1. Enter the search criteria and click Search.
Company selection

Search
criteria

Search
button

Select the
Escort

Next button

148

A2SE68-UG-0119-1.2

AC2000 Web

2. Select the required Escort from the list by double-clicking on their name.
3. Click Next to proceed.

17.1.5 Adding Visit details


The details of the visit must be added in the Add Visit tab in the Visitor Request interface.
This is where the access, date and duration information is captured along with the purpose of
the visit.
1. Enter the Purpose of visit (mandatory).
2. Enter the Access Required (mandatory).

Purpose of
Visit text field

Access
Required
text field
Visit duration

Finish button
Date and time of
proposed visit
Figure 171 Add Visit details

Note
Purpose of Visit and Access Required are free text fields that should specify the purpose of
the visit and state which areas of the building need to be accessed during the visit respectively.

3. Select an Expected date from the calendar.


4. Select a time from the At time dropdown selection.
5. Enter the Duration of the visit (optional).
6. Click Finish to display confirmation message and Reference Number. This confirms that
the application will be forwarded to the appropriate person.
7. Click New Request to add another visit or navigate back to Visitor menu.
Any Visitor Request may be viewed and either approved or rejected in the Visitor
Management application.

17.2 Visitor Batch Request


Visitor Batch Request adds multiple visitors by importing a Comma-Separated Values (CSV)
file to the AC2000 database.
When using a CSV file ensure the Surname, Forename, Company, Purpose, Access Level and
Expected date fields are listed. These fields are mandatory when the data is imported to the
AC2000 database. Optional fields that exist are: Telephone, Email, Duration, Notes, Spare
Field 1 and Spare Field 2 (Spare fields are user defined).

149

CHAPTER 17 : Visitor

Surname
Jones
Smith
James
Damien

Forename
John
Peter
Campbell
Lindsay

Table 7: Example CSV file format


Company
Purpose
Access level
CIRCO
Training
Training Room 1
CIRCO
Consultant
Demo Room B
DP Ltd
Sales Demo
Demo Room A
CC Drinks
Vendor
Canteen

Expected date
19/06/2013
20/04/2013
22/07/2013
19/03/2013

There are four steps involved in adding multiple visitors information to the system.

17.2.1 Step 1. Uploading a CSV file


The first step is to select and upload the CSV file. The filename cannot contain any special
characters, including spaces.
1. Click Browse and navigate to the CSV file.
2. Click Upload.

Browse and
select CSV file
Upload CSV file
Figure 172 Upload CSV file

Selecting the delimiter and header rows


Once the file has been uploaded select the delimiter character that separates the fields.
Choose between Tab, Semi Colon, Comma, Space or another character and define whether
the table has a header row.
The Preview pane updates and displays the data based on the chosen delimiter and header
selection. Click Next button to move on to the next step (Adding an Escort).
Delimiter selection

Check if CSV
file has header
CSV Preview
pane

Next button
Figure 173 Selecting delimiters/header row

150

A2SE68-UG-0119-1.2

AC2000 Web

17.2.2 Step 2 Adding an Escort


Adding an Escort for a Visitor Batch Request is exactly the same as adding an Escort for a
single Visitor request, as previously described in Adding an Escort on page 148.

17.2.3 Step 3 Field Mapping


To ensure the correct information is imported from the file to the AC2000 database you must
match and map the fields between them.
Mandatory Fields
The following fields are mandatory and must be mapped; Surname, Forenames, Company,
Purpose, Access, and Expected. (If the mandatory fields are not mapped, they will be
highlighted in yellow and the user will be unable to move to the next step.) Match each of the
fields in the CEM Column with the fields from the CSV file in Import Column.

Use the preview pane as an aid when mapping the fields.


Must have
matching fields

Figure 174 Field Mappings

Date format: The date format in the CEM column should match the format in the CSV file.

Day Month Year

Month Day Year

Year Month Day

DD/MM/YYYY

MM/DD/YYYY

YYYY/MM/DD

DD/MM/YY

MM/DD/YY

YY/MM/DD

DD-MM-YYYY

MM-DD-YYYY

YYYY-MM-DD

DD-MM-YY

MM-DD-YY

YY-MM-DD

DD.MM.YYYY

MM.DD.YYYY

YYYY.MM.DD

DD.MM.YY

MM.DD.YY

YY.MM.DD

Chinese and Japanese dates are accepted in YYYY MM DD .


Table 8: Field Mapping; Date Format

Click Next to import the CSV file and create the records on the CDC.

151

CHAPTER 17 : Visitor

17.2.4 Step 4 Confirm


When the import is complete you have an option to Accept or Reject the import.

Import
result
status

Visitor
Management

Reject
import

Accept
import

Figure 175 Confirming a batch import

If there are any errors, a message displays showing the error details. You can Reject the
import at this stage and amend the file or Accept and re-enter the records manually using the
Visitor Request application. If you dont Accept or Reject the import, a message will display in
Visitor Management until the import is completed.
After Accepting an import, click Visitor Management to check the imported data.

152

A2SE68-UG-0119-1.2

AC2000 Web

17.3 Visitor Management


The Visitor Management application is where authorised personnel can edit a visit, reject a
visit, assign a card, run a report, perform searches and configure fields. Visits display as
Expected until a card is Assigned.
To run the Visitor Management application select Visitor | Visitor Management.
The default view displays any pending requests that need to be approved. If an incomplete
Visitor Batch Request import is pending, a warning displays with the option to return to
Visitor Batch Request to complete the import.
Note: If customised fields have been created using the AC2000 User Fields application they
will appear on both the Web Visitor request and Web Visitor Management pages.

17.3.1 Pending visits tab


Pending Visits are Visitor Requests that still need approval by an authorised staff member.
Pending Visitor tabs

Expanded view

Surname
search
function
Pending
Visitor
options
Pending
Visitor
requests

Referred
Visitors
checkbox
Configuration
button

New Request
Figure 176 Pending visit requests interface

The user can select from the list of Pending Visitor Requests in the main pane of the
interface. If multiple Pending Visitor Requests exist, the user can use the Surname search
feature or the more advanced Search tab to search for the required request.
New requests can be made via the Pending visits interface by clicking New Request.
Additional interface configurations can be accessed by clicking Configuration.

Expanded View
Each Pending visit can be viewed in more detail by clicking the Expand view button on the
selected visit request.
Collapse/expand view

Click to add notes

Figure 177 Viewing a visit in detail

153

CHAPTER 17 : Visitor

The Expanded view displays the Purpose of Visit and Access Required as entered at the
Visitor Request stage, as well as the option to add a Note to a request.
Note

If a Note is added to a request, a Notes tab is created within the Expanded view. This tab will
not be displayed if a note has not been created.

Adding a Note
1. Expand the required visitor entry.
2. Select Note button.
3. Enter the Note text.

Figure 178 Adding a Note

4. Click OK.

Editing a Note
1. Expand the visitor entry.
2. Select Notes tab.
3. Edit the text as appropriate.
4. Click OK.

Removing a Note
1. Expand the visitor entry.
2. Select Note.
3. Click Remove.

Referring Visitors
Referring a visitor is a way of flagging them for a particular reason, such as if they cause
suspicion or have failed to complete any necessary paperwork. A Referral does not physically
restrict a visitor's access or track their transactions during their visit.
1. Select the Referred check box.
2. Enter a reason for the Referral in the box.

Figure 179 Referral reason

3. Click OK.

154

A2SE68-UG-0119-1.2

AC2000 Web

Editing a Referral
A question mark button is displayed beside the Referred checkbox, which shows the reason
for the referral when clicked. A referral can be viewed and/or edited by selecting the edit button
and changing the reason.
1. Select the Referral button.
2. Edit the text as appropriate.
3. Click OK.
If a visitor is Referred, their image is framed by a red box and the Referred checkbox is ticked.

Referred
image
framed in
red

Referred Visitors
checkbox
Figure 180 Referred visitor

Configuring Spare Fields


The Configure button enables a user to optionally configure any Spare fields in the
application interface. Spare fields can be used as extra options or fields that are not included
in the default settings.
Once a Spare field is configured and enabled, it will be visible in the Visitor Details and
Expected and Assigned Visits pages.
1. Select Configure.
2. Select the appropriate Spare field from the dropdown menu.

Figure 181 Configuring a spare field

3. Select the Enabled check box if the field is to be available in the Visitor Request and
Visitor Management applications.
4. Enter the Field Type descriptions e.g. String.
5. Enter the Maximum number of characters allowed in the field (string and number fields
only).

155

CHAPTER 17 : Visitor

6. Enter the Minimum number of characters allowed in the field, if applicable.


Note: It is only possible to enter a Minimum value if the Field Type is a number.
7. Click Save to apply the settings, or Exit to abort.
All subsequent New Requests can make use of the new field. Existing requests will need to
be edited using Edit Request to make use of the new field. In the following example given, a
request has been submitted with an additional configured field Car Parking Space Number, to
enable the user making the request able to specify a particular parking space for the visitor.

Example of spare field


configured

Approving a Visitor Request


1. Click Approve in Pending Visitor Options. A dialog window will be displayed to confirm
that the Visit Request is now approved and asks whether to Assign a card now?
2. Click No to approve the visitor and move their details to the Expected tab.
3. Click Yes to approve the visitor and display the Assign Card options, which are discussed
later in this section.

Rejecting a Visitor Request


Visitor Requests may be rejected e.g. if the Escort is unavailable or if a meeting has been
cancelled. Rejected requests are listed as Reports which may be viewed, saved and printed.
If a Visitor Request is Rejected, the Visitor Details are stored for 30 days. This means that if
the visitor decides to re-schedule at a later date, their details may be searched for rather than
entering them in again.
1. Select Reject.
2. Enter a reason for the rejection.
3. Select OK to continue or Cancel to return to the Expected Visits page.
4. Select Send Email to send the visitor an email notification of the Rejection if required (an
email can only be sent if an email address was entered in the Visitor Details).
5. Select Yes or No.
6. Edit the email if required.
7. Click Send.

Editing Request
The Edit option opens the Visitor Details which can then be edited. The visit details are edited
by navigating through the visitor, escort and visit details screens.
1. Select Edit Request.
2. Edit the request as appropriate.

156

A2SE68-UG-0119-1.2

AC2000 Web

3. Select Update Visitor to save the changes made.


4. Click Finish to confirm changes to the visit details.

Adding Documents
1. Click the Documents button.
2. Browse to the file, select it and click Open.
3. Press Upload button.

Emailing the Visitor Escort


If an email address has been entered for the visitor escort, the Email Escort button is enabled.
When selected, this creates an email notification addressed to the escort in the user's default
mail client.
1. Select Email Escort.
2. Edit the default text/subject if necessary.
3. Click Send.

17.3.2 Expected visits tab


Expected Visits are Approved Visitor Requests that have not had a card assigned yet.
Visitor
management tabs

Surname
search function

View by
date

Expected
Visitor
Options

Expected
visitor
details

New Visitor
Request

Expand view

Configuration
button

Figure 182 Expected Visits interface

Option

Action

Date

Select Today, Tomorrow or manually enter a date using the calendar. All
visits can be viewed by clearing the Date box.
If the date is changed, the listed Expected Visits will change to display the
visits for that day.

Surname

Enter the visitor's last name into the Surname field to search for a
particular visitor.

New Request

Select New Request to create a new Visitor Request (launches the Visitor
Request window).

Help

Select Help from toolbar to access the application's help file.

Configure

Select Configure to edit and apply configuration settings. For detailed


instructions on how to do this, please refer to the Configure section.
Table 9: Expected visits interface key

157

CHAPTER 17 : Visitor

The Expected Visits details pane displays a list of Approved Visitors. Visitors expected
Today is the default display, but the user can also view Expected visits for tomorrow by
clicking Tomorrow. Other search features previously described in Pending Visitors are also
available.
Note
Expand view, Referred Visitor, Notes, Documents, Email Escort, Edit Request, Surname
search, Search, Configure and New Request features all function in the same manner as
previously discussed in the section Pending Visitors.

After finding and reviewing the visit details using one of the search options, the user can select
from a number of Expected Visitor Options. These include Assigning a Card, Delete and
many of the same functions already discussed in the Pending Visitors section.

Assigning a Card
Each visitor is permitted to have one validated card assigned to their record at one time.
Assigning a card will change the status of the Visitor Request from Expected to Assigned.
Note

Before visitor cards can be issued, an appropriate Card Format must first be created in the
AC2000 Card Types application.
1. Select Assign Card.
2. Select a Card Format.
3. The remaining card details fields are populated with default values according to the
selected Card Format. Edit these fields as required.

Figure 183 Card details

4. If the visitors card is a swipe card, enter an appropriate value in the Hotstamp field.
5. Select Assign to assign the visitor card (or Cancel to return to the Expected visits page).
6. If the card is non-readable, select Add Image to add the visitor's image, if required.
7. If the card is non-readable, select Print if the card is printable (or Don't Print if it is not).

Deleting a Visit
The user may delete a visit from the Expected list by clicking Delete in the Expected Visitor
Options. This will display a dialog requesting confirmation of the deletion. Click Yes to delete
visit or click No to cancel the deletion.

158

A2SE68-UG-0119-1.2

AC2000 Web

17.3.3 Assigned visits tab


Assigned Visits are requests that have been approved and a card assigned to them. When
selected, the Assigned tab displays the assigned visits as a list.

Assigned
Visitor
Options

Expand view
Figure 184 Assigned Visits list

Note
Documents, Surname search, Search, Configure and New Request and Referred
features all function in the same manner as previously discussed in Pending Visitors section.

Expanded View
Each Assigned Visit can be viewed in more detail by clicking anywhere in the empty space at
the bottom of the visitor box. This opens an expanded view of card details belonging to the
selected visitor.
A visitor may be Traced or Referred in this view by selecting the appropriate checkbox (and
entering a reason for the trace or referral). For more information about adding traces and
referrals, please refer to the Traces and Referrals sections.
Note

The card details displayed are not editable, except for the Traced and Referred features. The
remainder of card details may only be edited using the Edit Card option.

Expanded
view

Figure 185 Expanded view of an Assigned Visit

Current Status
The status of the card displays in the Current Status field. This value updates automatically
according to the dates defined in the Valid From and Valid To fields. In the example above,
the card status is Current because the visit is Current.

159

CHAPTER 17 : Visitor

When a card is Expired, the entry background displays as grey, the Valid To label displays as
red, and an asterisk appears next to the Referred checkbox indicating that the card is overdue
for being returned.

Figure 186 Expired card

Adding a Trace
A Trace tracks the usage of a card, as a list of transactions at each entrance and exit device
the visitor passes through. Each time the card is swiped by the visitor a popup window with the
visitor's details are displayed in AC2000 Alarm and Event Display (AED) application.
Note

Traces may only be applied to visitors issued with readable cards.


If a visitor is Traced, their image will be framed in red and the Traced check box

View Trans.

Traced
checkbox
Figure 187 Viewing a Traced visitor

Clicking the question mark next to the Traced checkbox shows the reason for the trace.
1. Expand the visitor entry.
2. Select the Traced check box.
3. Enter a reason for the Trace in the box.

Editing a Trace
1. Expand the visitor entry.
2. Select the Trace button.
3. Edit the text as appropriate.
4. Click OK.

Removing a Trace
1. Expand the visitor entry.
2. De-select the Traced check box.

160

A2SE68-UG-0119-1.2

AC2000 Web

Viewing Traced transactions


If a visitor is Traced, their transactions (card swipes) can be viewed as a report using the
ViewTrans option.
1. Expand the visitor entry which is Traced.
2. Select View Trans.
3. A Transaction Report displays. Select Save or Print as required.

Figure 188 Viewing a Transaction report

Returning a Card
At the end of the visit, the visitor returns their card. The action of returning a card will remove
all access from the card, resulting in no access to any controlled area if swiped.
Returning the card makes the card available for reuse by another visitor, provided that the
card's format is configured to be reusable.
Select Return Card.
Note

No confirmation dialog is displayed, so it is important that Return Card is not clicked unless
the card has been returned.
The visit is removed from the Assigned list. A list of all returned visitor cards can be saved or
printed as a report. For more information about this and instructions on how to generate the
report, refer to the Reports section.

Not Returned
If a card is not returned by the visitor at the end of the visit, the Not Returned option should be
selected. This flags that the visitor still potentially holds the card so necessary security
measures can be taken.
1. Select Not Returned.
2. Select OK.
The visit is removed from the Assigned list. A list of all returned visitor cards can be saved or
printed as a report. For more information about this and instructions on how to generate the
report, refer to the Reports section.

Emailing the Visitor


If an email address has been entered for the visitor, the Email Visitor button is enabled. This
option creates an email notification addressed to the visitor. Click Email Visitor to send the
visitor an email.

161

CHAPTER 17 : Visitor

Editing the card details


The assigned card details can be edited with the Edit Card option.
1. Select Edit Card.

Figure 189 Editing card details

2. Edit the details as required. Note that some fields are not editable.
Note

If the Valid To date is changed, the Card Status will automatically update to reflect the
change e.g. Current (from Expired) if a later date is entered.
3. Select Update.

Marking cards as Lost or Stolen


A card can be marked as Lost or Stolen in the Edit Cards window.
1. Select Edit Card.
2. Select the Lost/Stolen check box.

Figure 190 Flagging a card as Lost or Stolen

3. Click Update.
A list of all cards marked as Lost/Stolen can be saved or printed as a report. For more
information about this, and instructions on how to generate the report, please refer to the
Reports section.

162

A2SE68-UG-0119-1.2

AC2000 Web

17.3.4 Search tab


The Search tab is where a visit or visitors may be searched for. The fields in the Search
interface contain the search criteria.

Search
criteria
fields

Search
results
pane

Figure 191 Search interface

1. Select the Search tab.


2. Enter the search criteria into the appropriate fields.
3. The search function will return results in the Search results pane as values are typed.

17.3.5 Reports
The Reports tab is where visitor reports are generated. Once generated the reports can be
saved (as CSV or PDF files) or printed for future reference.
Report
results pane

Report Type
dropdown list

Figure 192 Reports interface

163

CHAPTER 17 : Visitor

The types of reports available are listed in the Report Type dropdown list. A description of
each report type is given in the following table.

Report Types

Description

Not Returned

Lists all the cards marked as Not Returned. The card may be marked as
returned on this page by selecting the Mark Returned icon.

Lost/Stolen Cards

Lists all the cards flagged as lost or stolen.

Referred

Lists all the visitors flagged as Referred. The visitor's name and reason for
referral is shown. The referral may be removed by selecting the Remove
Referral icon.

Traced

Lists all Traced visitors. The visitors name and reason for tracing is shown.
The trace may be removed by selecting the Remove Trace icon.

Due Visits

Lists all Expected visits (that do not have a card assigned to them yet).
Requests with no assigned card over 30 days old are automatically deleted.

Current Visits

Lists all visits presently taking place.

Past Visits

Lists all visits that have taken place in the past (excluding current visits).

Rejected

Lists all visits that have not been approved.

Transactions

Lists all transactions made by readable visitor cards (not applicable to nonreadable cards).
Table 10: Report types description

When a Report type is selected from the dropdown list, results will auto populate in the
Report results pane (if there are any). The following report types contain the option to specify
criteria to return a filtered report:

Past Visits - A user can further filter search results by date

Transactions - A user can filter search results by visitor

To generate a report containing additional filter criteria:


1. Select the Reports tab.
2. Select the appropriate report type tab.
3. Enter the appropriate filter criteria. The example below shows date criteria.

Figure 193 Past visits report filtering

4. Click Search.

Saving the report


Reports may be saved as a CSV or a PDF file.
1. Select Export.
2. Choose the Export Format required (CSV or PDF).
3. Configure CSV or PDF Options (depending on Export Format selected).

4. Open the exported file or Save it to an appropriate location.

164

A2SE68-UG-0119-1.2

AC2000 Web

Printing the report


1. Select Print.
2. Select a printer.
3. Change the printer settings if necessary.
4. Click Print.

165

CHAPTER 17 : Visitor

166

A2SE68-UG-0119-1.2

AC2000 Web

Appendix A: Removing Internet Explorer


security certificate warning
When the Web Pages application is opened in Internet Explorer a security certificate warning
is displayed, as below.

1. Click Continue to this website (not recommended)

A.1 To remove the security certificate warning


1. Select Tools | Internet Options.
2. Select Security |Trusted sites | Sites.
3. Confirm the URL matches, and click Add then Close.
4. Close the Internet Options dialog box with either OK or Cancel.
5. Refresh the current page.
6. When told There is a problem with this website's security certificate, choose
Continue to this website (not recommended).
7. Click on Certificate Error at the right of the address bar and select View certificates.
8. Click on Install Certificate..., then in the wizard, click Next.
9. On the next page select Place all certificates in the following store.
10. Click Browse, select Trusted Root Certification Authorities, and click OK.
11. Back in the wizard, click Next, the Finish.
12. If you get a Security Warning message box, click Yes.
13. Dismiss the message box with OK.
14. Select Tools | Internet Options.
15. Select Security | Trusted sites | Sites.
16. Select the URL you just added, click Remove, then Close.
17. Restart Internet Explorer.
18. The site's certificate should now be trusted and the certificate error will now be shown.

167

Custom WEB Report fields

Appendix B: Custom WEB Report fields


This appendix contains a list of the AC2000 database tables and the purpose of each field.
Refer to this appendix to help compile a custom report in the AC2000 WEB reports application.

B.2 access_devices
Assigns access levels to devices.

Field

Description

device_addr

The device address

access_level_num

The access level the device is assigned (ID Number)


Lookup: access_levels.access_level_desc
Table 11: access_devices

B.3 access_levels
Stores details on each access level

Field

Description

access_level_num

The access level number

access_level_desc

Text description of the access level

part_num

The partition this access level is visible in. (ID Number)


Lookup: partition.part_desc
Table 12: access_levels

B.4 alarmlog
Each alarm occurrence will get recorded in this log table.

Field

Description

alarmlog.ack_action

Acknowledge action performed (ID Number)


Lookup: allowedactions.action_text

alarmlog.ack_can_state

Alarm status:
0: Has been acknowledged and reset /
cancelled
1: Needs acknowledged
2: Needs reset
3: Needs acknowledged and reset
Table 13: alarmlog

168

A2SE68-UG-0119-1.2

AC2000 Web

Field

Description

alarmlog.ack_id

Can be either:
User ID of person who acknowledged alarm
PMODE: Ack mode = Previous
1.Was auto acknowledged due to another
alarm of this type on this device
IMODE: Ack mode = Immediate
This alarm was auto acknowledged as
another alarm of this type appeared later
AUTO: Another alarm auto acknowledged
this alarm

alarmlog.ack_time

Time the alarm was acknowledged.

alarmlog.alarm_num

The unique ID of this alarm occurrence

alarmlog.alarm_time

Time the alarm occurred.

alarmlog.alarm_type

Type of alarm that occurred (ID Number)


Lookup: alarms.alarm_name

alarmlog.can_action

Cancel action performed (ID Number)


Lookup: allowedactions.action_text

alarmlog.can_id

Can be either:
User ID of person who acknowledged alarm
PMODE: Ack mode = Previous
2.Was auto acknowledged due to another
alarm of this type on this device
IMODE: Ack mode = Immediate
This alarm was auto acknowledged as
another alarm of this type appeared later
AUTO: Another alarm auto cancelled this
alarm

alarmlog.can_time

Time the alarm was cancelled.

alarmlog.device_addr

Device address of the reader the alarm


occurred on.

alarmlog.input_num

The input number on the device which


triggered the alarm

alarmlog.input_state

The input state that triggered the alarm:


C = Close State
O = Open State
T = Tamper State
Table 13: alarmlog

B.5 alarms
Stores details on each alarm type.

Field

Description

alarms.ack_mode

Acknowledge mode:
M = Manual
P = Previous
I = Immediate

alarms.ack_notes_reqd

Require notes to be entered for this alarm in


the AED
Y/N
Table 14: alarms

169

Custom WEB Report fields

Field

Description

alarms.alarm_name

The name of this alarm (e.g. Duress)

alarms.alarm_priority

Alarm priority. Range of 0 (lowest priority) to


1000 (highest priority - show first).

alarms.alarm_type

Type of alarm that occurred.

alarms.auto_ack

Which alarm, if any, to auto acknowledge

alarms.auto_cancel

Which alarm, if any, to auto cancel

alarms.background_icon

Unused

alarms.beep_time

Unused

alarms.can_mode

Cancel mode:
M = Manual
P = Previous
I = Immediate

alarms.foreground_icon

Unused

alarms.source_type

CDC
DEV = Device
EXT = External (e.g. lock)
NCN
RTC

alarms.view_details

Internal use only


If set to Y, AED shows 'view details' option
on the alarm. E.g. Duress view details will
show personnel details of the person who
raised the alarm
Table 14: alarms

B.6 bc_hist
Stores broadcast history

Field

Description

bc_hist_ser

Unique ID

bc_zone_num

Broadcast Zone (ID Number)


Lookup: bc_zones.bc_zone_desc

bc_time

The time of the broadcast

username

Who performed the broadcast

bc_reason

The reason that was given

bc_type

Broadcast Type:
O = Open output 3
C = Close output 3
o (lowercase) = Open output 4
c (lowercase) = Close output 4
Table 15: bc_hist

170

A2SE68-UG-0119-1.2

AC2000 Web

B.7 card_formats
Stores information on each card format

Field

Description

card_form_num

The card format number (ID Number)

card_form_desc

The card format name

card_type_num

The card type (ID Number)


Lookup: card_types.card_type_desc

card_form_file

The pass file to use

reusable

Whether this is a reusable card format or not


- Y/N

def_val_period

Default number of valid days

max_val_period

Maximum number of valid days

def_acc_lev

Default access level (ID Number)


Lookup: access_levels.access_level_desc

def_gtz_num

Default timezone (ID Number)


Lookup: gtz_num.gtz_desc

ae_period

Number of about to expire days before


expiry

pu_after_period

Number of days after expiry when purged

del_period

Unused

unused_ex_period

Unused

app_num

The application this card format is assigned


to (ID Number)
Lookup: apps.app_name

app_default

Is this the default card format for the


assigned application? - Y/N
Table 16: card_formats

B.8 company
Stores information of each company

Field

Description

company.comp_account_num

Account number of the company (finance)

company.comp_add1

First line of the company address.

company.comp_add2

Second line of the company address.

company.comp_add3

Third line of the company address.

company.comp_add4

Fourth line of the company address.

company.comp_char1

User Field (Spare Text1)

company.comp_char2

User Field (Spare Text2)

company.comp_created

Date of when the company was created

company.comp_date1

User Field (Spare Date1)

company.comp_date2

User Field (Spare Date2)

company.comp_default

Is the default company - Y/N


Table 17: company

171

Custom WEB Report fields

Field

Description

company.comp_expiry_date

Airport Only
Expiry date of the company

company.comp_fax_num

Fax number of the company.

company.comp_id

Company abbreviation (3 to 8 characters)

company.comp_logo_date

Date of when the logo was added / modified

company.comp_name

Company name

company.comp_next_id_num

Airport Only / Internal use only


Stores the next employee ID number

company.comp_num

The unique ID number of the company

company.comp_num1

User Field (Spare Num1)

company.comp_num2

User Field (Spare Num2)

company.comp_payment_type

Airport Only

company.comp_postcode

Post code of the company (part of the


address).

company.comp_status

Company status:
A = Active
T = Terminated

company.comp_tel_ext

Extension number of the company


telephone number.

company.comp_tel_num

Company telephone number.

company.comp_term_date

Date on which the company was terminated

company.comp_type_num

Airport Only
Company Type (ID)
Lookup: comp_types.comp_type_desc

company.contact_email

Contact email address of the company.

company.contact_fname

First name of the contact for the company.

company.contact_surname

Surname of the contact for the company.

company.contact_tel_num

Telephone number of the contact for the


company.

company.cp_account_num

Airport Only
The Car Park account number (finance)

company.cp_finance_code

Airport Only
The Car Park finance code (1 to 9)

company.cp_payment_type

Airport Only
Car Park Payment Type
I = Invoice
C = Cash
F = Free of Charge

company.def_valid_period

Airport Only
The default valid period in months

company.finance_code

Airport Only
The company finance code (1 to 9)

company.licence_cat_num

Airport Only

company.part_num

Partitioned systems only


Partition (ID)
Lookup partition.part_desc
Table 17: company

172

A2SE68-UG-0119-1.2

AC2000 Web

Field

Description

company.prev_comp_name

Airport Only
The previous company name before the
name was changed

company.refs

Airport Only
References submitted - Y/N

company.site_num

The site this company was added to (ID)


Lookup: lnk_site.site_desc

company.veh_account_num

Airport Only
The Vehicles account number (finance)

company.veh_finance_code

Airport Only
The Vehicles finance code (1 to 9)

company.veh_payment_type

Airport Only
Vehicles Payment Type
I = Invoice
C = Cash
F = Free of Charge
Table 17: company

B.9 current_notes
Stores alarm notes.

Field

Description

current_notes.alarm_num

Alarm occurrence that the note is attached to (ID).


-1 = General note
Lookup Table: alarmlog

current_notes.description

The note's content

current_notes.note_num

Unique ID of the note

current_notes.note_time

Date and time the note was added / last modified

current_notes.note_type

0 = Alarm note
1 = Unused
2 = General note
3 = Device note

current_notes.operator_name

The username of whoever created the note

current_notes.workstation

The workstation that created the note

current_notes.alarm_num

Alarm occurrence that the note is attached to (ID).


-1 = General note
Lookup Table: alarmlog

current_notes.description

The note's content

current_notes.note_num

Unique ID of the note

current_notes.note_time

Date and time the note was added / last modified

current_notes.note_type

0 = Alarm note
1 = Unused
2 = General note
3 = Device note

current_notes.operator_name

The username of whoever created the note


Table 18: current_notes

173

Custom WEB Report fields

B.10 device_inputs
Stores information of each device input.

Field

Description

device_inputs.alarm.loc

Location of the input alarm.

device_inputs.alarm_type

Type of input alarm that occurred.

device_inputs.bc_pulse_time

Broadcast pulse time

device_inputs.bc_type

Broadcast type:
C = Close
O = Open

device_inputs.bc_zone_num

Broadcast zone (ID)


Lookup: bc_zones.bc_zone_desc

device_inputs.device_addr

Device address of the input device the alarm occurred


on.

device_inputs.input_num

Input number on the device

device_inputs.input_state

The input state


C = Close State
O = Open State
T = Tamper State
Table 19: device_inputs

B.11 device_topology
Stores information about each device

Field

Description

device_topology.camera

Unused
Was used to display Look at camera
message on some readers.

device_topology.device_addr

The device address

device_topology.device_location

The device location (text) e.g. 'Front Door'

device_topology.device_type_num

The device type (ID)


Lookup: device_types.device_type_name

device_topology.hwunit_mode_num

The hardware unit type (ID)


Lookup: device_types.hwunit_num

device_topology.image_filename

Internal use only


Used for anti-passback out reader

device_topology.passback_zone_num

The passback zone this reader is assigned


to, if any (ID)
Lookup:
passback_zones.passback_zone_name

device_topology.ta

Is time & attendance reader Y/N


Table 20: device_topology

174

A2SE68-UG-0119-1.2

AC2000 Web

B.12 device_types
Stores information on each device type that can be connected to the CDC.

Field

Description

device_type_num

Device type (ID Number)

device_type_name

Device type name

hwunit_num

The associated hardware unit number


Lookup: hwunits.hwunit_name

comms_type

Internal Use Only


Lookup: comms.comms_name

readhead_num

Internal Use Only


Lookup: readheads.readhead_name
Table 21: device_types

B.13 extra_access
Used for storing temporary extra access information.

Field

Description

extra_access_ser

Unique ID

personnel_ser

The personnel serial number to be given


extra access
Lookup: personnel.surname,
personnel.forenames

access_level_num

The access level granted


Lookup: access_levels.access_level_desc

gtz_num

The timezone this access is valid for


Lookup: gtzinfo.gtz_desc
Table 22: extra_access

B.14 gtzinfo
Stores timezone information.

Field

Description

gtz_num

Unique ID

gtz_desc

The timezone name


Table 23: gtzinfo

B.15 hwunit_outputs
Stores details on outputs found on each device type

Field

Description

hwunit_num

Unique ID
Table 24: hwunit_outputs

175

Custom WEB Report fields

Field

Description

output_num

The output number

output_desc

The output description


Table 24: hwunit_outputs

B.16 lnk_site
Stores standard link site information.

Field

Description

site_num

Unique ID

site_desc

Site description

site_type

The site type


H = Home Site
X = Additional site (Manual export)
M = Additional site (Master / auto export)

ip_addr

IP address of the site

site_id

4 letter site ID
Table 25: lnk_site

B.17 machine
Stores a record for each CDC

Field

Description

machine.machine_id

Machine name (e.g. CDC0)


Table 26: machine

B.18 outcomes
Stores information on each possible outcome of a card swipe.

Field

Description

outcomes.ack_mandatory

Is an acknowledgement required? Y/N

outcomes.outcome_desc

Outcome description

outcomes.outcome_num

The unique outcome ID


Table 27: outcomes

176

A2SE68-UG-0119-1.2

AC2000 Web

B.19 park_hist
Stores parked card history.

Field

Description

park_hist_ser

Unique ID

personnel_ser

The personnel serial number (ID)


Lookup: personnel.surname, personnel.forenames

hotstamp_num

The card hotstamp number which is parked

original_access

The access level the card had before being parked (ID)
Lookup: access_levels.access_level_desc

park_date

The date the card was parked


Table 28: park_hist

B.20 park_rx_hist
Stores parked card history (for systems configured to use restricted zone parking).

Field

Description

park_rz_hist_ser

Unique ID

hotstamp_num

The card hotstamp number which is parked

iata_code

The 4 letter site code

park_date

The date the card was parked


Table 29: park_rx_hist

B.21 personnel
Stores information on each cardholder.

Field

Description

personnel.access_level_num

The Access level the cardholder has been


assigned (ID)
Lookup: access_levels.access_level_desc

personnel.added_by

Username of the user who added the


personnel entry.

personnel.address1

First line of the cardholder's address.

personnel.address2

Second line of the cardholder's address.

personnel.address3

Third line of the cardholder's address.

personnel.auth_num

The authoriser ID
Lookups: authoriser.auth_surname
authoriser.auth_forenames

personnel.bio_captured

Has a biometric been captured - Y/N

personnel.card_form_num

Card format (ID)


Lookup: card_formats.card_form_desc

personnel.card_num

The card number assigned to the cardholder


(note: this is not the hotstamp)
Table 30: personnel

177

Custom WEB Report fields

Field

Description

personnel.cardstatus

The status of the assigned card:


A = About to expire
C = Current
X = Expired
S = Lost / Stolen
N = Not yet Operational
P = Purged

personnel.comp_num

The company the cardholder is assigned to


(ID)
Lookup: company.comp_name

personnel.creation_date

Date the personnel entry was created.

personnel.dateofbirth

Cardholder's date of birth.

personnel.email_addr

Cardholder's email address.

personnel.exempt_type

Card Parking Exemption? Y/N

personnel.exempt_until_date

Card Parking Exemption expiry date

personnel.expiry_date

Card expiry date

personnel.forenames

Cardholder's forename(s).

personnel.gender

Cardholder's gender.

personnel.gtz_num

The timezone the cardholder's card is


assigned to (ID)
Lookup: gtzinfo.gtz_desc

personnel.home_company

Multi-Site only
Cardholder's Home Site Company

personnel.home_format

Multi-Site only
Cardholder's Home Site Card Format

personnel.home_ser

Multi-Site only
Cardholder's unique ID number on the home
site

personnel.hotstamp_num

Hotstamp number of the cardholder's card.

personnel.job_title

Cardholder's job title.

personnel.last_device

The address of the last device the


cardholder swiped their card at.

personnel.last_time

The date and time of the last swipe.

personnel.orig_exp_date

The card expiry date before the cardholder's


company was terminated

personnel.park_exp_date

The card expiry date before the card was


parked

personnel.part_num

Partitioned systems only


The partition the cardholder is assigned to

personnel.payroll_num

Cardholder's payroll number.

personnel.pers_char1

User Field (Spare Text1)

personnel.pers_char2

User Field (Spare Text2)

personnel.pers_char3

User Field (Spare Text3)

personnel.pers_char4

User Field (Spare Text4)

personnel.pers_date1

User Field (Spare Date1)

personnel.pers_date2

User Field (Spare Date2)


Table 30: personnel

178

A2SE68-UG-0119-1.2

AC2000 Web

Field

Description

personnel.pers_num1

User Field (Spare Num1)

personnel.pers_num2

User Field (Spare Num2)

personnel.personnel_ser

Cardholder's unique ID

personnel.pin

PIN of the cardholder's card.

personnel.site_num

The site the cardholder belongs to (ID)


Lookup: lnk_site.site_desc

personnel.special

Has the ability to put readers into special


mode - Y/N

personnel.start_date

Date the cardholder started with the


company.

personnel.surname

Cardholder's surname.

personnel.tel_num

Cardholder's telephone number.


Table 30: personnel

B.22 rf_issue
Reason for issue table.

Field

Description

rf_issue_num

Unique ID

rf_issue_desc

The reason for issue

card_type_num

The card type this reason applies to (ID)


Lookup: card_types.card_type_desc

def_charge

The default charge for this reason for issue

max_charge

The maximum allowed charge for this reason for issue


Table 31: rf_issue

B.23 rtc_topology
Stores information on each RTC group.

Field

Description

rtc_topology.description

RTC Name

rtc_topology.enabled

Enabled
Y/N

rtc_topology.ip_addr

RTC IP Address (v4 or v6)

rtc_topology.mac_addr

RTC MAC address

rtc_topology.max_ncn

Number of ports on RTC

rtc_topology.num_active_ncn

Number of active ports

rtc_topology.rtc_num

RTC Number (00 to FF)

rtc_topology.rtc_type

R = RTC
9 = 90x0

rtc_topology.start_ncn

Starting NCN number


Table 32: rtc_topology

179

Custom WEB Report fields

B.24 tour
Contains tour descriptive information

Field

Description

tour_num

Unique ID

tour_desc

The tour name


Table 33: tour

B.25 tour_events
Contains descriptive information of tour events

Field

Description

event_num

Unique ID

event_text

The tour event description


Table 34: tour_events

B.26 tour_history
Stores history of past tours

Field

Description

tour_hist_ser

Unique ID

event_time

The date and time of the event

event_num

The event (ID)


Lookup: tour_events.event_text

personnel_ser

The personnel serial number (ID)


Lookup: personnel.surname,
personnel.forenames

tour_num

The tour ID
Lookup: tour.tour_desc

device_addr

The device address the swipe occurred on


Lookup: device_topology.device_location

input_num

The input number the event happened on (if


not a swipe)

input_state

The input state which triggered the event


Table 35: tour_history

B.27 transaction
The transaction log table which stores information on each swipe

Field

Description

transaction.device_addr

Device address of the reader the transaction


occurred on.

transaction.hotstamp_num

Hotstamp number of the card swiped.


Table 36: transaction

180

A2SE68-UG-0119-1.2

AC2000 Web

Field

Description

transaction.outcome_num

Outcome ID of the card swipe.


Lookup: outcomes.outcome_desc

transaction.personnel_ser

The unique ID of the cardholder


Lookups: personnel.personnel_ser
visitor.visitor_ser
vehicle.vehicle_ser (standard/airport/lite)
vehicles.vehicle_ser (BAA)

transaction.trans_time

Date and time of the card swipe.


Table 36: transaction

181

Custom WEB Report fields

B.28 vehicle
Field

Description

vehicle.access_level_num

The Access level the vehicle has been assigned


(ID)
Lookup: access_levels.access_level_desc

vehicle.added_by

Username of the user who added the vehicle


entry.

vehicle.addr1

First line of vehicle owner's address.

vehicle.addr2

Second line of the vehicle owner's address.

vehicle.auth_num

The authoriser ID
Lookups: authoriser.auth_surname
authoriser.auth_forenames

vehicle.card_form_num

Card format (ID)


Lookup: card_formats.card_form_desc

vehicle.card_num

Card number of the vehicle owner's card.

vehicle.cardstatus

Status of the vehicle owner's card.

vehicle.charge

Airport only
The price that was paid for the issuing of the
card

vehicle.colour

Colour of the vehicle.

vehicle.comp_num

Vehicle owner's company (employer) (ID)


Lookup: company.comp_name

vehicle.creation_date

Date the vehicle entry was created.

vehicle.current_miles

Current mileage of the vehicle

vehicle.description

Description of the vehicle.

vehicle.engine_size

Size of the vehicle's engine.

vehicle.expiry_date

Date the vehicle card expires

vehicle.fuel_type_num

The type of fuel the vehicle uses (ID)


Lookup: veh_fuel.fuel_type_name

vehicle.gtz_num

The timezone the vehicle's card is assigned to


(ID)
Lookup: gtzinfo.gtz_desc

vehicle.hotstamp_num

Hotstamp number of the vehicle owner's card.

vehicle.issue_date

Issue date of the vehicle owner's card.

vehicle.make_num

Make of the vehicle (ID)


Lookup: veh_make.make_name

vehicle.manufacture_date

Date of the vehicle's manufacture.

vehicle.model_num

Model of the vehicle (ID)


Lookup: veh_model.model_name

vehicle.name

Vehicle owner's name

vehicle.obs_lights

Does the vehicle have obstruction lights? Y/N

vehicle.orig_exp_date

The card expiry date before the vehicle owner's


company was terminated

vehicle.part_num

Partitioned systems only


The partition the vehicle is assigned to

vehicle.pin

PIN of the vehicle's card.


Table 37: vehicle

182

A2SE68-UG-0119-1.2

AC2000 Web

Field

Description

vehicle.post_code

Post code of the vehicle owner's address.

vehicle.reg_num

Registration number of the vehicle.

vehicle.remark_num

Airport only
Remark dropdown field (ID)
Lookup remarks.remark_desc

vehicle.remarks

Airport only
Remark free text field

vehicle.rf_issue_num

Airport only
Reason for card issue (ID)
Lookup: rf_issue.rf_issue_desc

vehicle.site_num

The site the vehicle belongs to (ID)


Lookup: lnk_site.site_desc

vehicle.start_date

Date the vehicle card is valid from.

vehicle.tel_num

Telephone number of the vehicle owner.

vehicle.veh_test_date

Vehicle Test Date (MOT)

vehicle.vehicle_ser

Vehicle's unique ID
Table 37: vehicle

183

Custom WEB Report fields

B.29 visitor
Field

Description

visitor.access_level_num

The Access level the visitor has been assigned


for the current visit (ID)
Lookup: access_levels.access_level_desc

visitor.card_form_num

Current visit's card format (ID)


Lookup: card_formats.card_form_desc

visitor.card_num

Card number of the visitor's card.

visitor.cardstatus

Status of the visitor's card.


A = About to expire
C = Current
X = Expired
S = Lost / Stolen
N = Not yet Operational
P = Purged

visitor.company_name

The visitor's company

visitor.created_by

Username of the user who added the visitor.

visitor.creation_date

When the visitor was added

visitor.expiry_time

Date / Time of when the assigned card expires

visitor.forenames

Visitor's forename(s)

visitor.gtz_num

The timezone the visitor's card is assigned to


(ID)
Lookup: gtzinfo.gtz_desc

visitor.hotstamp.num

Hotstamp number of the visitor's assigned card.

visitor.pin

PIN of the visitor's assigned card.

visitor.start_time

Date the visitor card is valid from

visitor.surname

Visitor's surname.

visitor.visit_ser

The unique ID of the current visit


Lookup: visit.visit_ser

visitor.visitor_ser

Visitor's unique ID
Table 38: visitor

184

A2SE68-UG-0119-1.2