SE 5850 Security Management System DOS-Based Host Software A/E Guideform Specification Version 1.0 NOTES: • The following A/E Guideform Specification conforms to CSI guidelines to provide Specifiers an easy way to include Westinghouse Security Electronics products in their specifications. • The specifier should carefully select the portions of this document that fit the intended application. • Feel free to consult with your Westinghouse Security Electronics systems integrator regarding your particular application. • Optional feature choices are represented by items enclosed in brackets [ ]. • This document is considered accurate through the date on the cover. For updated specifications, call Westinghouse Security Electronics at 408 727-6521, or visit the WSE Web page at HTTP://WWW.WSEinfo.com . • The following individuals and organizations contributed to this document: Editor/project team leader: - Brent A. Duncan, Marketing Publications Specialist Core team members: - Joe Bridgman, Area Sales Manager - Brian Giampaoli, Area Sales Manager - Joe Oesterle, US Sales Manager With contributions by: - Frank Binzoni, VP Sales & Marketing - Ken Butte, Project Manager/Readers and Cards - Bill Blasdell, VP Engineering - James Collins, Senior Design Engineer - Dana Frischer, Area Sales Manager - Susan Goldin, Technical Writer - Tim Hillbun, System Test & Evaluation Manager - Peter Keep, Marketing Services Manager - Steve Lever, Field Service Engineer - Troy Mickle, Marketing Communications Specialist - Jim Reeve, Software Engineer - Alec Ratliff, Field Service Engineer - Bill Richardson, Technical Instructor - Ping Saye, Design Enginerring Manager - Tony Smith, Software Engineer - George Souza, Project Team Director - Rick Sparks, Project Manager/Controllers - Matt Wenzel, Field Service Manager With special thanks to: - John Suhr, Engineering Director, Tomasi-Dubois & Assoc. Sec. Consultants - Construction Services Institute WSE • 3/21/97 16720 — ii SE 5850 Host Software Table of Contents PART I GENERAL ................................................................................................................................................................1 .1 INTRODUCTION ............................................................................................................................................... 1 A. This document describes the required Electronic Card Access and Security Management Host Management Software (Host Software or SE 5850). ........................... 1 B. This specification provides all information necessary to produce a complete proposal for a sophisticated, easy-to-use DOS-based electronic Host Software system. The appendixes contain hardware specifications necessary to select the proper equipment for an installation. ............................................................................. 1 .2 GENERAL DESCRIPTION ................................................................................................................................1 A. Host Software: Required Host Software shall: ..............................................................................1 1. Be powerful and multi-functional with the ability to expand as project needs grow. ................................................................................................................. 1 2. Be simple and economical enough to support a single site, yet powerful enough to manage a multi-site network. ............................................................... 1 3. Allow for future Software features to be added as management recognizes requirements. ............................................................................................................. 1 4. Allow the operation of a Co-Session second terminal as an alternative Software operation or monitoring station. ............................................................. 1 5. Host Software shall be designed to control Westinghouse Security Electronics’ third and fourth-generation security architecture, and will fully support all of the following Controllers: ALTO 818 Series, SE 422 Series and NexSentry 4100 Series................................................................ 1 B. Host Computer Hardware: ............................................................................................................. 1 1. [SE 5850 Host Software shall be bundled with a powerful Hewlett Packard XM3 computer that is configured to give Host Software optimum performance.] or......................................................................................................... 1 2. [SE 5850 Host Software shall be a software-only package for use with a DOS-based IBM compatible computer with a Pentium processor.] ................... 1 3. See PART II.4.A for recommended hardware platform. ................................................. 1 .3 DESCRIPTION OF WORK ................................................................................................................................1 A. Installation: Installing the Security Management Software and bringing it to operational status requires the following major steps: ......................................................1 1. Determine operational requirements and plan Software to implement them. ............................................................................................................................1 2. Install Controllers and related hardware.......................................................................... 1 3. Configure Controllers and 5850 to communicate with one another. ........................... 1 4. Enter security system database. ......................................................................................... 1 5. Test security system communications and operation including “COSessions” second terminal as required...................................................................1 6. Train operators. ....................................................................................................................1 7. See section 2.03 for an expansion of this work summary.............................................. 1 .4 SUBMITTALS..................................................................................................................................................... 1 A. Block Diagram: Submittals shall include a block diagram detailing all connected devices. This document shall be adequate to ensure that all parties involved can determine that the recommended Software meets security system requirements. ............................................................................................................................1 .5 QUALITY ASSURANCE..................................................................................................................................... 1 A. Computer workstation: If Software Host is bundled with a Hewlett-Packard PC workstation or approved alternative, hardware shall meet UL and FCC requirements for class A computing devices. ......................................................................1 B. Manufacturer: Manufacturer of products defined in this section must have: ......................... 2 1. Industry experience: Company must have at least 20 years experience in manufacturing and servicing access management systems................................ 2 2. ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO 9001 Certification.........................................................2 .6 WARRANTY ....................................................................................................................................................... 2 A. Computer workstation: The Host Computer hardware shall be warranted for at least 15 months from the date of shipment from the factory. The manufacturer shall support hardware repair for the system computer hardware through Hewlett-Packard’s worldwide service organization...........................2 B. Software: The manufacturer shall directly support software for the selected system product family. ..........................................................................................................................2 WSE • 3/21/97 16720 — iii SE 58 50 Host Software C. Extended warranty: Extended warranty terms at reasonable rates shall be available from the installing dealer. ......................................................................................2 D. System integrator: The system integrator shall be the focal point of all service problems or questions (with manufacturer’s full support). ...............................................2 PART II PRODUCTS ............................................................................................................................................................2 .1 MANUFACTURER .............................................................................................................................................2 A. Westinghouse Security Electronics 5452 Betsy Ross Drive Santa Clara, CA 950541102 Telephone: 408 727-5170 Fax: 408 727-6707 ................................................................2 B. Approve equal .....................................................................................................................................2 .2 MANUFACTURED UNITS ................................................................................................................................2 A. The Access Management System shall consist of the following components: .........................2 1. Host hardware: IBM compatible PC with Pentium processor running DOS system 3 or later and SE 5850 Host Software. ........................................................2 2. CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security Adapters: Westinghouse Security Electronics Controller. ..................................2 3. Printer: Parallel printer or serial printer. .........................................................................2 4. Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422 Series.] [NexSentry 4100 Series Controller.] ...........................................................2 .3 EQUIPMENT ......................................................................................................................................................2 A. SE 5850 Architecture: .......................................................................................................................2 1. Host Computer: ...................................................................................................................2 2. CI-1 or CI-8 Multiplexer Adapter: The system may require one or more CI-1 or CI-8 multiplexers to allow the integration of up to 32 remote distributed intelligence Westinghouse Security Electronics Controllers into a multi-location network. ............................................................2 3. Communication interface: The SE 5850 shall connect to the Controller via the CI-1 or CI-8 through one of the following interfaces: RS232, RS485, or 20 mA (Controller dependent). ...............................................................3 B. Software Platform: ............................................................................................................................3 1. Operating System: MS-DOS...............................................................................................3 2. Networking: Large scale or multi-location systems with security devices or computers distributed to remote locations while overall control of the network is maintained at a central location. ...................................................3 C. Operator interface/operations: The required system shall fulfill the following requirements for operator monitoring and command functions: .....................................3 1. Sophisticated operator interface: The required Software shall provide a sophisticated, easy-to-operate interface for security operators. Multiple aspects of the system shall contribute to the effectiveness of the operator interface: ...............................................................................................3 2. System Password Protection/Control:............................................................................3 3. Real-time alarm reporting and display: .........................................................................3 4. Real-time Status Reports: System status reports shall be available by: .....................3 5. Override Command Capability: The system shall provide the operator the ability, based on password authorization, to override pre-set conditions. The overrides shall include: ................................................................3 6. High Resolution Color graphics at operator console: .................................................4 7. Powerful Security System Diagnostic Software: feature shall provide operators with the ability to examine the status of the system components and communications. These capabilities are particularly useful for diagnosing suspected problems, including: .........................................4 8. Audit Trail of all Operator Activity: ................................................................................4 D. System Management: The required system shall perform all of the following functions: ...................................................................................................................................4 1. Simple System Administration: .......................................................................................4 2. Security System Hardware Definition: ...........................................................................5 3. Define Security System Software:....................................................................................5 4. Maximum Database Capabilities: Maximum storage capabilities are limited by the application. ........................................................................................5 5. Database Download to Distributed Local Controllers: ..............................................5 6. Powerful and Meaningful Reports: .................................................................................5 7. On-line Storage of Security Events: When the database approaches a selected percentage of its limit, the system shall issue an alert to inform the operator(s) of the condition and to recommend that the operator perform an archive to floppy disk. ..........................................................6 8. Archiving of Security Events: ...........................................................................................6 9. Backup and Restoration of Security System definitions:...........................................6 WSE • 3/21/97 16720 — iv SE 5850 Host Software E. Access Control Operation: ..............................................................................................................6 1. Common Requirements: ................................................................................................... 6 2. Distributed Processing: ..................................................................................................... 7 F. Alarm Monitoring Operation: ........................................................................................................7 1. When utilizing Westinghouse Security Electronics Controllers, the host computer shall monitor the alarm points in two states: secure or alarm. An end-of line resistance shall indicate the point is secure.................... 7 2. Configurable Alarm Instructions: ................................................................................... 7 3. Operator Alarm Response: ................................................................................................8 4. Recall Alarm Activity: ........................................................................................................8 5. Monitor Point Status Display: ..........................................................................................8 6. Shunting/Unshunting Alarms and Alarm Points: The system shall provide the capability to shunt or unshunt alarm points via the following methods: ....................................................................................................8 .4 COMPONENT DEFINITION............................................................................................................................. 8 A. Recommended hardware platform: SE 5850 is available as a software-only option or it can be packaged with a Hewlett Packard XM3 PC with the following specifications. A comparable IBM Compatible PC is acceptable: ......................................8 1. Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM Compatible PC. ........................................................................................................... 8 2. Microprocessor: Pentium, 50 Mhz, 32-bit. ........................................................................8 3. Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC selectable, UL listed. ..................................................................................................8 4. Input media: 1.44 MB diskette drive. ................................................................................. 8 5. Mass Storage: 40 MB hard disk, or greater. ......................................................................8 6. I/O Ports: 1 parallel port, 3 serial ports.............................................................................. 8 7. Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard options available. ....................................................................................................... 8 8. Communications: RS-232, 3 (three) ports. ........................................................................8 9. Approvals: UL, FCC. ............................................................................................................. 8 10. Made in USA. ....................................................................................................................... 8 .5 ACCESSORIES:................................................................................................................................................... 8 A. Printer: Parallel printer or serial printer........................................................................................ 8 B. Communication Modems: ..............................................................................................................8 1. Direct Connection: ............................................................................................................... 8 2. Conversion devices from 20 mA to RS-232: ..................................................................... 8 3. Power Management: ............................................................................................................9 PART III EXECUTION ......................................................................................................................................................... 9 .1 FIELD QUALITY CONTROL:........................................................................................................................... 9 A. Tests: ................................................................................................................................................... 9 1. A system integrator shall supply a proposed acceptance test procedure. ....................9 2. Testing the system shall be the sole responsibility of the system integrator. ............. 9 3. Communications tests: Controllers to central terminal, local controller, or remote local controller. ............................................................................................. 9 B. Inspection: ......................................................................................................................................... 9 1. The selected system integrator shall provide, on the job site, a factorytrained technician to assist, advise, or manage installing personnel. ............... 9 2. The manufacturer shall also supply on-site inspection. ................................................9 3. All final connections shall be made under the direct supervision of the system integrator. ......................................................................................................9 C. Field Service: ..................................................................................................................................... 9 1. A system integrator authorized by the manufacturer shall provide support for the selected system. ............................................................................................. 9 2. System integrator must be supported by large service-oriented manufacturers for the system hardware and software. ....................................... 9 3. The system integrator shall determine and report all problems to the manufacturers’ customer service departments. ....................................................9 4. Support must be available to the integrator via phone inquiries or on-site visits if conditions require and are approved by the manufacturer’s customer service manager. ......................................................................................9 5. If purchased, the manufacturer shall provide reliable field service support for the computer hardware utilizing Hewlett-Packard service. ..........................9 6. The manufacturer shall also participate directly in on-site commissioning of new systems with integrator cooperation.......................................................... 9 WSE • 3/21/97 16720 — v SE 58 50 Host Software 7. HP field service is available in a variety of forms for the customer. A system manufacturer that determines a hardware problem is occurring will contact HP to assist the integrator and customer to resolve the problem. ..................................................................................................9 .2 SCHEDULES ......................................................................................................................................................9 A. System Integrator Assisted Preparation: .....................................................................................9 1. Data Requirements. ..............................................................................................................9 2. Operators & privileges. ........................................................................................................9 3. Access Hardware...................................................................................................................9 4. Sensors. ..................................................................................................................................9 5. Monitor Points. .....................................................................................................................9 6. Keyholders.............................................................................................................................9 7. Keyholders security codes...................................................................................................9 8. Maps. ......................................................................................................................................9 9. Prepare room for system installation. ...............................................................................9 10. Receive equipment. ............................................................................................................9 B. System Installation:........................................................................................................................10 1. Install security management hardware. .........................................................................10 2. System Integrator and manufacturer (when ordered) on-site commissioning. ........................................................................................................10 3. Initial startup and verification. .........................................................................................10 4. Data entry. ...........................................................................................................................10 5. Data entry listing & verification. ......................................................................................10 C. Verify Installation: ..........................................................................................................................10 1. Connect access control hardware to Security Management System. ..........................10 2. Download data and verify correct operation. .................................................................10 3. Testing total access and management system. ..............................................................10 4. Sample Reports. ..................................................................................................................10 5. Daily Operation and Monitoring. .....................................................................................10 6. Dealer deliver “as built” drawings...................................................................................10 WSE • 3/21/97 16720 — vi SE 5850 Host Software SE 5850 Security Management Host Software Database Capacities Summary • Summary: • Cardholders: • Key Groups: 250 • Access Codes 250 • Operator Passwords: 100 • Operator instructions: 500 • Time Periods (64 or 128 max./Controller2): • Time Groups: • Holidays: • Floor Plan Maps: • On-line Transaction Storage: • Off-line Transaction Storage: • Controllers: • Card Readers: • Monitor Points: • Monitor Groups: • Door Groups: • Reports (15 or 32 max. per Controller4): 1 2 3 4 SE 5850 is DOS-based single-user, multisite capable access management host software package designed to manage access and security solutions for small to medium-sized applications. 50,0001 1,000 250 50 100 1,000,000 minimum3 Unlimited 2, 8, 16, or 32 256 maximum 1,024 maximum 100 50 100 Limited by indivual Controller quantities. See Guideform Specification for individual Controller. Depends on hard drive space available. See Guideform Specification for individual Controller. vii PART I .1 .2 INTRODUCTION A. This document describes the required Electronic Card Access and Security Management Host Management Software (Host Software or SE 5850). B. This specification provides all information necessary to produce a complete proposal for a sophisticated, easy-to-use DOS-based electronic Host Software system. The appendixes contain hardware specifications necessary to select the proper equipment for an installation. GENERAL DESCRIPTION A. B. .3 1. Be powerful and multi-functional with the ability to expand as project needs grow. 2. Be simple and economical enough to support a single site, yet powerful enough to manage a multi-site network. 3. Allow for future Software features to be added as management recognizes requirements. 4. Allow the operation of a Co-Session second terminal as an alternative Software operation or monitoring station. 5. Host Software shall be designed to control Westinghouse Security Electronics’ third and fourthgeneration security architecture, and will fully support all of the following Controllers: ALTO 818 Series, SE 422 Series and NexSentry 4100 Series. Host Computer Hardware: 1. [SE 5850 Host Software shall be bundled with a powerful Hewlett Packard XM3 computer that is configured to give Host Software optimum performance.] or 2. [SE 5850 Host Software shall be a software-only package for use with a DOS-based IBM compatible computer with a Pentium processor.] 3. See PART II.4.A for recommended hardware platform. Installation: Installing the Security Management Software and bringing it to operational status requires the following major steps: 1. Determine operational requirements and plan Software to implement them. 2. Install Controllers and related hardware. 3. Configure Controllers and 5850 to communicate with one another. 4. Enter security system database. 5. Test security system communications and operation including “CO-Sessions” second terminal as required. 6. Train operators. 7. See section 2.03 for an expansion of this work summary. SUBMITTALS A. .5 Host Software: Required Host Software shall: DESCRIPTION OF WORK A. .4 GENERAL Block Diagram: Submittals shall include a block diagram detailing all connected devices. This document shall be adequate to ensure that all parties involved can determine that the recommended Software meets security system requirements. QUALITY ASSURANCE A. Computer workstation: If Software Host is bundled with a Hewlett-Packard PC workstation or approved alternative, hardware shall meet UL and FCC requirements for class A computing devices. WSE • 3/21/97 16720 — 1 SE 5850 Host Software B. .6 Manufacturer: Manufacturer of products defined in this section must have: 1. Industry experience: Company must have at least 20 years experience in manufacturing and servicing access management systems. 2. ISO 9001 Certification: Manufacturing process of company must meet stringent standards of ISO 9001 Certification. WARRANTY A. Computer workstation: The Host Computer hardware shall be warranted for at least 15 months from the date of shipment from the factory. The manufacturer shall support hardware repair for the system computer hardware through Hewlett-Packard’s worldwide service organization. B. Software: The manufacturer shall directly support software for the selected system product family. C. Extended warranty: Extended warranty terms at reasonable rates shall be available from the installing dealer. D. System integrator: The system integrator shall be the focal point of all service problems or questions (with manufacturer’s full support). PART II .1 .2 MANUFACTURER A. Westinghouse Security Electronics 5452 Betsy Ross Drive Santa Clara, CA 95054-1102 Telephone: 408 727-5170 Fax: 408 727-6707 B. Approve equal MANUFACTURED UNITS A. .3 PRODUCTS The Access Management System shall consist of the following components: 1. Host hardware: IBM compatible PC with Pentium processor running DOS system 3 or later and SE 5850 Host Software. 2. CI-1 & CI-8 Multiplexer Remote Interface to Westinghouse Security Adapters: Westinghouse Security Electronics Controller. 3. Printer: Parallel printer or serial printer. 4. Access Control/Alarm Monitoring: [Alto 818 Series Controller.] [SE 422 Series.] [NexSentry 4100 Series Controller.] EQUIPMENT A. SE 5850 Architecture: 1. 2. Host Computer: a. The host computer shall be the nucleus of the required system. It shall provide all necessary capabilities for one operator to manage access and alarm activity. Specifically, the host computer shall be the single computer that supports all the functions of Access Control and Alarm Monitoring, including file management, reporting, and real-time monitoring/control of security hardware devices. b. The Host Computer shall support a “Co-Sessions” second terminal for alternate station operation and monitoring. CI-1 or CI-8 Multiplexer Adapter: The system may require one or more CI-1 or CI-8 multiplexers to allow the integration of up to 32 remote distributed intelligence Westinghouse Security Electronics Controllers into a multi-location network. WSE • 3/21/97 16720 — 2 SE 5850 Host Software 3. B. C. Communication interface: The SE 5850 shall connect to the Controller via the CI-1 or CI-8 through one of the following interfaces: RS232, RS485, or 20 mA (Controller dependent). Software Platform: 1. Operating System: MS-DOS. 2. Networking: Large scale or multi-location systems with security devices or computers distributed to remote locations while overall control of the network is maintained at a central location. Operator interface/operations: The required system shall fulfill the following requirements for operator monitoring and command functions: 1. 2. 3. Sophisticated operator interface: The required Software shall provide a sophisticated, easy-tooperate interface for security operators. Multiple aspects of the system shall contribute to the effectiveness of the operator interface: a. Menu-driven screen selection shall allow even an infrequent operator to move through and manage the functions of the system easily and with a minimum of training. There shall be no need to memorize complicated commands or procedures. b. Function key control of actions must provide the ability to control the system with simple keystrokes. System Password Protection/Control: a. Operator name and password shall control access to all menus and screens and the corresponding capability for each screen. b. The Software shall be able to assign each and every operator a completely unique set of capabilities. c. The Software shall protect the password screen by blanking out the password when the operator enters it. d. Operators supported: 100 maximum. Real-time alarm reporting and display: a. b. The Software shall process alarms in real time. Priority levels defined by system Administrator: 10. 1) 4. 5. The System Administrator shall have the capability to assign the priority levels into categories such as fire, intrusion, or duress. c. Alarms displays: Color. d. The system shall associate color graphic maps with alarm points and must display maps in real time. Real-time Status Reports: System status reports shall be available by: a. Alarm category. b. Security area device. c. Monitor points. Override Command Capability: The system shall provide the operator the ability, based on password authorization, to override pre-set conditions. The overrides shall include: a. Unlock/re-lock doors individually or in logical groups. b. Shunt/unshunt alarm monitor points individually or in logical groups. c. Open, limit, or close the areas covered by specific Controllers. d. Silence latched alarm contacts. e. Forgive anti-passback status in individual Controllers. WSE • 3/21/97 16720 — 3 SE 5850 Host Software 6. 7. High Resolution Color graphics at operator console: a. SVGA Resolution with 256 Colors (minimum). b. ASCII Graphics for Maps: 1) Using simple keys to facilitate selection and placement of graphic symbols, the system can define maps representative of the site. 2) The symbols can be associated with alarm points. 3) Mapping supports a map sequence function which allows definition of maps containing greater detail of previously drawn maps. 4) The mapping system shall support output to Okidata 184 parallel or similar printers. Powerful Security System Diagnostic Software: feature shall provide operators with the ability to examine the status of the system components and communications. These capabilities are particularly useful for diagnosing suspected problems, including: a. Card Reader Status: 1) b. c. d. Card Reader Activity: 1) The system shall display access activity at doors associated with a particular card reader as it occurs. 2) Displays shall include the door name, access time, card number, door status (closed, open, held open, or forced open) and lock status (locked, unlocked, manually unlocked, or auto unlocked). Controller Status: 1) Open/Limited/Closed, Shunted/Unshunted, Communications Failure. 2) Power: online vs. backup, and tamper status. Monitor Point Status: 1) e. 8. A status screen shall show the condition of all card readers attached to the system. This screen shall show the status of card readers, coaxial cables. Active, clear, communications failure, device failure. Communications Monitor: 1) Communications between the card readers and the computer must be monitored. 2) This function normally will be used during installation to verify proper connection of communication cables. Audit Trail of all Operator Activity: a. The System Administrator shall be provided with the ability to monitor and to manage all actions performed by operators on the system. b. Audit trail records shall be saved to hard disk and must not be able to be modified. c. The only possible actions for audit records shall be report retrieval and archiving for off-line storage. D. System Management: The required system shall perform all of the following functions: 1. Simple System Administration: a. To administer the Host computer, the system shall provide control of all system administration functions via menu-accessed screens. b. There shall be no need to memorize complicated commands or to learn the syntax of the DOS operating system. c. System administrative functions: WSE • 3/21/97 1) Adding and deleting system users and their passwords. 2) Performing system and database backups. 3) Displaying current system activity. 4) Performing transaction archives. 16720 — 4 SE 5850 Host Software 2. 3. 5) Initiating data transfer to remote devices. 6) Defining and maintaining user-controlled fields. 7) Performing alarm transaction clean-up. Security System Hardware Definition: a. Access control/alarm monitoring devices. b. Communication characteristics. c. Grouping of doors and monitor points. d. Defining readers. e. Defining points. f. Defining actions. g. Defining auto activate/open periods: 1) Proximity access control. 2) Keypad access control. 3) Magnetic Stripe access control. 4) Alarm monitor points. Define Security System Software: a. Card number. b. Employee name. c. Card valid date. d. Card expiration date. e. Time Periods: Start time, stop time, and one or more days of the week. f. Holidays: g. 1) Along with the time zones, days of week, and doors for access control, the system shall allow the System Administrator to add holidays to the access definition. 2) Holiday definition shall allow days defined as holidays to have automatic and access parameters different from their normal definitions. Data Grouping: The system shall provide the capability to group the following data items: 1) Time Periods : 4 (four) per time group. 2) Doors: into door groups. 3) Monitor points: into monitor groups. 4) Keyholders into keyholder groups. 4. Maximum Database Capabilities: Maximum storage capabilities are limited by the application. 5. Database Download to Distributed Local Controllers: 6. a. The host computer must download all information pertinent to each particular control unit. b. The system shall execute downloads automatically at pre-defined times or by manual initiation. Powerful and Meaningful Reports: a. The system shall be able to execute reports without impacting the real-time operation of the security system. b. The system shall track and report the dates of archived events available for reporting. It must be able to generate reports for activity spanning any time period, using fixed disk files and high-density 3.5-inch floppy disk files. c. The system shall separate reports by group (door, monitor, time). d. The system shall provide reports for every data file maintained in the system. WSE • 3/21/97 16720 — 5 SE 5850 Host Software e. 1) Detail activity: Provides detail reports of all activity on the system within specified time intervals. 2) Exception activity: Provides selective reporting of specific types of activity on the system within specified time intervals. 3) Audit trail: Any time any data is changed, the system shall maintain an audit trail of the data changed and who made the change. This report allows management of database changes and is useful in meeting the requirements of most controlling agencies. 4) History reports to be available based on a particular cardholder or door. 7. On-line Storage of Security Events: When the database approaches a selected percentage of its limit, the system shall issue an alert to inform the operator(s) of the condition and to recommend that the operator perform an archive to floppy disk. 8. Archiving of Security Events: a. The system shall provide the ability to backup to floppy disk all events stored in the transaction file. b. In the event of hardware failure or need to execute a report using archived events, the events must be able to be restored to the system. 9. Backup and Restoration of Security System definitions: a. b. E. Pre-defined Reports: The system shall provide the ability to backup to floppy disk definition, including both hardware and user information. In the event of data corruption, tampering, or other loss of data integrity, the security system definitions shall be able to be restored to the on-line system from the floppy disk. Access Control Operation: 1. Common Requirements: a. b. c. WSE • 3/21/97 System Designed for Growth: 1) Through addition of Controllers (and possibly software upgrade) the system shall provide support for middle scale applications with a larger number of cardholders, card readers and alarm points. 2) Modular software architecture and performance-oriented programming techniques shall optimize the system to provide minimum response time. 3) From the speed with which doors are unlocked and the speed with which reports are produced, the system software must be able to meet the stringent specification for capacity. Capture of all Events from Access Control Units (Controllers): 1) The host computer shall capture all events that occur at local access control. 2) Event capture shall occur real-time. 3) These devices may include multiple switch monitors, Controllers, and alarm monitor units. Failsoft Operation: 1) If for any reason, communication between the computer and the Controller is interrupted, the Controller shall continue to make its decisions. 2) While connected to the host computer, the system shall constantly update the Controllers with the information necessary to operate in failsoft mode. Each Controller has its own specific quantitabive limitations. 3) The host computer shall download a maximum of 11,000 card numbers plus 120 access codes to give full decision making capability to each Controller. 4) This capability shall provide for continued operation of distributed card readers at all times. 16720 — 6 SE 5850 Host Software d. Automated System Control: The system shall provide the ability to automatically change the state of certain devices or areas based on time. e. Multiple Identification Required for Access: 1) Selected entrances and exits may require multiple methods of confirming identity for entry. 2) The required system must support any combination of the following access controlling devices: (i) Analog Proximity Sensors. (ii) Digital Proximity Readers. (iii) Keypads. (iv) Magnetic Stripe Readers. (v) f. g. 2. Smart card readers. Anti-passback: 1) Ability to forgive passback status shall be available via operator overrides. 2) Passback forgiveness shall be provided to a single cardholder or for all cardholders. 3) Automatically forgive passback at predetrmined time of the day. 4) In the event of Controller failure, the Controller shall automatically forgive all passback status upon return to operational status. Trace: 1) The system shall provide the capability to trace activity for specific cardholders at specific doors. 2) For a cardholder, the system shall report activities throughout the system. 3) The system shall display trace activities with the alarm functions to alert the operator. Distributed Processing: a. Distributed Access Control Decision Making: Westinghouse Security Electronics Controllers support distributed processing, with the capability to make access decisions independent of the Host Computer. b. Automated Download of Data to Distributed Controllers: 1) SE 5850 maintains a central database on all access control equipment. 2) Central database includes: (i) Keyholders. (ii) Access levels. (iii) Automatic events (such as auto unlock), etc. 3) F. SE 5850 shall sort the information in the central database and send it to the appropriate Controller, allowing the local Controller to make all necessary decisions without the SE 5850 central terminal support. Alarm Monitoring Operation: 1. When utilizing Westinghouse Security Electronics Controllers, the host computer shall monitor the alarm points in two states: secure or alarm. An end-of line resistance shall indicate the point is secure. 2. Configurable Alarm Instructions: a. Alarm instructions: 500 maximum with up to 228 characters each for each alarm event or monitor point in the system. b. The system shall be able to assign alarm instructions to any monitor point in the system for unique responses to any circumstance. WSE • 3/21/97 16720 — 7 SE 5850 Host Software 3. 4. 5. 6. .4 Operator Alarm Response: a. SE 5850 shall prioritize alarm events. b. When acknowledging an alarm, the operator must individually acknowledge the event. c. The system shall save alarm acknowledgment with the respective event for future recall and reference. Recall Alarm Activity: a. The system shall save to disk information associated with each alarm that occurred within the system. b. The operator cannot modify or delete this information. Hence, all information is available to the operator viewing an alarm. Monitor Point Status Display: a. The system shall provide a display that summarizes the current condition of all of the monitor points. b. The status display shall indicate normal, active, shunted, and communication line status. Shunting/Unshunting Alarms and Alarm Points: The system shall provide the capability to shunt or unshunt alarm points via the following methods: a. Automatically, based on time of day, day of week, or holiday. b. Manually by Operator override. The operator must previously have been provided the capability of shunt/unshunt via the password definition. COMPONENT DEFINITION A. Recommended hardware platform: SE 5850 is available as a software-only option or it can be packaged with a Hewlett Packard XM3 PC with the following specifications. A comparable IBM Compatible PC is acceptable: 1. Manufacturer/Model: Hewlett-Packard XM3 PC, or comparable IBM Compatible PC. 2. Microprocessor: Pentium, 50 Mhz, 32-bit. 3. Monitor: 256 Color, Super Video Graphics Adapter (SVGA); 110/220 VAC selectable, UL listed. 4. Input media: 1.44 MB diskette drive. 5. Mass Storage: 40 MB hard disk, or greater. 6. I/O Ports: 1 parallel port, 3 serial ports. 7. Keyboard: 101 enhanced keyboard (QWERTY). Foreign language keyboard options available. 8. Communications: RS-232, 3 (three) ports. 9. Approvals: UL, FCC. 10. Made in USA. .5 ACCESSORIES: A. Printer: Parallel printer or serial printer. B. Communication Modems: 1. 2. Direct Connection: a. Short distance (max. two miles point-to-point on 22-AWG twisted pair at 9600 baud. Uses Black Box short haul modems). b. Lease line, point-to-point: Modem not defined. Conversion devices from 20 mA to RS-232: a. WSE • 3/21/97 SE CI-1 or SE CI-8. 16720 — 8 SE 5850 Host Software 3. Power Management: a. PART III .1 1) Provides continuous power, without interruption, should primary power be interrupted. 2) Provides 1 hour or more continuous DC power, depending on configuration. EXECUTION FIELD QUALITY CONTROL: A. B. C. .2 UPS: Tests: 1. A system integrator shall supply a proposed acceptance test procedure. 2. Testing the system shall be the sole responsibility of the system integrator. 3. Communications tests: Controllers to central terminal, local controller, or remote local controller. Inspection: 1. The selected system integrator shall provide, on the job site, a factory-trained technician to assist, advise, or manage installing personnel. 2. The manufacturer shall also supply on-site inspection. 3. All final connections shall be made under the direct supervision of the system integrator. Field Service: 1. A system integrator authorized by the manufacturer shall provide support for the selected system. 2. System integrator must be supported by large service-oriented manufacturers for the system hardware and software. 3. The system integrator shall determine and report all problems to the manufacturers’ customer service departments. 4. Support must be available to the integrator via phone inquiries or on-site visits if conditions require and are approved by the manufacturer’s customer service manager. 5. If purchased, the manufacturer shall provide reliable field service support for the computer hardware utilizing Hewlett-Packard service. 6. The manufacturer shall also participate directly in on-site commissioning of new systems with integrator cooperation. 7. HP field service is available in a variety of forms for the customer. A system manufacturer that determines a hardware problem is occurring will contact HP to assist the integrator and customer to resolve the problem. SCHEDULES A. System Integrator Assisted Preparation: 1. Data Requirements. 2. Operators & privileges. 3. Access Hardware. 4. Sensors. 5. Monitor Points. 6. Keyholders. 7. Keyholders security codes. 8. Maps. 9. Prepare room for system installation. 10. Receive equipment. WSE • 3/21/97 16720 — 9 SE 5850 Host Software B. C. System Installation: 1. Install security management hardware. 2. System Integrator and manufacturer (when ordered) on-site commissioning. 3. Initial startup and verification. 4. Data entry. 5. Data entry listing & verification. Verify Installation: 1. Connect access control hardware to Security Management System. 2. Download data and verify correct operation. 3. Testing total access and management system. 4. Sample Reports. 5. Daily Operation and Monitoring. 6. Dealer deliver “as built” drawings. WSE • 3/21/97 16720 — 10 SE 5850 Host Software