0% found this document useful (0 votes)
245 views184 pages

ACM Installer 2 Student Workbook

A user role that has limited access to the system and cannot make changes. Assistants can view events, run reports, and monitor the system. Administrator: A user role that has full access to configure and manage all system settings. Only administrators can add/remove other users and make system-wide changes. Workstation: The computer used to access and manage the Avigilon Control Center video management software and Access Control Manager. Controller: The hardware device that controls doors/areas and communicates with readers, inputs, outputs and other field devices. Also called a panel. Reader: The device used to read credentials like cards, tags or biometrics at a door. Also called a card reader or access reader

Uploaded by

Saifuddeen TP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
245 views184 pages

ACM Installer 2 Student Workbook

A user role that has limited access to the system and cannot make changes. Assistants can view events, run reports, and monitor the system. Administrator: A user role that has full access to configure and manage all system settings. Only administrators can add/remove other users and make system-wide changes. Workstation: The computer used to access and manage the Avigilon Control Center video management software and Access Control Manager. Controller: The hardware device that controls doors/areas and communicates with readers, inputs, outputs and other field devices. Also called a panel. Reader: The device used to read credentials like cards, tags or biometrics at a door. Also called a card reader or access reader

Uploaded by

Saifuddeen TP
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 184

ACCESS INSTALLER II

CERTIFICATION

CONTROL MANAGER™

STUDENT WORKBOOK
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, and AVIGILON CONTROL
CENTER are trademarks of Avigilon Corporation. Other product names mentioned herein may be the
trademarks of their respective owners. The absence of the symbols ™ and ® in proximity to each trademark
in this document is not a disclaimer of ownership of the related trademark. Avigilon Corporation protects
its innovations with patents issued in the United States of America and other jurisdictions worldwide. www.
avigilon.com/patents Unless stated explicitly and in writing, no license is granted with respect to any
copyright, industrial design, trademark, patent or other intellectual property rights of Avigilon Corporation or
its licensors.

Avigilon Corporation

http://www.avigilon.com

Revised 2019-12-19, ACM 6.2

2 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
TABL E O F CO N TEN TS
01 Getting Started 5 14 Collaborations 89
Terminology Chart 6 15 Overrides 93
ACM Installer II Assessment 7
16 Emergency Lockdown 99
02 Keypad Readers 11
17 Keypad Threat Levels & Dashboards 105
03 Mustering 19
18 Token Trigger output 111
04 ACM Verify 27
19 Door Forced Trigger Output 119
05 Anti-Passback 35
20 First Token Unlock 125
06 Delegations 39
21 Elevator Controls 131
07 Limiting Roles 45
22 Backup 139
08 Groups 49
23 Macros 143
09 Policies 55
24 Triggers 147
10 Routing Groups 61
25 Interlocks 153
11 User Trace 67
26 Reference 157
12 User Defined Fields 71

13 System Integration 75

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 3
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

4 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
GETTING STARTED

WHAT YOU WILL In this certification course, students will gain an advanced
LEARN understanding of the Avigilon™ Access Control Manager (ACM) system,
including topics ranging from anti-passbacks, triggers and lockdowns.

Under the guidance of an experienced technical instructor, students


will complete hands on activities and lessons on an ACM workstation.
Following the conclusion of the class, students will complete an
assessment in order to receive their certification.

PREREQUISITES In order to enroll in this instructor-led course, students will first need
to access the Avigilon Training Center to enroll in and complete the
following online courses:
• ACM I Certification

USING Use this workbook in the following ways:


THIS MANUAL
During the course:
• Follow the steps to configure the training ACM workstation
• Complete the activities and assessments

After the course:


• Use this workbook as a reference tool

HOW OFTEN This course will need to be retaken every two years to receive
TRAINING IS NEEDED certification.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 5
0 1 G E T T I N G S TA R T E D

TERM I NO LO GY C HA RT
Access control terminology will sometimes vary from company to company. See the standard terminology
section for the terms that are acceptable to describe Avigilon products.

AVIGILON STANDARD OTHER TERMS YOU MAY


DESCRIPTION
TERMINOLOGY COME ACROSS

The physical access piece used by Card, Fingerprint, Hand, Fob,


1. Token
the cardholder Credential, Electronic Key

Number, Code, Card, Number,


2. Internal Number The number stored on the token
Credential

The physical number printed on Engraved number, External


3. Embossed Number
the token, if applicable number

The down-stream panel of the


4. Subpanel Sub-panel, Sub Panel, Slave Panel
controller

A person registered on the


Person, Individual, User, Man,
5. Identity system, could be a cardholder or
Woman
an operator

Control Panel, Main Panel, Master


6. Controller The main controlling panel
Panel

Card Holder, Card Carrier, Person,


7. Cardholder A person who uses the space
User, Individual

Security Guard, User, Operator,


8. M
 onitoring Operator or A person who monitors or
Person, Individual, System
Administering Operator administers the system
Controller

An empty white box to enter text


9. Field Text entry box, Data field
in

Check Box, Box, Square, Radio


10. Checkbox A click box
Button

A list that expands upon clicking it Drop-down menu, Drop-down,


11.Dropdown List
to reveal options Dropdown menu

A feature of ACM that prevents


12. Anti-Passback cardholders from following each Anti Passback, Anti-pass back
other through doors

6 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 1 G E T T I N G S TA R T E D

ACM I N STA LLER II AS S E S S M ENT


As you work through the ACM II course, the instructor will verify that your workstation configurations are set
up correctly. Use the checklist below to keep track of each section.

Pass at least 80% of the lessons to receive your certification.

TIME
TOPIC ASSESSMENT
LIMIT
•  onfigure a schedule, add the keypad reader, add access
C
1. Keypad Readers groups for the keypad, employees and principal and add a
keypad role

•  dd areas, create a mustering station and add a mustering


A
2. Mustering
dashboard

• Configure ACM Verify door, pair mobile device and use ACM
3. ACM Verify
Verify to check in identities

•  dd an area and configure door operations to prevent users


A
4. Anti-Passback (APB)
from going into one area before they have left another area

•  reate a “Secretary” delegation that can only access the


C
5. Delegations
Identity pages within the system

•  reate a limited “Secretary” role that can only assign


C
6. Limiting Roles
weekday access to other users

7. Groups • Create Door Group and perform a template batch update

• Create a Door Policy that will override Door Mode for Front
8. Policies
and Lab door

•  dd a “Security Guard” routing group so that he only has


A
9. Routing Groups
access to certain parts of the system

•  onfigure an event to trace a card and trace a specific


C
10. User Trace
identity

•  reate eight user defined fields hosted under three


C
11.User Defined Fields & Tabs
respective user defined tabs

• Connect ACM appliance with ACC site, import ACM roles,


12. System Integration
link doors to cameras and add a rule for door grant

13. Collaborations • Import a CSV file and run a collaboration

•  onfigure global actions & linkages to lock down and


C
14. Emergency Lockdown
restore the system using the principal’s tokens

15. K
 eypad Threat Levels & •  dd global actions for card and PIN, card or PIN, disable the
A
Dashboards reader and add a door grant and configure a dashboard

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 7
0 1 G E T T I N G S TA R T E D

TIME
TOPIC ASSESSMENT
LIMIT

• Add a “Teacher” identity, configure an output and add global


16. Token Trigger Output
actions & linkages to trigger an output with a valid token

•  dd global actions & linkages to turn an output on/off, send


A
17. Door Forced Trigger
an email notification and activate/deactivate a door forced
Output
alarm

•  dd global actions and linkages to unlock the front door


A
18. First Token Unlock
with the first token presented on a schedule

•  dd elevator access levels and apply those access levels to


A
19. Elevator Controls
identities

20. Backup • Configure a USB backup for configuration and transactions

21. Macros • Add a macro

•  dd macros and triggers to turn on an LED whenever


A
22. Triggers
maximum occupancy in an area is reached

23. Interlocks • Configure an input and add interlocks

8 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 1 G E T T I N G S TA R T E D

Access Certifications
Students are able to access their certifications through the Avigilon Training Center.

1. Log in to https://partners.avigilon.com and click


button 1. 1

2. Click tab 2.
2

3. In the Certificates section, click button 3 for the


certificate you would like to view.
ACM TM Installer I Certification
3

4. A new tab will open with the completed


certificate. You can print or save it.

ACM TM Installer I Certification

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 9
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

10 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
KEYPAD READERS

INTRODUCTION Keypad readers allow customers to facilitate access to individuals


by requiring a token or PIN number to access the door or in case of
emergencies, after-hours access or even increased threat level.

Keypad readers further increase security measures.

SCENARIO The principal just added a new keypad reader to the facility and he
wants it to be configured so during school hours teachers can badge
or enter a pin number to access the facility.

System Requirements:
•  uring business hours, individuals will be allowed to present their
D
token or enter a PIN number to access the facility
•  fter hours, they will have to use their token and PIN to access the
A
facility

SOLUTION Complete each of the following steps:


STEPS
1. Configure the schedule.

2. Add the reader.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 11
0 2 K E Y PA D R E A D E R S

KEY PA D RE A D ER S
Configure the Schedule
In this scenario, the school needs two custom schedules: one for normal business hours and another for after
hours and weekends.

1. Click icon 1.
1
2. Click link 2.

3. Click button 3 to add a new schedule.

4. Use the following information to configure two


schedules:
FIELD INFORMATION
Schedule 1
Name Employees M-F
Days Monday - Friday
Active 8:00AM (08:00)
Inactive 5:00PM (16:59)
Schedule 2
Name After Hours/Weekend
5 4
Monday - Friday 17:00 - 23:59
Monday - Friday 00:00 - 07:59
Saturday & Sunday 00:00 - 23:59

5. Click button 5 to save.

12 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 2 K E Y PA D R E A D E R S

Configure the Door


1. Under Physical Access, click tab 1.
1

2. Select your elevator reader and use the


following information for configuration: 3
FIELD INFORMATION
Access Type Single
Door Mode Card or PIN
Offline Door Mode Card or PIN 2
Custom Mode Card and PIN
Custom Schedule After Hours/Weekend

3. Click tab 3.

4. Click button 4 and on the Keypad Decode


dropdown list, select “Indala”. Click save.

NOTE: Depending on the model and manufacturer,


you may need to enable the keypad first and/or
choose an option other than Indala. Consult the
keypad installation instructions for more details.

Create the Access Groups


1. Click tab 1.
2 1
2. Select subtab 2.

3. Click button 3 to add a new access group.


3

4. Use the following information for configuration:


FIELD INFORMATION
Access Group 1
Name Employees M-F
Appliance Workstation XX
Schedule Employees M-F 5 4

Installed Checked

5. Click button 5 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 13
0 2 K E Y PA D R E A D E R S

6. In the following page, highlight the Front Door


and Lab Door and click button 6 to add the
doors as members of Access Group 1.

7. Click button 7 to save the configuration. 6

8. Repeat steps 3 to 7 and use the following


information to add two other access groups.

FIELD INFORMATION
Access Group 2
Principal Access
Name
Group
Appliance Workstation XX
Schedule Employees M-F
Installed Checked
Front Door, Lab Door,
Door Access
Elevator
Access Group 3
Name Keypad Access Group
Appliance Workstation XX
Schedule 24 hours active
Installed Checked
Add the keypad
Door Access
reader (elevator)

Create the Roles


1. Click tab 1. 2 1

2. Select subtab 2.

3. Click button 3 to add a new role.


3

14 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 2 K E Y PA D R E A D E R S

4. Use the following information to configure a role


for the Principal:
FIELD INFORMATION
Role 1 4

Name Principal Role


Parent Leave blank
Start Date Today’s Date
5
Stop Date 01/01/2021
Installed Checked

5. Click button 5 to save.

6. Click tab 6.
6
7. Highlight the Principal Access Group and click
button 7 to make it a member of the role.
8. Click button 8 to save the configuration.
9. Repeat steps 3-8 and use the following 7
information to create a role that will be able to
access the keypad reader:

FIELD INFORMATION
Role 2 8
Name Keypad Role
Parent Leave blank
Start Date Today’s Date
Stop Date 01/01/2021
Installed Checked
Access Group Tab Keypad Access Group

Create an Identity
1
1. Click tab 1.

2. Click button 2.

2
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 15
0 2 K E Y PA D R E A D E R S

3. Use the following information for configuration:

FIELD INFORMATION

Name Tommy Jones


Login principal1
Password Prince123

4. Click button 4 to save.

5. In the Roles tab, highlight the Principal Role and


Keypad Role and click button 5 to make the
identity a member of the role.

6. Click button 6 to save.

7. In the Tokens tab, use the information below to


add 3 tokens. Click button 7 to add additional
tokens.
FIELD INFORMATION
Normal Token:

• Enter the internal number

Token 1 PIN field:


• Enter 1234 and save. This
should only be added to the
Normal Token.
Emergency Token:

Token 2 • Enter the internal number


and enter “Emergency” in the
embossed field
Restore Token:

Token 3 • Enter the internal number


7
and enter “Restore” in the
embossed field
NOTE: The Principal’s Emergency and Restore
tokens will be used in later lessons.
16 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 2 K E Y PA D R E A D E R S

8. Click button 8 to save.

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Monitor Present a token to the keypad


Events reader. Do you have access?

Monitor Enter the PIN followed by #.


Events Do you have access?

During normal hours, presenting the token OR entering the PIN code will grant access. After normal hours,
users will be forced to present their token AND enter their PIN.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Accessories

1. I configured a schedule.

2. I added the reader.

3. I created access groups, roles and an identity.

4. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 17
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

18 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
MUSTERING

INTRODUCTION To help track the location of users in an emergency, the ACM system
offers a Mustering feature. Mustering allows you to create a dashboard
to monitor who has arrived at the muster station and who is still
potentially in danger.

For the purpose of this class, we are only utilizing two readers: the lab
and mustering station (front door). Assume that the school has many
other readers and teachers have been assigned to their own areas with
in/out readers so that you can track the location of people in case of an
emergency.

SCENARIO The school principal wants the ability to utilize ACM for mustering. The
school has readers in the parking lot where the mustering station is
located.

In case of an emergency evacuation, all students and teachers will go


to the mustering station.

System Requirements
•  he principle needs a way to determine who is still in the building in
T
case of an emergency evacuation
•  e also wants to be alerted when there are more than three people
H
in the lab at one time

SOLUTION Complete each of the following steps:


STEPS
1. Create areas for mustering control and set the max number of
people allowed in each area.

2. Assign readers to areas.

3. Create a mustering dashboard.

4. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 19
03 MUSTERING

MUST E RI N G
Add the Areas
1. Click tab 1 2 1
2. Click subtab 2.
3
3. Click button 3.

4. Use the following information to add two area:

FIELD INFORMATION
Area 1
Name Lab Area

Appliance Workstation XX
5 4
Max Occupancy 3
Log Max Reached 3
Enable Area Checked
Area 2
Name Mustering Station
Appliance Workstation XX
Enable Area Checked

NOTE: If there are any fields not covered in the


information tables, leave the settings blank or at
the default.

5. Click button 5 to save.

Create a Mustering Station Using Front Door


Since we have a limited amount of doors and readers on our workstation, we will use the school’s Front Door
as our “Mustering Station.”

1. Click tab 1

2. Click subtab 2. 2 1

20 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
03 MUSTERING

3. Locate your Front Door (MR52 Add 2) and click tab


3. 3
4. For dropdown menu 4, select the Mustering Station
area you configured.

5. Click button 5 to save.

Adding the Lab Door to the Lab Area

1. Click tab 1. 2 1
2. Click subtab 2.

3. Locate your Lab Door and click tab 3.


3 6
4. For dropdown menu 4, select the Lab Area you
configured.

5. Click button 5 to save.

6. Click tab 6.
4

7. In the list of events, find the event “Access


denied - Occupancy limit reached” and click
button 7.
7

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 21
03 MUSTERING

8. In the following page, configure an event with


the following information:

FIELD INFORMATION
Alarm Sound Alert
Instructions LAB MAX reached
Roles Super Admin

9. Click button 9 to save.

Create a Mustering Dashboard


1
1. Click icon 1 and then “Maps”.

2. Click button 2 to add a new map template.

3. Use the following information for configuration:

FIELD INFORMATION
Name Mustering Dashboard
Use Blank Canvas Checked
Re-Size To 800 x 600
4 3
4. Click button 4 to save.

22 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
03 MUSTERING

5. Click button 5 to add the following elements to


the dashboard:
FIELD INFORMATION 5
Title LAB
Title Font Color #ffffff (white)
Title Font Size Medium
Opacity 100%
Location 0x0
Element Type Graphic & Text
Area Group/ Area Lab Area
Graphic Shape Square
Graphic Color #005daa (Avigilon Blue)
Graphic Size 200

6. Press button 6 to save. 6

7. Repeat steps 5 to 6 and use the following


information to add another set of dashboard
elements:

FIELD INFORMATION
Title Mustering Station
Title Font Color #ffffff (white)
Title Font Size Medium
Opacity 100%
Location 225 x 0
Element Type Graphic & Text
Area Group/ Area Mustering Station
Graphic Shape Circle
Graphic Color #455560 (Avigilon Gray)
Graphic Size 200

8. Align the two shapes with each other on the


dashboard and click button 8 to save the
template.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 23
03 MUSTERING

Test the Configuration


Using the table below, access the appropriate tab in ACM, complete the test and describe what happens in
order to verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Click the link to your Mustering


Monitor
Station Dashboard. Present a token
Maps
to the lab reader.

Monitor Present a token to the mustering


Maps station (front door).

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Mustering

1. I created areas for mustering control and set the max number of people allowed in each area.

2. I assigned reader to areas.

3. I created a mustering dashboard.

4. I tested the configuration.

24 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 25
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

26 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ACM VERIFY

INTRODUCTION The ACM Verify function allows authorized users to connect any web
browser-enabled mobile device to ACM and use the device as a virtual
station.

A virtual station controls access to places that does not have access-
controlled doors or locks. E.g. Outdoor mustering stations for fire drills,
buses for school trips or a work area in an open-plan office. People
entering an area controlled by a virtual station must verify they are
authorized to access the area by entering their PIN code on the device.

Identities with the ACM Verify Administrator role add and configure
doors as ACM Verify stations and administer the virtual stations and
paired devices in ACM. They can also administer other doors. Identities
assigned the ACM Verify User role access the ACM Verify functionality
on their mobile devices which act as virtual stations and can pair their
mobile device to ACM.

SCENARIO The school principal wants to set up ACM Verify and add a virtual
station in case of an emergency evacuation. The principal will use a
web browser/ web browser-enabled device to check in teachers’ and
students’ PIN codes once they are safely outside the building.

System Requirements
•  he principal needs a way to check teachers and students in during
T
an emergency evacuation
•  e also needs to add a virtual station and set up users with the
H
correct permissions

SOLUTION Complete each of the following steps:


STEPS
1. Configure principal and teacher user permissions.

2. Add an area.

3. Configure the ACM Verify door.

4. Use ACM Verify to check in identities.

5. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 27
0 4 AC M V E R I F Y

ACM VE RI F Y
Create a New Access Group and User
1. Click tab 1.
2 1
2. Click subtab 2.

3. Click button 3.
3

4. Use the following information to add a new


access group:

FIELD INFORMATION
Name Virtual Station
Appliance Workstation XX
Schedule 24 Hours Active
Installed Checked 4

Door Access <blank> 5

5. Click button 5 to save.

6. To add a new user, click tab 6.

7. Select subtab 7. 7 6
8. Click button 8 to add a new role.

9. Use the following information for configuration:


FIELD INFORMATION
Name Teacher Role
Parent Blank
Start Date Today’s Date
9
Stop Date 01/01/2021
Installed Checked
Access Groups tab Employees M-F, Virtual Station
10
Delegate tab ACM Verify User

10. Click button 10 to save.

28 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 4 AC M V E R I F Y

Edit User Permissions


Since the Principal role has already been created, edit him to include the necessary permissions.

1. Access the Principal Role and click tab 1.

2. Locate Virtual Station and click button 2 to add 1


it to the Members list.

3. Click button 3 to save.


2

4. Click tab 4.

5. Locate ACM Verify Administrator delegation 4


and click button 5 to add it to the Members list.

6. Click button 6 to save.

Add an Area
1. Click tab 1. 2 1
2. Click subtab 2.
3
3. Click button 3 to add a new area.

4. Use the following information to configuration:

FIELD INFORMATION
Name Safe Area
Appliance Workstation XX
Enable Area Checked
5 4
5. Click button 5 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 29
0 4 AC M V E R I F Y

Add a Virtual Station


1
1. Click icon 1.

2. Click link 2. 2

3. Click tab 3.
3
4. Enable check box 4 to install the Avigilon vendor.

5. Click button 5 to save.

6. Click tab 6.

7. Click subtab 7. 7 6
8. Click link 8 to add a new door.

30 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 4 AC M V E R I F Y

9. Create a new door using the following


information:

FIELD INFORMATION
Name Virtual Door
Appliance Workstation XX
Avigilon (Once you select this
Vendor
option, more fields appear.
Installed Checked
ACM Verify
Station Type
Managed
Geographic Select your timezone from the 10 9
Timezone dropdown menu.
Into Area Safe Area
Station
Login
Authentication

10. Click button 10 to save.

11. Access the Virtual Station access group. Locate


the Virtual Door and add it to the Members list.
Save your changes.

Create an Identity 1
1. Click tab 1.

2. Click button 2.

3. Use the following information for configuration:

FIELD INFORMATION
Name Virtual Identity
Roles Tab Add Teacher Role
Internal Number: 1
Tokens Tab
PIN: 0000
Photos Tab Add a photo
4
4. Click button 4 to save.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 31
0 4 AC M V E R I F Y

Test the Configuration


Use the following instructions and describe what happens in order to verify that you set up the configuration
correctly.

1. Log into ACM as the Principal:


• Username: principal1
• Password: Prince123 2
2. From the Virtual Door’s Edit tab, click Link to
Virtual Station.

3. Enter the pin for the Virtual Identity (0000). What


happens?

4. Log back into ACM as the administrator. After


verifying the identity, what happens under
Monitor > Events tab?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

ACM Verify

1. I configured principal and teach user permissions.

2. I added an area.

3. I configured the ACM Verify door.

4. I used ACM Verify to check in identities.

5. I tested the configuration.

32 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 33
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

34 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ANTI-PASSBACK

INTRODUCTION APB is a feature that requires an identity to exit an area before entering
another area.

 o track APB, a reader must be installed on both the inside and the
T
outside of the area entry. Users are required to use their token to enter
and exit the area

For example, a typical parking lot user would normally present their
token at the “in” reader to enter the lot and present it at the “out”
reader to exit the lot. However, if a user presents their token at the
“in” reader and passes the token back to a friend, the token would be
denied access the second time when the friend presents it.

 here is also an expanded version of the APB feature called regional


T
anti-passback, which establishes an additional set of rules. A token
must be used at the “in” reader of an exterior area’s entrance before it
can be used at any readers on the interior.

NOTE: This feature currently applies to Mercury Security hardware.


There are other APB options for HID panels.

SCENARIO The school principal wants to secure utilization of the school lab and to
know who is in the lab at all times.

 PB will be utilized, so individuals will be forced to present their token


A
in order to exit the lab, otherwise they will not be allowed back in.

System Requirements
•  nsure that users have to present their tokens in order to enter and
E
leave the lab

SOLUTION Complete each of the following steps:


STEPS
1. Add an area.

2. Configure door operations.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 35
0 5 A N T I - PA S S B AC K

ANT I -PAS SBAC K


Add an Area
Previously, you added the lab area as part of a Mustering Station. We will need to use the lab area, as well as
another “Main Area” in order to configure APB.

1. Click tab 1.

2. Click subtab 2. 2 1
3. Click button 3 to add a new area.
3

4. Use the following information to configuration:

FIELD INFORMATION
Name Main Area
Appliance Workstation XX
Enable Area Checked
5 4
5. Click button 5 to save.

Configure Door Operations


Once you have established the areas included in APB, you need to configure the door operations. Since we
have a limited number of readers, we will use the Lab Door as “Lab In” and the Front Door as “Lab Out.”

1. Locate your Lab Door and click tab 1.


1
2. In dropdown menu 2, select Hard area APB.

3. In dropdown menu 3, select Lab Area.

4. Click button 4 to save.


2
5. Repeat steps 1 to 4 using the following
3
information:

FIELD INFORMATION
Door Front Door
APB Mode Hard Area APB
Into Area Main Area 4

NOTE: See “Anti-Passback Modes” on page 168


for additional options.
36 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 5 A N T I - PA S S B AC K

APB Reset
In the event of an emergency, all the people in a building may leave an area at once and arrive at a mustering
area together without using their access card at each door they encounter. This may cause the system to
detect multiple anti-passback conditions. To avoid granting each individual a free pass, you can reset the anti-
passback condition for the panel.

1. Click tab 1.

2. Click subtab 2 and select your EP1501 controller. 2 1

3. Click button 3 to reset APB.


3
NOTE: You can also reset the entire appliance.
• Under Setup & Settings, click Appliance
• Click APB reset

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Monitor Present a token to the “Lab In” reader


Events (lab). What happens?

Monitor Present the same token to the reader


Events again. What happens this time?

Monitor Present the same token to the “Lab Out”


Events reader (front door). What happens?

NOTE: Before moving on, remember to go back into the Door Operations tab and disable the APB Mode. This
will prevent issues from occurring in other lessons.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Anti-Passback

1. I added an area.

2. I configured door operations.

3. I tested the configuration.


© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 37
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

38 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
DELEGATIONS

INTRODUCTION The delegation feature allows administrators to control what a user can
do and see in the system.

A Super Admin account is necessary in order to configure delegations.

SCENARIO The school principal needs to restrict the secretary’s access to the ACM
system.

System Requirements:
• The secretary should have access to the Identities tab
•  he secretary needs the ability to assign a role to other users, but all
T
other features should be disabled

SOLUTION Complete each of the following steps:


STEPS
1. Add a delegation.

2. Create a role and apply the delegation.

3. Create an identity and apply the role.

4. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 39
0 6 D E L E G AT I O N S

DEL E GAT I O N S
Add a Delegation
1. Click tab 1. 2 1

2. Click subtab 2. 3
3. Click button 3 to add a new delegation.

4. Use the following information for configuration:


FIELD INFORMATION
Name Secretary
Identities Date Search
Identities Delete
Identities Edit
Identities Listing
Identities Roles List 5
Delegation Members 4
Identities Roles Update
Identities Show
Identities Update
System Summary Listing
Tokens Listing

5. Click button 5 to save.

Create a Role and Apply the Delegation


1. Click tab 1. 2
1

2. Click subtab 2.

3. Click button 3 to add a new role.


3

40 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 6 D E L E G AT I O N S

4. Create a new role with the following information:


FIELD INFORMATION
Name Secretary
Parent Blank
Start Date Today’s Date
Stop Date 01/01/2021
Installed Checked
Access Groups tab Employees M-F 5 4
Delegate tab Secretary

5. Click button 5 to save.

Create an Identity and Apply the Role


1
1. Click tab 1.

2. Click button 2.

3. Create a new identity with the following


information:

FIELD INFORMATION
Name Jane Smith
Login Secretary
Password Secret123
Roles tab Secretary
4
Enter the internal number from
Token tab
one of your tokens

4. Click button 4 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 41
0 6 D E L E G AT I O N S

Test the Configuration


Log out of the appliance and log back in with the Secretary account you created. Using the table below,
access the appropriate tab in ACM, complete the test and describe what happens in order to verify that you
set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Search for the Principal’s token. What happens


Identities
when you click on this tab?

Monitor
Do you have access to this tab?
Alarms

Present a token to the reader. What do you


Monitor
see?

If you try any other part of the system, you should receive similar error messages.

NOTE: Remember to log back in with the Super Admin account when you are finished.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Delegations

1. I added a delegation.

2. I created a role and applied the delegation.

3. I created an identity and applied the role.

4. I tested the configuration.

42 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 43
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

44 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
LIMITING ROLES

INTRODUCTION The ACM system allows administrators to limit the ability of a local
system administrator to assign roles to other users.

SCENARIO The school principal wants the secretary to add users to the system,
but he wants to limit her to only assigning school access from 8AM to
5PM on weekdays.

System Requirements:
• Standard employee with access from M-F 8AM-5PM
• Limit the secretary’s ability to assign permissions

SOLUTION Complete each of the following steps:


STEPS
1. Create a limited role.

2. Assign the role to the secretary identity.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 45
07 LIMITING ROLES

L IMI T I N G ROLE S
Create Roles
1. Click tab 1. 2 1

2. Click subtab 2.

3. Click button 3 to add a new role.


3

4. Using the following information for configuration:

FIELD INFORMATION
Name Employees M-F
Parent Blank
Start Date Today’s Date
Stop Date 01/01/2021
Installed Checked
Access Group Tab Employees M-F 5 4

5. Click button 5 to save.


6. Repeat steps 1 to 5 using the following
information. This next role allows an Admin user
(in this case, the school secretary) to assign roles
to other users.

FIELD INFORMATION
Assign Only Weekday
Name
Access
Parent Blank
Start Date Today’s Date
Stop Date 01/01/2020
Installed Checked
Access Group Tab Employees M-F
Asgn Roles Tab Employees M-F role

46 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
07 LIMITING ROLES

Edit an Identity and Assign the Role


Since we previously created the Secretary identity (Jane Smith), we can edit the existing information. This step
allows the user to assign only the weekday role to other users.

1. Access Jane Smith’s account information. Click 1


on tab 1 and add Assign Only Weekday Access
role.

2. Click button 2 to save.

3. We will also need an identity for the Secretary to


assign access to. Create another identity using
the following information:
• Name: Will Turner
• Login: Teacher1
• Password: Teach123 2

Test the Configuration

STEPS

1. Log out of the appliance and log back in with the Secretary account you created in the previous section.

2. Select the Teacher identity, Will Turner.

3. If you set this configuration up correctly, in the Roles tab, you should see “Employees M-F” as the only
available role that you can assign.

NOTE: When the secretary creates new identities, she can only assign the “Employee M-F” role to the
cardholders. If needed, you can assign other roles to her by entering more roles under the “Asgn Roles” tab
under Roles. Remember to log back in with your Super Admin account when you are finished.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Limiting Roles

1. I created a limited role.

2. I assigned the role to the secretary identity.

3. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 47
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

48 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
GROUPS

INTRODUCTION The ACM system allows administrators group hardware or system


components. The makes it easier for administrators to perform tasks
such as: batch updates, override settings and monitor specific event
types through routing groups.

SCENARIO The school principal wants group the Front Door and Lab Door
together so that a template batch update can easily be configured,
when necessary.

SOLUTION Complete each of the following steps:


STEPS
1. Create a group.

2. Assign components.

3. Perform a template batch update.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 49
08 GROUPS

GROU P S
Introduction
The groups feature allows you to group hardware components like cameras, doors, etc. and/or system
components such as identities, roles, etc. Groups are useful for various functions, including:
• Applying identity profiles to many people at a time using the batch update feature.
• Applying door templates to many doors at once using the batch update feature.
• Enabling operators to monitor specific event types and hardware components through routing
groups.
• Assigning policies to override settings on a group of hardware components.

Add a Group and Assign Components


1. Click tab 1. 2 1

2. Click subtab 2. 3
3. Click button 3 to add a new group.

4. Use the following information for configuration:

FIELD INFORMATION
Name Door Group 6

5. Click button 5 to save.


6. Select tab 6. 4

7. In this tab, use the following information to add


components to the group:

FIELD INFORMATION
Type Door
Members List Lab Door, Front Door
7
NOTE: If there are 10 or more entries in the list in
the Available window, a standard Search will be
displayed and can be used to narrow the list. If
there are more than 2000 entries then an Advanced
Search will be displayed to enable you to narrow
the list.
8
8. Click button 8 to save.

50 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
08 GROUPS

Template Batch Update


The Batch Update feature on the Roles page allows you to assign an identity profile to a group of identities, or
a door template to a group of doors from the same manufacturer. This is useful for applying new or modified
standard settings to a group of identities or doors.

NOTE: If pop-ups blockers are enabled in your web browser, there is a risk of losing a door template batch
update report. When a door template batch update is performed on a group of doors, a report is generated
that you can save to your local system. If pop-ups from the ACM client are blocked by your web browser, the
report cannot be saved. Your web browser will notify you that the pop-up is blocked, and offer you the option
to unblock the pop-up.

Perform a Template Batch Update


1. Click tab 1. 2 1

2. Click subtab 2.

3. Click button 3 to perform a batch update on


Door Group. 3

4. In the following dialog box, select the door


template that you want to apply to members of
this group and click button 4.

NOTE: Only the identity profiles or door templates


previously defined by the system will appear in
the drop-down list. If your system does not have 4
any door templates, access the ACM Help files
and search Door Templates - Add Page for more
information.

5. A notification dialog box indicates that all


members in the Door Group will now have the
field values defined by the door template.

Delete a Group
1. Click tab 1. 2
1
2. Click subtab 2.

3. (Do not complete). Click button 3 to delete the


group. 3
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 51
08 GROUPS

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Groups

1. I added a group and assigned components to it.

2. I learned how to perform a template batch update for doors.

3. I learned how to delete a group.

52 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 53
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

54 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
POLICIES

INTRODUCTION Policies can be used to override settings on a group of doors, inputs


and outputs. This feature is useful if administrators want to quickly
change security settings on many components or do a full system
lockdown.

SCENARIO The school principal has been informed that the card readers for the
Front Door and Lab Door are malfunctioning and will not grant access
when card tokens are presented. As he investigates this issue, he
would like to create a policy that will temporarily override the door
mode for the Front Door and Lab Door so that staff can continue to
enter freely using a PIN.

System Requirements:
•  reate a policy that will override the Front Door and Lab Door’s door
C
mode from Card Only to PIN Only.

SOLUTION Complete each of the following steps:


STEPS
1. Add a policy.

2. Assign policy to doors.

3. Test the policy

4. Delete the policy.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 55
09 POLICIES

POL I C I E S
Managing Policies
You can use policies to override settings on a group of doors, inputs, and outputs. This feature is useful if you
want to quickly change security settings on many components or do a full system lock-down. It may also be
used for a permanent application to ensure proper and uniform setup of doors.

In the case of a conflict between an object and the policy applied to it, the policy will win and override the
setting. For example, if a door has a door mode of “Card Only” and a policy sets a door mode of “Unlocked”,
the door will be unlocked. In the event that multiple policies are applied to an object and there is a conflict
between polices, the newest policy will apply.

Add a Policy
1. Click tab 1. 2 1
2. Click subtab 2. 3
3. Click button 3 to add a new policy.

4. S
 elect the hardware types that you want to
override. Use the following information for 6
configuration:

FIELD INFORMATION
4
Name Door Policy
Installed Checked
Door Checked 5

5. Click button 5 to save.


6. Select tab 6.

7. In this tab, change the Door Mode dropdown to


PIN Only. This will override the settings for doors
that are connected to a Mercury Security panel.

NOTE: Both the Lab Door and Front door should


currently be configured as Card Only. To double 7
check, go to Physical Access > Doors > Lab Door/
Front Door.

8. Click button 8 to save.

8
56 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
09 POLICIES

Assign a Policy to Doors


Now that you have added a policy, you can associate it with the objects that you want it applied to which is
done through Groups.

1. Click tab 1.

2. Click subtab 2. 2
1
3. Select Door Group.

4. Click tab 4.

5. Select Door Policy and click button 5 to add it to 4


the Members List.

NOTE: While it is possible to add multiple policies to


a group, good practice is to just do one policy per
group to reduce chances of unexpected changes 5
and interactions in the system.

6. Click button 6 to save.

Test the Configuration


2
1. Click tab 1. 1

2. Click subtab 2. 1
3. Under column 3, the Front Door and Lab Door
should now be configured as PIN Only to reflect
the policy override. 3

NOTE: If you are unsure whether a policy is applied,


or which policy is changing a value for a door, input
or output, go to that door, input or output and click
“Show Policy” located at the bottom of the page.
This will show a report for the object, what its
settings are, and what policies are applied.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 57
09 POLICIES

Using the table, complete the test and describe what happens in order to verify that you set up the
configuration correctly.

TEST DESCRIBE WHAT HAPPENS

Present the card token to the front door and lab


door reader. Is your access granted or denied?

Delete a Policy
1. Click tab 1. 2 1
2. Click subtab 2.

3. Click button 3 to delete the policy.


3

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Policies

1. I added a policy.

2. I assigned a policy to the Door Group.

3. I tested the policy.

4. I deleted the policy.

58 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 59
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

60 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ROUTING GROUPS

INTRODUCTION Routing groups associate event types with groups to allow certain
users to monitor specific event types and components during a
specified time interval.

 he user will only be able to view the event types that are generated
T
by members of the specified groups.

SCENARIO The school principal wants to limit the security guard’s visibility to the
system by only allowing him to see events related to the front door of
the school.

System Requirements:
• Security guard only sees events for the front door
• Invalid credentials, Door Held and Door Forced events
• Principal can see all events

SOLUTION Complete each of the following steps:


STEPS
1. Add a routing group for the security guard.

2. Apply the routing group to the security guard identity.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 61
10 ROUTING GROUPS

ROU T I N G G R O UP S
Add a Delegation
Before we can create the routing group, we need to add a delegation with permissions for the Security Guard.

1. Click tab 1.

2. Click subtab 2. 2 1
3. Click button 3 to add a new delegation. 3

4. Use the following information for configuration:


FIELD INFORMATION
Name Security Guard
Alarm Monitor Acknowledge
Alarm Monitor Clear
Alarm Monitor Identity
Alarm Monitor Listing
System Summary Listing 5 4
Delegation
Members Doors Event List
Doors Grant
Doors Listing
Doors Show
Doors Show Access
Doors Show Status

5. Click button 5 to save.

62 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
10 ROUTING GROUPS

Edit the Security Guard Role


Since the Role and Identity for the Security Guard have been pre-created, we will edit the information that
already exists in the system.

1. Locate your Security Guard. Make sure the guard 2


only has access to the front door.
Security Guard
2. Access your Security Guard role and click the
tab 2. Add the “Security Guard” delegation to
the Members list and save.

3. Click subtab 3.

4. Click button 4 to create a new group. 3

5. Use the following information for configuration:

FIELD INFORMATION 7
Name Guard
Type: Door
Members tab
Members: Front Door

6. Click button 6 to save. 6

7. Click tab 7 and then “Add a Routing Group”.

8. Use the following information for configuration:


FIELD INFORMATION
Name Security Guard
Schedule Security Schedule
Appliance Workstation XX
Installed Checked
9 8
9. Click button 9 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 63
10 ROUTING GROUPS

10. Click back into your routing group and click 10 11


tab 10. Add the following event types to the
members list:
• Door held open
• Forced door
• Invalid credential
11. Save your changes and then click tab 11.

12. Add the “Guard” group to the Members list.

13. Access the Security Role and click tab 13. Add 13
“Security Guard” to the Members list.

14. Click button 14 to save.

14

Test the Configuration


Using the table below, access the appropriate tab in ACM, complete the test and describe what happens in
order to verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Monitor Present a valid and invalid badge to a reader.


Events Force a door open. Hold a door open.

Manually log out and log back in with the


Monitor Security Guard’s account. Complete the same
actions from the step above.

64 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
10 ROUTING GROUPS

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Routing Groups

1. I added a routing group for the security guard.

2. I applied the routing group to the security guard identity.

3. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 65
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

66 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
USER TRACE

INTRODUCTION The trace feature allows for individual identity tracking as they present
their tokens to readers.

SCENARIO The principal wants to receive an alert when a particular teacher arrives
at the school.

System Requirements
•  eeds the ability to track a particular individual upon arriving at the
N
school
• Send an email alert to the principal for individual tracking

SOLUTION Complete each of the following steps:


STEPS
1. Configure a card trace event.

2. Trace a particular identity.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 67
1 1 U S E R T R AC E

U SE R T RAC E
Configure Card Trace Event
1. Click tab 1. 1
2
2. Click subtab 2.

3. Locate the Card Trace event and click the link.

4. Use the following information to edit the event:

FIELD INFORMATION
“Operator, contact school principal
Instructions
and report this user onsite”
Your Email Address (if email
Email
notifications have been set up)
Super Admin

Roles NOTE: Normally, you would select the


role that is assigned to see this type of
alarm (operator, school admin, etc.)
5
5. Click button 5 to save.

Trace an Identity
Now that you have the event configured, we need to apply this to an identity. Access the Identities page in
your ACM system and complete the steps.

1. Select one of your identities to trace. (You can


also create a new one if you prefer.) 2

2. Click tab 2 and enter the internal number from


one of your tokens.

3. Make sure to select checkbox 3 and save.

68 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 1 U S E R T R AC E

Configure a Door Event


Similar to the last lesson, we will configure the door event. However, this time we will use the Card Trace
event. Complete each of the steps on your workstation.

1. Locate your Front Door (MR52 Add 2) and click tab 1


1.

2. Find the Card Trace event and click button 2.

3. Use the following information for configuration:

FIELD INFORMATION
“Operator, contact school principal
Instructions
and report this user onsite”

Roles Super Admin

4. Click button 4 to save.

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Present the token to the front door reader.


Monitor
Is the event visible? If email notifications
Events
are setup, did you receive an email?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

User Trace

1. I configured a card trace event.

2. I traced particular identity.

3. I tested the configuration.


© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 69
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

70 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
USER DEFINED FIELDS

INTRODUCTION The Identities feature is the part of the system where administrators
define and store information about each user.

 he ACM system allows you to create user defined fields in order to


T
increase the system ability to store customer-specific information.

SCENARIO The school principal would like to store some additional information
that is not currently present in the standard ACM fields. He would like
three tabs containing various information.

System Requirements:
• Emergency Tab
• Vehicle Tab
• Personal Info Tab

SOLUTION Complete each of the following steps:


STEPS
1. Add user defined fields.

2. Add user defined tabs.

3. Add fields to tabs.

4. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 71
12 USER DEFINED FIELDS

U SE R DE F I N ED F I E LD S
Add User Defined Fields 1
1. From the setup links, click icon 1.

2. Click link 2.

3. Click button 3.

4. Use the following information to create 8 user


defined fields. Each one will be a string field.

FIELD INFORMATION
Emergency Contact Name
Emergency Contact Number
Model
Make 5
Name
License Plate
Cell Phone
Certification Level
Home Address

5. Click button 5 to save.

72 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
12 USER DEFINED FIELDS

Add User Defined Tabs

1. Click tab 1. 1
2. Click button 2.

3. Use the following information to create new tabs:

TAB NAME MEMBERS


Emergency Contact Name,
Emergency
Emergency Contact Number
Vehicle Model, Make, License Plate
Certification Level, Cell Phone,
Personal Info
Home Address

4. Click button 4 to save.


4 3

Test the Configuration

ACM TAB TEST DESCRIBE WHAT HAPPENS

Search for any identity. Do you see


Identities the tabs you created? Where are the
fields you created?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

User Defined Fields

1. I added user defined fields.

2. I added user defined tabs.

3. I added fields to tabs.

4. I tested the configuration.


© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 73
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

74 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
SYSTEM INTEGRATION

INTRODUCTION The Avigilon system integration allows you to achieve a unified security
system. An Access Control Manager appliance can be integrated into
an Avigilon Control Center site so that the events occurring in the ACM
software can trigger rules in the ACC software to initiate action.

SCENARIO The principal would like the cameras to start live streaming when
front door access is denied after hours. With this setup, the night time
security guards can see who is attempting to access the stadium after
hours.

System Requirements:
• Unified ACC ACM
• SHA-256 Fingerprint ID

SOLUTION Complete each of the following steps:


STEPS
ACM

1. Create delegation for interacting with ACC.

2. Create routing group for working with ACC.

3. Create role to allow communication between ACM and ACC.

4. Create dedicated identity for ACC interaction.

ACC

1. Connect to an ACM Appliance with IP address.

2. Confirm SHA-256 fingerprint ID.

3. Import ACM roles.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 75
1 3 S Y S T E M I N T E G R AT I O N

ACC / ACM I N T E G R AT I O N
Introduction
An ACM appliance can be integrated into an ACC site so that events occurring in the ACM software can
trigger rules in the ACC software to initiate actions. For example, door events in the ACM software can trigger
a rule that allows an ACC operator to grant door access, or an input event from a panic button or motion
sensor in the ACM software can trigger a live camera feed, or video recording.

Set up ACM for Integration


Before an ACM appliance can be added to an ACC site, there are several configuration steps required in the
ACM software. The steps outlined below from are simply listed as a reference.

ACM Setup
1. Create a delegation for interacting with ACC.

2. Create a routing group for working with ACC.

Steps 3. Create a role to allow communication between


ACC and ACM.

4. Create a dedicated identity for ACC interaction.

Create a Delegation for Interacting with ACC ACM

1. Select tab 1.

2. Click subtab 2. 1
2
3. Click button 3 to create a new delegation for
integrating with the ACC software.
3

76 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N

4. Use the following information to complete the


fields below:

FIELD INFORMATION

Name ACC ACM Integration Delegation

Partition If applicable
4
Appliance Listing
Delegations Listing
Doors Grant
Doors Listing
Identities Listing
Identities Login - Remote
Members Identities Photo Render 5
Inputs Listing
Panels Listing
Partitions List
Roles Listing
Subpanels Listing
System Summary Listing

5. Click button 5 to confirm.

Create a Routing Group for Working with the ACC Software ACM

1. Click subtab 1. 1
2. Click button 2 to create a new routing group.
2

3. Use the following information to fill in the fields:

FIELD INFORMATION

ACC ACM Integration


Name
Routing Group

Schedule 24 Hours Active

Schedule Qualifier Appliance


4
Installed Checked

Partitions If applicable

4. Click button 4 save.


© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 77
1 3 S Y S T E M I N T E G R AT I O N

5. Select the new Routing Group and click subtab


5.
5
6. Add the following event types to the routing
group:

FIELD INFORMATION

Door held open


6
Forced Door
Intrusion
Invalid Credential
Members 7
Maintenance
System
Tamper
Valid Credential

7. Click button 7 to confirm.

Create a Role that Allows Communication between ACC and ACM ACM

1. Click subtab 1.
1
2. Click button 2 to create a new role.
2

3. Use the following information to complete the


fields below:

FIELD INFORMATION

Name ACC ACM Integration Role

Parent Default

Start/ Stop Date Default 4

Installed Checked

Partitions If applicable

4. Click button 4 to save.

78 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N

5. Click subtab 5 and assign only the delegation


that was created in preceding steps.
5
6. Click button 6 to save.

7. Click subtab 7 and assign only the routing group


that was created previously.
7
8. Click button 8 to confirm.

NOTE: If you plan to import Active Directory users


through ACM, configure remote authentication for
external domains.

Create an Identity for Interacting with ACC ACM

To protect the security of the connection between the ACM and ACC systems, the dedicated identity should
only have the permissions outlined in this procedure.

1. Click subtab 1. 1
2. Click button 2 to create a new identity.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 79
1 3 S Y S T E M I N T E G R AT I O N

3. Use the following information to complete the


fields in the Identity Information and Account
Information sections:

FIELD INFORMATION

Name Tim Jones

ACC ACM Integration


Login
Identity

Password AVO2019!

Inactivity Timer Indefinite

4. Click button 4 to save identity.

5. Click subtab 5 and assign only the role that was


created in preceding steps. 5
6. Click button 6 to save.

80 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N

Configure ACC for Integration


Connect an ACM appliance to your site and you can link doors controlled by the appliance to cameras
controlled by the ACC software. After doors and cameras are linked, you can configure rules that are triggered
by doors in the ACC software.

ACC Setup 1. Connect to an ACM Appliance with IP address.

2. Confirm SHA-256 fingerprint ID

Steps 3. Import ACM roles.

Connect to an ACM Appliance ACC

2
1. Login to ACC software using the workstation
cards and credentials provided by the instructor.

2. From the Site Setup tab, select button 2.

3. Use the following information to complete the


fields in the dialog box:

FIELD INFORMATION

Hostname IP address of your ACM appliance

Port 443
4
Username ACC ACM Integration Identity

Password AVO2019!

4. Click button 4 to connect to the ACM appliance.

5. In the Untrusted New Site dialog box, click


button 5 to confirm the ACM appliance.

NOTE: You can go back to your ACM appliance >


Setup and Settings > Appliance > SSL Certificate
to check that the ACC fingerprint ID matches the
one on your ACM appliance.
5

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 81
1 3 S Y S T E M I N T E G R AT I O N

6. The ACM appliance should now be listed in


ACC’s System Explorer under the site name.

Import ACM Roles ACC

To provide users with control over doors, you must import roles from the ACM application. When you import a
role, you are also importing all the identities that are assigned to the role.

Imported roles can be edited like any existing group in the ACC Client software. You can assign a rank,
feature privileges, and device access rights to the imported role. However, be aware that you cannot assign
users to the role from the Client software.

Imported identities can be added to any existing group in addition to the role they were imported with.
Imported identity information, including login credentials, is maintained by the ACM application. In the ACC
Client software, you can only disable an imported user or configure the user’s Login Timeout settings.

1. From the Site Setup tab, select button 1.


1

2. Click tab 2.

3. Select checkbox 3 to enable External Directory. 2


3
4. In dropdown list 4, choose Avigilon Access
Control Manager. If a dialogue box pops up, 4
click Yes.

NOTE: If you previously imported Active Directory


users, adding ACM Identities will disable them.
You can still import users by configuring remote 5
authentication from external domains in the ACM
application first.

5. If “Integrator” is not automatically added to box


5, complete steps 6 to 9 below.

6. Click button 6.
6

82 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N

7. In the dialog box, select Administrator in


dropdown list 7. 7

8. Click button 8 to confirm.

NOTE: You can edit the permissions for the group


8
later.

9. Select ACC ACM Integration Role and click


button 9 to confirm.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 83
1 3 S Y S T E M I N T E G R AT I O N

Configure ACC to Trigger Rules

Link Doors to Cameras ACC

Door Setup
Doors can only be linked if they:

1. Are installed and connected to installed panels

Steps
or subpanels.

2. Have a valid, non-blank access type.

1. Access ACC’s Site Setup tab and select your


ACM Appliance from the System Explorer.

2. Click button 2.
1
2

3. Select button 3.

4. In the following dialog box, select Lab Door from


dropdown list 4.
4
5. Select any camera from dropdown list 5.
5
6. Click button 6 to save.

84 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N

Add Rule for ACM Appliance Event ACC

1. From the Site Setup tab, select button 1. 1

2. Click button 2.

3. In list 3, select Door Access Granted as the


event that will trigger the rule.

NOTE: You can click on the blue underlined text to


further define the event.

4. Click button 4.
3

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 85
1 3 S Y S T E M I N T E G R AT I O N

5. In list 5, select Start Live Streaming. Select the


blue underlined text to further define the event.

6. Click button 6 to continue.

7. Click “Next” to bypass the Digital Events page.

8. Use the following information to complete the


fields below:

FIELD INFORMATION

After Hour Door Access


Rule Name
Granted

Start live streaming video


Rule Descriptor when lab door access is
granted after hours

Schedule Always
9
Rule is Enabled Checked

9. Click button 9 to save.

86 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N

Test ACC/ACM Integration ACM ACC

1. Login to ACM using the integrator identity:

2
FIELD INFORMATION 3
Username ACC ACM Integration Identity

Password AVO2018!

2. In ACM, click tab 2.

3. Select subtab 3.

4. Select the door previously linked and click


checkbox 4.

5. Click button 5. 5

6. Select tab 6 to manually grant access.


6
If configured correctly, the ACC software should
start live streaming.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

System Integration

1. I connected ACC to an ACM appliance.

2. I imported ACM roles.

3. I linked doors to cameras on ACC.

4. I added a rule for an ACM door grant access.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 87
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

88 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
COLLABORATIONS

INTRODUCTION Collaborations allow the ACM system to exchange data with third party
databases and applications.

Possible functions include:


•  ulling identity information from an external database to populate
P
identity fields in the system
•  ushing events from the system to third party applications such as
P
video management software

SCENARIO The principal needs to import identity information from a third party
system that can generate a CSV file.

System Requirements:
• Import first/last name and employee number
• One time import

SOLUTION Complete each of the following steps:


STEPS
1. Create and import a CSV file.

2. Run a collaboration.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 89
1 4 C O L L A B O R AT I O N S

COL L ABO RATIO N S


Create the CSV File
1. Open excel and create a document with the
following information:

External System ID Last Name First Name


12345 Smith Jon
54321 Young Lisa
56789 Lewis Jake

NOTE: The file needs to be formatted as shown, If


the headers are not named properly, the file will not
import. A list for all available fields can be found on
the Avigilon Support page.

2. S
 ave the file as CSV (comma delimited). If you
see a pop up message about losing some
features of the workbook, click yes to proceed.

Import the CSV File


1. From thesetup links, click link 1.

2. Click button 2.

3. Use the following information for configuration:

FIELD INFORMATION
Name CSV Import
Appliance Workstation XX
Type Identity CSV one-time Long Format
Installed Checked
Delimiter , (comma)
File Your saved CSV File
4 3
4. Click button 4 to save the collaboration.

90 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 4 C O L L A B O R AT I O N S

Run the Collaboration


1. Under the Collaboration page, click button 1 run
the import process.
1
2. O
 nce you run the collaboration, you will see
a screen indicating how many records were
imported.

NOTE: In the collaboration log page, if the skipped


records are 0, this indicates the import process will
run properly.

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Search for the identities you just Click in one of the records and you should see that only three
Identities
imported, What information can you fields were imported: Last name, First name and External
Search
see about them? System ID.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Collaborations

1. I created and imported a CSV file.

2. I ran a collaboration.

3. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 91
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

92 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
OVERRIDES

INTRODUCTION Use overrides to apply a temporary one-time change to the normal


door mode of a selected set of doors.

Possible schedules:
• Take effect immediately
• Configured in advance

SCENARIO During the week of parent-teacher interviews, the principal would


like to change the front door access to Facility Code Only in order to
provide better access for those coming in and out of the school.

System Requirements:
• Overrides can only be added to doors that users are authorized to
access and are on the same ACM server.
• Overrides are only supported on Mercury panels using firmware
1.27.1, or later.

SOLUTION Complete each of the following steps:


STEPS
1. Identify the purpose of overrides.

2. Add an override.

3. Identify how to edit and delete an override.

4. Test the configuration.

5. Identify how to use maps to monitor overrides.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 93
15 OVERRIDES

OVE RRI DE S
Introduction
Overrides can be used to apply a temporary one-time change to the normal door mode of a selected set of
doors. They can be scheduled to take effect immediately, or in advance. When an override ends, the door(s)
returns to the mode they are supposed to be in according to their schedule at that time.

NOTE: Overrides are only supported on Mercury panels using firmware 1.27.1, or later.

Discussion
What are some scenarios in which overrides would be beneficial?

Override Priorities
Override functionality is designed to work best with your regular door schedules. Overrides have a medium
priority-level in the ACM priority hierarchy and many higher-priority actions take precedence. For example, a
manual command to a specific door, or a priority lockdown command to a set of doors, takes precedence. If a
priority lockdown occurs while an override is in effect, the priority lockdown becomes active. After the priority
lockdown has been cleared by the Priority ACM Operator, the override becomes active on the doors if it is still
in effect; otherwise, each door returns to its regular schedule for that time.

An override starts and ends at the beginning of the minute of its scheduled time. Therefore it always overlaps
or matches the start or end time of a regular schedule or override when the end time of one is the same as
the start time of the other.

Override Accessibility
You can only add an override to doors you are authorized to access that are on the same ACM server.
However, you can modify or delete any override, and your changes will apply to all the doors in the override,
including doors you are not normally authorized to access. If partitioning is used in your ACM system and
you expect users authorized for specific partitions to modify an override, define individual overrides for each
partition rather than a single override that spans multiple partitions. Otherwise, users can modify overrides
that affect doors they cannot see and be unaware of any changes.

94 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 5 OV E R R I D E S

Add an Override
1. Click tab 1. 2
1
2. Click subtab 2. The Door Listing page is
displayed.
3
3. Check Front Door and click button 3. The
Override dialog box is displayed.

4. Use the following information for configuration:

FIELD INFORMATION
Parent Teacher Interview: Unlock
Name
Front Door
Facility Code Only 4

NOTE: The Pin Only and Card or


Door Mode Pin door modes are not available
if the Allow duplicate PINs option
has been selected.
Select Now

NOTE: The date and time the


override is active is based on the
settings at the controller panel
for the doors, not the ACM server.
If your ACM server is in a time
Start Date zone ahead of the time zone of
your ACM client and the doors
and panels you control, you may 5
see an error message that the
override occurs in the past. You
can ignore this error message
if your settings in the local time
zone are correct.
Select the date one week from
End Date
“now”.
Change front door access to
Note Facility Code Only during week of
parent-teacher interview.
Partition None

5. Click button 5 to save.

6. A pop-up dialog box will confirm that the


override has been created successfully. Click
button 6 to confirm. 6

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 95
15 OVERRIDES

Edit or Delete an Override


1. Go to Physical Access > Doors.

2. The total number of defined overrides is 3


displayed as “Overrides: X”. Also, a blue disk
is displayed in the Override column to indicate
whether overrides are defined for the door. The
disk has two states:
2
• An override is currently active.
• An override is defined, but not active.
An inactive override can be an
override that has been completed but
not deleted, or an override that has
not yet started.

3. Click link 3 to open the Doors: Overrides page.

4. To modify an override, click on the override


name as shown in column 4.

5. (Do NOT Complete). To delete an override, click


button 5.
4 5
TIP: Overrides are not recurring. For almost all
purposes, an override should be deleted as
soon as it has ended as there is a maximum of
100 overrides per panel.

Test the Configuration


Present your front door token to a reader. Are you able to gain access? Why or why not?

96 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 5 OV E R R I D E S

Monitor Overrides
Maps can be used to monitor overrides on doors. When a door that is displayed on a map is included in an
override, the status indicator for the door is updated to display a blue disk. See below for an example:

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Overrides

1. I identified the purpose of overrides.

2. I added an override.

3. I identified how to edit and delete an override.

4. I tested my override configuration.

5. I identified how to use maps to monitor overrides.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 97
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

98 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
EMERGENCY LOCKDOWN

INTRODUCTION Global actions are a powerful feature of the ACM system and can
provide custom setup where customers require a specific functionality.

They allow you to perform one or more actions simultaneously at a


large number of doors connected to more than one panel. These
actions can be triggered in three ways:
• Manually, from the Global Actions Listing page
• By schedule, configured from the Global Actions Listing page
• Automatically, when used in a Global Linkage

SCENARIO The school principal needs some help to improve the functionality of
the school’s ACM system. Due to recent events in schools throughout
the country, the principal needs the ability to immediately lock the
building down, in case of an emergency.

System Requirements:
• Use a special badge to lock the system down from any reader
• Use a secondary badge to restore the system to normal operation
•  hen the system is in lockdown mode, only the principal can
W
restore the system using the restore badge. (He will have this badge
with him at all times)

SOLUTION Complete each of the following steps:


STEPS
1. Add global actions to lock and restore all doors.

2. Create global linkages to execute the actions.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 99
1 6 E M E R G E N C Y LO C K D OW N

EME RG E N CY LO C K D OW N
Add Global Actions
1. Click tab 1. 1
2. Click subtab 2. 2
3. Click button 3 to add a new global action. 3

4. Use the following information for configuration:

FIELD INFORMATION
Name Lock all Doors
Appliance Workstation XX
Type Door Mode
Sub-Type Restored
Priority Checked
Members Front Door, Lab Door, Elevator Door 5
4
5. Click button 5 to save.

6. Repeat steps 1 to 5 and use the following


information to configure the inverse (restore all
the doors) global action:

FIELD INFORMATION
Name Restore all Doors
Appliance Workstation XX
Type Door Mode
Sub-Type Restored
Priority Checked
Members Front Door, Lab Door, Elevator Door

Add Global Linkages


1. Click tab 1.
1
2. Click subtab 2.
2
3. Click button 3 to add a new global linkage.
3

100 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 6 E M E R G E N C Y LO C K D O W N

4. Using the following information for configuration:


FIELD INFORMATION
Name Emergency Lockdown
Appliance Workstation XX
Schedule 24 Hours Active
Threshold 60
Points Returns Leave blank
Type: Door 5
Devices tab
Members: Add all of your doors
Members: Local Grant, Local
Grant Not Used
Selecting these options will
Events tab ensure that when you present the
“Emergency” badge to the proper
reader, you will get an access grant
and the global action will be triggered,
even if the door is not opened.

Members: Search for the


Tokens tab
principal’s Emergency token
Actions tab Members: Lock all Doors

5. Click button 5 to save.

6. Now that you have created the action to disable


the system, the next step is to create the
action that will restore the system back with
a secondary badge. Repeat steps 1 to 5 and
use the following information to configure the
inverse global linkage to restore the doors:
FIELD INFORMATION
Name Restore Doors
Appliance Workstation XX
Points Returns Leave blank
Type: Door
Devices Tab
Members: Add all of your doors
Members: Attempt to open
locked door, Local Grant, Local
Grant - Not Used
Since the system is in lockdown mode
Events Tab and the readers are disabled, any
badge read will result in an “Attempt to
open locked door” event. If the option
is not selected here, the action will not
take place.

Members: Search for the


Tokens Tab
principal’s Restore token
Actions Tab Members: Restore all Doors

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 101
1 6 E M E R G E N C Y LO C K D OW N

Test the Configuration


Using the table below, access the appropriate tab in ACM, complete the test and describe what happens in
order to verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Monitor Present a normal, valid token to the


Events reader (not the emergency token).

Monitor Present the Emergency token to the


Events reader.

Monitor Present a normal token to the reader a


Events second time.

Monitor Present the “Restore” badge to the


Events reader.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Emergency Lockdown

1. I added global actions to lock and restore all doors.

2. I created global linkages to execute the actions.

3. I tested the configuration.

102 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 103
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

104 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
KEYPAD THREAT LEVELS &
DASHBOARDS
INTRODUCTION You can use global actions and linkages to change system behavior. In
this lesson, we will introduce the concept of “threat levels”. This gives
administrators the ability to configure the system to accommodate
various customer needs.

The dashboard feature allows customers to define a multitude of


actions in one screen, thus reducing the learning curve and simplifying
system operation.

SCENARIO The principal wants the ability to implement security threat levels in the
ACM system at the school.

 ll perimeter doors are secured with Card and Pin Readers and some
A
perimeter doors are unlocked during normal operation.

System Requirements
• Three security threat levels:
◦◦ Green: Normal conditions and keypad readers allow for badge
OR pin
◦◦ Yellow: All perimeter keypad readers will require a badge AND
pin
◦◦ Red: No access to the building
• A button that manually grants access to the front door

SOLUTION Complete each of the following steps:


STEPS
1. Add global actions.

2. Create a dashboard.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 105
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S

KEY PA D T H R E AT LE V ELS &


DASH BOARD S
In order to complete the customer’s request, we need to add some new global actions that we have not
previously used.

Global
1. Card and PIN

2. Card or PIN

Actions 3. Disable Reader

4. Grant Access to the Front Door

Add the Global Actions


1. Click tab 1. 1
2. Click subtab 2. 2
3. Click button 3 to add a new global action. 3

4. U
 se the following information to add the Card
and Pin global action:
FIELD INFORMATION
Name Card and Pin
Type Door Mode
Sub-type Card and Pin
Members Elevator Door
5 4
5. Click button 5 to save.
6. Repeat steps 1 to 5 and use the following
information to add the Card or Pin global action:
FIELD INFORMATION
Name Card or Pin
Type Door Mode
Sub-type Card or Pin
Members Elevator Door

106 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S

7. Repeat steps 1 to 5 and add the Disable Reader


global action:
FIELD INFORMATION
Name Disable Reader
Type Door Mode
Sub-type Disable
Members Elevator Door

8. Repeat steps 1 to 5 and use the following


information to add a fourth global action to Grant
Access to the Front Door:

FIELD INFORMATION
Name Grant Access to Front Door
Type Door Grant
Members Front Door

Create and Add the Dashboard


You now need to create a dashboard to allow the end user to trigger the actions. Again, you can use any third
party software to create the dashboard, but the following steps outline one example.

1. Use the following information to configure a


dashboard template:
Security Threat Levels Dashboard
FIELD INFORMATION
Name Security Threat Levels Dashboard
Red Graphic All doors locked
Yellow Perimeter doors locked, token Normal Disable Grant
Card & PIN
Operation Reader Access
Graphic and pin required
Green Graphic Normal operation
Blue Graphic Grant Access Front Door

2. Save the file as a JPEG to your USB.

3. Click the Setup & Settings icon and then select


the “Maps” link.

4. Click button 4 to add a template.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 107
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S

5. U
 se the following information to configure the
dashboard:
5
FIELD INFORMATION
Name Threat Level Dashboard
File Security Dashboard Threat Levels file 7
Re-Size To 800 x 600

6. Click button 6 to add each of your global


actions to their appropriate graphic. Save your
dashboard.

7. Click button 7 to save. 6

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Click on your Threat Level dashboard.


Monitor Click the green button for “Normal
Maps Operation” and present a token. Do
you have access?

Monitor  lick the yellow button and enter your


C
Maps PIN. Do you have access?

Monitor Present a token to the reader and


Maps enter the PIN. Do you have access?

Monitor Click the red button. Present a token


Maps or enter a PIN. Do you have access?

Monitor Click on the “Front Door Grant


Maps Access” icon.

NOTE: Remember to set back to normal operating mode.

108 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Keypad Threat Levels & Dashboards

1. I added global actions.

2. I created a dashboard.

3. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 109
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

110 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
TOKEN TRIGGER OUTPUT

INTRODUCTION To further customize a system, you can configure global actions to


trigger an action, such as an LED output or turning something off/on.

SCENARIO 
The school principal is looking to implement an initiative to reduce
the amount of electricity consumed in the school district. This is a pilot
program and if his school goes well, they will implement the solution
statewide.

 he principal needs the ACM system to turn on the air conditioners in


T
each classroom when teachers present their tokens at the classroom
doors each morning.

System Requirements:
•  token for teachers that will trigger the output to turn on the air
A
conditioner in the classrooms
•  token for the principal that will turn off the air conditioners in all
A
classrooms when presented to any reader in the school
•  predetermined schedule at the end of business hours which will
A
turn the AC off in case the principal is not at the school

SOLUTION Complete each of the following steps:


STEPS
1. Add a teacher access group, role and identity.

2. Configure the LED output.

3. Add global actions to trigger the LED as the output for the AC.

4. Create a global linkage to trigger the LED with a valid badge.

5. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 111
1 8 TO K E N T R I G G E R O U T P U T

TO K E N T RI GGER O UT P UT
Add the Teacher Identity
Since you already have your Principal identity configured, we now need to create the Teacher identity.
Remember, there are three components you need when configuring users in the ACM system.

3 Components Access Groups


Roles
Identities

1. Click tab 1.

2. Select subtab 2.
2 1
3. Click button 3 to add a new access group.

4. Use the following information for configuration:

FIELD INFORMATION
Name Teacher Access Group
Appliance Workstation XX
Schedule Employees M-F
5 4
Installed Checked
Members Front Door, Lab Door, Elevator

5. Click button 5 to save.

6. Click subtab 6 and then locate the Teacher Role.


6

7. Click tab 7 and add the Teacher Access Group 7


to the Members list and save.

112 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 8 TO K E N T R I G G E R O U T P U T

8. Click tab 8. 8
9. Click button 9.

10. Use the following information for configuration:

FIELD INFORMATION
Name Norah Parks
Login Teacher2
Password Teach000
Roles tab Teacher Role
Use the internal number
Token tab
from one of your tokens

11. Click button 11 to save. 11

Configure LED Output


2
1. Click tab 1. 1

2. Click subtab 2. 3

3. Click the link for the EP1501 controller and click


tab 3.

4. Click button 4. 4

5. Use the following information to configure the


LED output:

FIELD INFORMATION
Output Air Conditioner (Subpanel 0 Output 2)
Installed Checked

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 113
1 8 TO K E N T R I G G E R O U T P U T

Add Global Actions


1. Click tab 1. 1
2. Click subtab 2. 2
3. Click button 3 to add a new global action. 3

4. Use the following information for configuration:

FIELD INFORMATION
Name Air Con On
Appliance Workstation XX
Type Output
Sub-Type Activate
Door Air Conditioner (red LED)
5 4
5. Click button 5 to save.

6. Repeat steps 1 to 5 and configure a second


global action with the following information:

FIELD INFORMATION
Name Air Con Off
Appliance Workstation XX
Type Output
Sub-Type De-activate
Door Air Conditioner (red LED)

Add the Global Linkages


1. Click subtab 1.

2. Click button 2 to add a new global linkage.


1

114 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 8 TO K E N T R I G G E R O U T P U T

3. Use the following information to configure the


global linkage:

FIELD INFORMATION
Name Teacher Token Turn On AC
Appliance Workstation XX
Points Returns Leave blank
Type: Door
Devices tab
Members: Add all of your doors
4
Members: Local Grant, Local
Events tab
Grant - Not Used
Tokens tab Members: Teacher token
Actions tab Members: Air Con On

NOTE: Since we only have a limited amount of


readers on the training workstation, we will add
all of the readers. However, in a real customer
situation, you will assign the teacher’s token to
the reader at their classroom door - not all of the
readers in the school.

4. Click button 4 to save.

5. Repeat steps 1 to 4 to configure a second global


linkage using the following information:

FIELD INFORMATION
Name Principal Token Turn Off AC
Appliance Workstation XX
Points Returns Leave blank
Type: Door
Devices Tab
Members: Add all of your doors
Members: Local Grant, Local
Grant - Not Used

The second option ensures that


Events Tab
the AC will be turned off even if
the principal does not open the
door associated with the reader he
presents his token to.
Members: Principal’s Normal
Tokens Tab
token
Actions Tab Members: Air Con Off

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 115
1 8 TO K E N T R I G G E R O U T P U T

Create the Job Schedule


The final step is to create a job schedule to turn off the AC in case the principal is not at the school.

1. Access the Admin link and click button 1.

2. Click tab 2. 2
3. Click button 3 and add a new Job Specification
using the following information: 3

FIELD INFORMATION
Name Auto AC Off
Type Global Action
Global Action Air Con Off

4. Click button 4 to continue.

5. Repeat the Job Specification Daily at 17:00 and


click button 5 to continue.

6. Click Next to continue. Verify that the summary is


correct and click Submit.

7. Highlight the job you created and click button 7


to turn the job on.

8. Locate the Activated On field. If you see the 7


current date and time, your job schedule is
active.

116 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 8 TO K E N T R I G G E R O U T P U T

Test the Configuration


Using the table below, access the appropriate tab in ACM, complete the test and describe what happens in
order to verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Green LED:

Monitor Present the Teacher


Events token to the reader.

Red LED:

Green LED:

Monitor Present the Principal


Events token to the reader.

Red LED:

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Token Trigger Output

1. I added a teacher access group, role and identity.

2. I configured the LED output.

3. I added global actions to trigger the LED as the output for the AC.

4. I created a global linkage to trigger the LED for a valid badge.

5. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 117
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

118 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
DOOR FORCED TRIGGER
OUTPUT
INTRODUCTION This lesson will show you how to configure an alarm to trigger an
output.

SCENARIO 
The school needs the ability to turn on a set of lights if/when anyone
forces the back door open. In addition, the principal wants to receive
an email alert when this happens.

System Requirements:
• Monitor the forced door alarm for the back area of the school
• Display alarm in the monitor event viewer
• Trigger an output to turn on the lights in the back of the warehouse
• Email notification sent to the principal’s email

SOLUTION Complete each of the following steps:


STEPS
1. Configure the email server information to send a notification.

2. A
 dd global actions to turn the LED on/off and to send an email
notification.

3. Add global linkages to trigger the actions.

4. Add instructions and an alarm sound.

5. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 119
19 DOOR FORCED TRIGGER OUTPUT

DOO R F O RC ED T R I G GER
OUTPUT
Add Global Actions

Global
1. Turn LED On

2. Turn LED Off

Actions 3. Email Supervisor

1. Click tab 1.

2. Click subtab 2.
1
3. Click button 3 to add a new global action. 2
3

4. Use the following information for configuration:

FIELD INFORMATION
Name Turn LED On
Appliance Workstation XX
Type Output
Sub-Type Activate
Members Red LED output (Subpanel 2 Output 3)
5 4
5. Click button 5 to save.

6. Repeat steps 1 to 5 and use the following


information to configure a second global action:

FIELD INFORMATION
Name Turn LED Off
Appliance Workstation XX
Type Output
Sub-Type Deactivate
Members Red LED output (Subpanel 2 Output 3)

120 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
19 DOOR FORCED TRIGGER OUTPUT

7. Repeat steps 1 to 5 and configure a third global


action using the following information:

FIELD INFORMATION
Name Email Principal
Appliance Workstation XX
Type Email
Email Address Your email address

Add Global Linkages

Global
1. Door Forced Activate

2. Door Forced Deactivate

Linkages
1. Click subtab 1.

2. Click button 2 to add a new global linkage.

1
2

3. Use the following information for configuration:

FIELD INFORMATION
Name Door Forced Activate
Appliance Workstation XX
Points Returns Leave blank
Type: Door
Devices tab
Add all of your doors
4
Events tab Forced Door
Email Principal and turn
Actions tab
LED on

4. Click button 4 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 121
19 DOOR FORCED TRIGGER OUTPUT

5. Repeat steps 1 to 4 and configure a second


global linkage with the following information:

FIELD INFORMATION
Name Door Forced Deactivate
Appliance Workstation XX
Points Returns Checked
Type: Door
Devices tab
Add all of your doors
Events tab Forced Door
Actions tab Turn LED Off

Add Instructions and Alarm Sound


In this section, you will configure an event for a specific door. Complete each of the steps on your workstation.

1. Click tab 1.

2. Click subtab 2 and located your Front (MR52 2 1


Add 2) door.

3. Click tab 3.
3
4. Scroll down to find the Forced Door event and
click button 4.

5. Configure the event using the following


information:

FIELD INFORMATION
Alarm
Intruder Alert
Sound

Door Forced Alarm, Call Security


Instructions
of 911
Roles Super Admin

6. Click button 6 to save.

6
122 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
19 DOOR FORCED TRIGGER OUTPUT

Test the Configuration


Using the table below, access the appropriate tab in ACM, complete the test and describe what happens in
order to verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Open a door and trigger a door


Monitor
forced alarm.

Close the door on your workstation.


Monitor Did the LED turn off? Did you
receive an email?

Push the front door DPOS on your


Monitor
workstation. Does the alarm sound?
Alarms
Does it record a door forced event?

Highlight the door forced alarm on


Monitor
the alarms page. The Instructions
Alarms
button is now available. Click it.

Acknowledge the alarm to move the active alarm to the Acknowledged Alarms section.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Door Forced Trigger Output

1. I configured the email server information to send a notification.

2. I add global actions to turn the LED on/off and to send an email notification.

3. I added global linkages to trigger the actions.

4. I added instructions and an alarm sound.

5. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 123
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

124 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
FIRST TOKEN UNLOCK

INTRODUCTION Global Actions allow you to associate an action — defined by either


a macro or an external system soft trigger — with a trigger on one or
more panels.

 hrough this feature, you can cause an action to occur simultaneously


T
at a large number of doors connected to more than one panel.

SCENARIO 
The principal wants the front door to unlock with the first valid token of
the day and remain open until the end of the business day.

System Requirements:
• Unlock the front door with the first valid token after 8AM M-F
• Automatically lock the front door after 5PM every day
• If a valid token is presented to the front door during business hours,
the system should lock the door

SOLUTION Complete each of the following steps:


STEPS
1. Add global actions.

2. Add global linkages.

3. Create a job schedule.

4. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 125
2 0 F I R S T TO K E N U N LO C K

FIR ST TO K E N UN LO C K
Add the Global Actions
In order to complete the customer’s order, we need to configure the global actions and trigger them using
global linkages.

1. Click tab 1.

2. Click subtab 2.
1
3. Click button 3 to add a new global action. 2
3

4. Use the following information to add a global


action to unlock the front door:

FIELD INFORMATION
Name Unlock Front Door
Appliance Workstation XX
Type Door Mode
Sub-Type Unlock
5 4
Members Front Door

5. Click button 5 to save the configuration.

6. Repeat steps 1 to 5 and add another global


action to restore the front door using the
following information:

FIELD INFORMATION
Name Restore Front Door
Appliance Workstation XX
Type Door Mode
Sub-Type Restore
Members Front Door

Add the Global Linkage


1. Click subtab 1.
1
2. Click button 2 to add a new global linkage.
2

126 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 0 F I R S T TO K E N U N LO C K

3. Use the following information for configuration:

FIELD INFORMATION
Unlock Front Door with Valid
Name
Token during Business Hours
Appliance Workstation XX
Schedule Employees M-F
Points Returns Leave blank
Type: Door 4
Devices tab
Members: Front Door
Events tab Local Grant
Add all of your tokens (except for
Tokens tab
the Principal’s emergency token)
Actions tab Members: Unlock Front Door

4. Click button 4 to save.

5. Now you need to create the action to restore


the door (lock) if the badge is presented again to
the reader during business hours. The customer
could decide to leave the building earlier and
this function will allow the front door to be closed
any time the customer needs.

Repeat steps 1 to 4 and add a global linkage


using the following information:

FIELD INFORMATION
Lock Front Door with Valid
Name
Badge During Business Hours
Appliance Workstation XX
Schedule Employees M-F
Points Returns Leave blank
Type: Door
Devices tab
Members: Front Door
Opened Unlocked Door

Note: When the door is open and


you present a token, it will generate
Events tab an event called “Opened Unlocked
Door”. In this case, you are telling
the system when this event happens
to take an action to set the reader
back to locked.
Members: Principal’s normal
Tokens tab
token
Actions tab Members: Restore Front Door

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 127
2 0 F I R S T TO K E N U N LO C K

Create the Job Schedule


The final step is to create a job schedule to lock the front door at 5pm every day.

1. Access the Admin link and click button 1.

2. Click tab 2. 2
3. Click button 3 and add a new Job Specification
using the following information: 3

FIELD INFORMATION
Name Lock Front Door after 5 PM
Type Global Action
Global Action Restore Front Door

4. Click button 4 to continue.

5. Repeat the Job Specification Daily at 17:00 and


click button 5 to continue.

6. Click Next to continue. Verify that the summary is


correct and click Submit.

7. Highlight the job you created and click button 7


to turn the job on.

8. Locate the Activated On field. If you see the 7


current date and time, your job schedule is
active.

NOTE: Before moving on, remember to go back into


Physical Access > Global Actions and disable the
First Token Unlock mode. This will prevent issues
from occurring in other lessons.

128 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 0 F I R S T TO K E N U N LO C K

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Monitor Present the Principal’s token to the


Events front door. Does the door unlock?

Monitor Present the same token again. Does


Events the door lock?

To test the job schedule, change


the system time under Appliance
Monitor
Settings to 4:59 PM. Leave the front
Events
door unlocked and wait until 5:00
PM. What happens to the door?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

First Token Unlock

1. I added global actions.

2. I added global linkages.

3. I created a job schedule.

4. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 129
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

130 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ELEVATOR CONTROLS

INTRODUCTION This feature allows administrators to designate elevator access


permissions to a building’s floors.

Administrators can create an elevator access level called “Marketing”


which has access to floors 1 and 3. When you apply an elevator access
level to an access group, all identities with a role assigned this access
group will have access to floors 1 and 3.

NOTE: This feature currently applies to Mercury Security hardware.

SCENARIO 
The principal wants to configure an elevator with secure control for a
new school wing. They have one cab with six floors.

System Requirements
• Valid tokens will allow access from the lobby to the first four floors
• Fifth floor is secured for accounting
• Sixth floor is secured for principal and admin staff

SOLUTION Complete each of the following steps:


STEPS
1. Add elevator access levels.

2. Create the access groups and roles.

3. Apply elevator access to identities.

4. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 131
2 1 E L E VATO R C O N T R O L S

ELE VATO R C O N T R O LS
Configure Elevator Door
Before beginning this lesson, configure the elevator door using the information below.

1. Click tab 1.

2. Click subtab 2 and located your Elevator door. 2 1

3. Click tab 3 and use the following information for


configuration: 3 5

FIELD INFORMATION
Access Type Elevator Feedback
Door Mode Card Only
If there is a custom mode or
Others
schedule, remove it

4. Click tab 4 to save.

5. Click tab 5.

6. Under tab 6, select the elevator subpanel.

7. Under tab 7, select the elevator subpanel.

8. Click button 8 to save.

6 7

8
132 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 1 E L E VATO R C O N T R O L S

Add Elevator Access Levels


In order to create elevator access for the school, we need to configure the different access levels. According
to the customer scenario, we need three levels of access: The lobby through the fourth floor, the fifth floor
accounting level and the sixth floor where only staff is allowed.

Elevator
1. Lobby: First Four Floors

2. 5th Floor: Accounting

Access 3. 6th Floor: Staff Only

1. Click tab 1.
1 2
2. Click subtab 2.

3. Click button 3.

4. U
 se the following information to configure
elevator access levels:
5
FIELD INFORMATION
Floors 1 - 4
Description Floors 1-4 M-F 8 AM-5 PM
Schedule Employee M-F
Floors 5
Description Floors 5 M-F 8 AM-5 PM
Schedule Employee M-F
Floors 6
Description Floors 6 Staff Only
Schedule 24/7

NOTE: On floors 5 and 6, remember to add the


lobby as well, so that users are able to come back
down to the first floor.

5. Click button 5 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 133
2 1 E L E VATO R C O N T R O L S

Create the Access Groups


After creating the elevator access levels, we need to create the access groups.

1. Click tab 1.

2. Select subtab 2.
2 1
3. Click button 3 to add a new access group.

4. Use the following information to configure two


new access groups:

FIELD INFORMATION
Access Group 1
Name Elevator Floors 1-4 Access Group
Appliance Workstation XX
Schedule Employees M-F
Elevator
Floors 1-4 M-F 8 AM-5 PM
Access Level
Installed Checked
Doors Add the Elevator Door
Access Group 2
4
Name Elevator Floor 5 Access Group
Appliance Workstation XX
Schedule Employees M-F
Elevator
Floors 5 M-F 8 AM-5 PM
Access Level
Installed Checked
Doors Add the Elevator Door
Access Group 3
Name Elevator Floor 6 Access Group
Appliance Workstation XX
Schedule 24/7
Elevator
Floors 6 Staff Only
Access Level
Installed Checked
Doors Add the Elevator Door

134 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 1 E L E VATO R C O N T R O L S

Create the Roles


1. Click tab 1. 2 1

2. Select subtab 2.

3. Click button 3 to add a new role.


3

4. U
 se the following information to create 3 roles
for elevator floors 1-4, 5 and 6.

FIELD INFORMATION
4
Role 1
Name Elevator Floors 1-4 Role
Start Date Today’s date
Stop Date 01/01/2021
5
Installed Checked
Access Groups Elevator Floors 1-4 Access Group
Role 2
Name Elevator Floor 5 Role
Start Date Today’s date
Stop Date 01/01/2021
Installed Checked
Access Groups Elevator Floor 5 Access Group
Role 3
Name Elevator Floor 6 Role
Start Date Today’s date
Stop Date 01/01/2021
Installed Checked
Access Groups Elevator Floor 6 Access Group

5. Click button 5 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 135
2 1 E L E VATO R C O N T R O L S

Apply Elevator Access to Identities


For this next step, you will need to have three identities with assigned tokens:
• Principal token with access to all floors
• Secretary token with access to floors 1-4
• Teacher token with access to floor 5
Edit your current identities by adding the roles with elevator access you created in this lesson. However, make
sure not to use the Principal’s emergency token.

1. Click tab 1.
1
2. Search and click the link for your Principal
(Tommy Jones).

3. Click tab 3.

4. Highlight all three elevator access roles and click 3


button 4 to add them as members.

5. Click button 5 to save the configuration.

6. Repeat steps 1 to 5 with the following


information: 4

FIELD INFORMATION
Secretary
Search Jane Smith
Roles tab Add Elevator Floors 1-4 Role
Teacher 5
Search Will Turner
Roles tab Add Elevator Floor 5 Role

136 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 1 E L E VATO R C O N T R O L S

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Present the Principal’s token to the


Monitor
elevator reader and press the 6th
Events
floor. What happens?

Monitor Repeat this process for each floor.


Events Do you have access?

Present your teacher token to the


Monitor
reader and press the 6th floor. Do
Events
you have access?

Monitor Using the same token, try to access


Events the 5th floor.

Present the secretary’s token to


Monitor
the 5th or 6th floor. Do you have
Events
access?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Elevator Controls

1. I added elevator levels.

2. I created the access groups and roles.

3. I applied elevator access to identities.

4. I tested the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 137
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

138 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
BACKUP

INTRODUCTION The backup feature in ACM allows administrators to backup


configuration and event information to a USB drive or a shared folder
located on the customer’s network.

SCENARIO 
Now that the school’s system is configured, the principal wants to
make sure they have a copy of the configuration in case the appliance
becomes corrupted.

System Requirements
• Schedule a backup every day at 10 PM
• The backup will be stored in a shared folder on the school network

SOLUTION Complete each of the following steps:


STEPS
1. Run a manual backup.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 139
2 2 B AC K U P

BAC K U P
Run a Backup
Backups can be used to restore information if an appliance’s configuration or transaction data ever becomes
corrupted. Backups can either be scheduled or manually initiated and stored on a USB drive or shared
folder. After you’ve set up a backup event, you can manually initiate a system backup outside the configured
schedule. First, verify the host’s sharing permissions. In this example, your USB drive is the host.

1. Access the Control Panel. Right-click on your


USB drive, select Share with > Advanced Sharing.

2. From the Sharing tab, click “Advanced Sharing”


button. Mark the check box “Share this folder.”

3. Click the Permissions button. Add “Everyone” as


a group and give them full control, change and
read access. Apply your changes.

4. Under ACM’s Setup & Settings, select Appliance.


5. Click tab 5 and click “Add New Appliance
5
Backup”. Use the following information for
configuration:
FIELD INFORMATION
Name Test_Backup
Host USB drive
Domain Name Computer Domain
Host Login/Password Computer Credentials
Backup Type Windows Share
Location /backup/
Schedule Leave blank

6. Click button 6 to save. To verify that your backup 6


is listed, click File List on the next page.

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Backup

1. I ran a manual backup.

140 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 141
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

142 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
MACROS

INTRODUCTION Macros are commands, or a sequence of commands, that can control


the activity of devices connected to a door, panel or group of panels.

 acros can range from a simple process like turning off the lights or
M
masking an input, to sophisticated multi-step procedure that closes
down the air conditioning system, unmasks alarms, locks all doors
connected to a panel, turns out lights and then e-mails the operator for
more instructions.

SCENARIO 
The principal wants a buzzer to turn on if anyone holds the front door
open.

System Requirements
• If the front door is held open, a buzzer should sound for as long as
the door is kept open

SOLUTION Complete each of the following steps:


STEPS
1. Use a macro to trigger an output.

2. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 143
23 MARCROS

MAC RO S
Add a Macro
Complete each of the steps on your workstation to configure a macro on Panel 2, Output 4.

1. Click tab 1.

2. Click subtab 2 and located your Front door. 2 1

3. Click tab 3.

4. Use the following information to configure a


simply macro:
3
FIELD INFORMATION
Type Held
Schedule 24 Hours Active 5 4
Output Red LED

5. Click button 5 to save.

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Present a token to the Front Door


Monitor
reader and open the door by
Events
pressing the DPOS switch.

Monitor Turn off the DPOS switch. What


Events happens to the output LED?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Macros

1. I used a macro to trigger an output.

2. I tested the configuration.


144 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 145
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

146 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
TRIGGERS

INTRODUCTION Areas are zones that Access Control Manager assigns to define a
physical area within a secured location. This area can be relatively
small, like a lab or a storeroom; or large, like a collection of buildings.
Areas often incorporate one or more doors with their attached inputs
and outputs. Once an area is defined, it can be assigned to a role or
policy to limit user access within a building or facility.

For example, a scientist works in a laboratory in Area A. As long as he


accesses doors leading into or exiting that area, he is granted access.
However, if he attempts to enter an area designated as Area B, he is
denied access.

SCENARIO The principal needs some help to restrict occupancy in the school lab.

System Requirements:
• Lab has a maximum occupancy of three users
•  hen capacity is reached, turn on a sign outside the lab indicating
W
Max Capacity
• The sign turns off when occupancy count has returned to zero

SOLUTION Complete each of the following steps:


STEPS
1. Add macros.

2. Add output triggers.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 147
24 TRIGGERS

TR IG G E RS
Area and Door Operations
We will need to use the lab area we configured in previous lessons and build upon that in order to complete
the order for this customer. We have also already configured the door operations that are necessary for this
configuration. In a normal situation, you may have to do that at the time of setup.

Add the Macros


We need to create the macro to turn the output (red LED) off/on for the maximum occupancy sign. Use the
output on Panel 2, Output 2.

1. Click tab 1.

2. Click subtab 2 and click the link for the EP1501 2 1


controller.

3. Click tab 3. 3

4. Click button 4.

5. Click button 5.

6. Use the following information to configure a


macro:

FIELD INFORMATION
Occupancy reached Limit Turn
Name
On LED
Command Output control
Output Red LED (Subpanel 2 Output 2)
Function On 6
7
Group Group A

7. Click button 7 to save.

148 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
24 TRIGGERS

8. Repeat steps 1 to 7 and use the following


information to create a macro to turn the LED off:

FIELD INFORMATION
Name Occupancy Reached Zero, LED Off
Command Output control
Output Red LED (Subpanel 2 Output 2)
Function Off
Group Group B 8

Add the Output Triggers


The next step is to create the triggers that will utilize the macros above to turn the LED (sign) on or off based
on the area count. Output triggers can be configured under the Physical Access > Panels tab.

1. Click tab 1.

2. Click subtab 2 and click the link for the EP1501 2 1


controller.

3. Click tab 3. 3
4. Click button 4.

5. Use the following information to configure the


trigger to turn the sign on:

FIELD INFORMATION
Name Occupancy LED On
Enabled Checked
Schedule 24 hours active
Macro Occupancy Count LED On
Command Execute only actions A
Source Type Area
Source Lab Area 5
6
Event Type Area Status Change
Event Area - occupancy - max reached

6. Click button 6 to save.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 149
24 TRIGGERS

7. Repeat steps 1 to 6 and use the following


information to configure the trigger to turn the
sign on:

FIELD INFORMATION
Name Occupancy LED Off
Enabled Checked
Schedule 24 hours active
Macro Occupancy Reached Zero, LED Off
Command Execute only actions B
Source Type Area
7
Source Lab Area
Event Type Area Status Change
Event Area-occupancy count - zero

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Monitor Present your three tokens to the lab


Events reader. What happens to the output?

Present three different tokens to the


Monitor
front door reader. What happens to
Events
the output?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Triggers

1. I added macros and output triggers.

2. I tested the configuration.

150 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 151
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

152 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
INTERLOCKS

INTRODUCTION An interlock is a mechanism that enables a specific event from one


element of the system to trigger an action from another element.

 sing interlocks allows you to set up security routines such as man-


U
traps, prison entry points and automated building functions.

While there is no tab dedicated to programming interlocks, you can


access the interlocks link from one of three pages:
• Doors
• Subpanel inputs
• Subpanel outputs

Note: Interlocks are only supported by Mercury panels.

SCENARIO 
The principal wants to add a panic button at the receptionist desk to
disable the front door in case of an emergency.

System Requirements:
•  nce the panic button is pressed, the front door reader will be
O
disabled
•  he principal will utilize his/her token to return the front door to
T
normal operation

SOLUTION Complete each of the following steps:


STEPS
1. Configure an input.

2. Add interlocks.

3. Test the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 153
2 5 I N T E R LO C K S

INTE RLO CK S
Configure an Input
The Principal wants the Receptionist to be able to push a button in case of an emergency, which means we
need to configure an input to take care of that.

1. Click tab 1.

2. Click subtab 2. The Panels Listing page appears. 2 1

3. Select the link for the EP1501 and click tab 3. 3


4. Click icon 4 on your address 2 subpanel. The
Inputs Listing page is displayed. 4

5. Configure one of your subpanel inputs with


the following name: Panic Button Front Door
(Subpanel 2 Input 3)

Add Interlocks
1. Once you save your Panic Button input, you will 1
be taken back to the Input listing page. Click on
link 1.

2. Click button 2 to add an interlock.

154 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 5 I N T E R LO C K S

3. Use the following information for configuration:

FIELD INFORMATION
Name Input Disable Front Door
Enable Checked
Schedule 24 hours active
Source Type Input point
Event Type Point change of state
Event Point in alarm
Interlocks with: Type Door
Interlocks with: Target Front door reader
Command Door mode control
Function Disable the door

4. Click button 4 to save your interlock. 4 3

Test the Configuration


Using the table, access the appropriate tab in ACM, complete the test and describe what happens in order to
verify that you set up the configuration correctly.

ACM TAB TEST DESCRIBE WHAT HAPPENS

Present a token to the front door


Monitor reader, then press the panic
Events button. Present the same token
to the reader, What do you see?

Check Your Work


Before moving to the next section, check off that you have completed each of the following:

Interlocks

1. I configured an input.

2. I added interlocks.

3. I tested the configuration

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 155
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference

156 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
REFERENCE

HOW TO USE Refer to this section as a “how-to” for configuring the features within
THIS SECTION the ACM system

 tudents will not have the steps broken out in each lesson, so direct
S
them to these pages for help while setting up the workstation

TOPICS COVERED • Global Actions


• Outputs & Inputs
• Global Linkages
• Areas
• Macros
• Events
• Access Groups, Roles, Identities
• Delegations
• Routing Groups
• Elevator Access Levels
• Appliance Backup
• Schedules
• User Defined Fields & Tabs
• Maps
• Email Notifications
• Collaborations
• External Systems

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 157
26 REFERENCE

CONFIGURE THE WORKSTATION


Refer to this section if you need further details on how to set up the basic configuration of some of the
features in the ACM system. Since this is an advanced course, students should already be able to complete
the majority of these steps with ease.

EP1501
MR52, ADDRESS 2

MR52, ADDRESS 1

From the physical access page, you can continue to add more panels and subpanels and configure them with
the necessary information. For training purposes, we will only configure one EP1501 controller and two MR52
subpanels on the workstation.

158 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

PHYSICAL ACCESS
Add a Global Action
Global actions allow you to perform one or more actions simultaneously at a large number of doors connected
to more than one panel.

1. Click tab 1.
1
2. Click subtab 2.

3. Click button 3.
2
3

4. Configure the global action. See the table below


for a breakdown of each field. Depending on
which option you choose from the dropdown
lists, different fields appear.

FIELD DESCRIPTION
Enter a descriptive name for the
Name
global action.
Select the appliance that the related
Appliance 5
panels and devices are connected to.
Select the type of action you want
to be performed. Additional options
appear depending on the option you
Type choose.
NOTE: If you select the “Panel Macro”
type in this field, be aware that macros
are only supported on Mercury panels.
Additional options appear depending
Sub-Type
on the option you choose.

5. Click button 5 to save the configuration.

Configure Outputs
Outputs are devices that perform tasks in response to input data. This includes things like unlocking a door,
setting off a fire alarm, activating an elevator or turning off air conditioning.
1. Click tab 1. 1
2. Click subtab 2. 2

3. Click the link for the EP1501 controller and click 3


tab 3.
4
4. Click button 4.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 159
26 REFERENCE

5. T
 he first output should be your front door strike.
Select an output link and configure it with the
necessary information. See the table below for a
breakdown of each field.

FIELD DESCRIPTION
This is the name of the output point.
Output The default name is the location of
the output point on the subpanel.
Check this to indicate that this output
Installed
point is connected and active.
6
The read-only address for the
Address
output point on the subpanel.
Select how the panel knows when
the output point is active:
•  nergized When Active – a
E
current is expected to pass
Operating through the output point
Mode when it is active
•  ot Energized When Active
N
– a current expected to pass
through the output point
when it is inactive
Enter the pulse interval time. This is
the number of secs that the output
will activate when a pulse command
Pulse Time
is issued. (This field is only available
on outputs not associated with
doors e.g. auxiliary relays).
Define when this output is active
by selecting a schedule. Only
Schedule
schedules that have been defined in
the system are listed.
Show Click button to display the policies
Policy associated with this output module.

6. Click button 6 to save the configuration.

Configure Inputs 1
1. Click tab 1. 2

2. Click subtab 2. The Panels Listing page appears. 3


3. Select the link for the EP1501 and click tab 3.
4
4. Click icon 4 on your address 2 subpanel. The
Inputs Listing page is displayed.

160 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

5. C
 lick the input link for the input you will be editing and configure the input with the necessary information.
See the table below for a breakdown of each field.

FIELD DESCRIPTION
The name of the input. The default name of the input is the input’s location on the
Input
subpanel.
Installed Check this box to indicate that this point is connected and active.
Address The read-only address of this input point.
Select the input mode:

• Normal - this input point is in normal mode


Mode
• Non-latching - this input point does not latch

• Latching - this input point must latch


Select the end-of-line resistance option used by the input. Only the EOL resistance options
EOL Resistance
defined for the system are listed.
Select the level of logging that is required for this input:

• Log all changes - log any change to this input


•  o not mask CoS if masked - do not mask the change of state reporting if the input
D
Logging is already masked
•  o not mask CoS if masked and no trouble CoS – do not mask the change of state
D
reporting if the input is already masked and there is no issue with this change of
state
Debounce Select how often the unit is allowed to debounce in a row. 1 = 16 ms, 2 = 32 ms, etc.
Entry Delay Enter the number of seconds allowed for each entry before the input reports an event.
Exit Delay Enter the number of seconds allowed for each exit before the input reports an event.
Set the amount of time that the alarm will stay in alarm after returning to normal.
Hold Time For example, if the input point goes into alarm, then restores, it will hold it in that alarm state for 1 to
15 seconds after it returns to normal before reporting the normal state.
Define when the input is active by selecting a schedule from the drop down list. Only
Schedule
schedules that have been defined in the system are listed.
Select the camera from the window that this input activates if it goes into alarm. Only
Cameras
cameras previously defined for this system appear in this window.
Masked Check this box to indicate that this input is normally masked.
Type Select a type of macro. Only the macros supported by the input point are listed.
Schedule Select a schedule from the drop down list.
Operation Type The read-only summary of the macro operation type.
Output Select the output that is triggered when the macro is activated.
Click this button to save the canned macro settings. You can create more than one canned
Save Macro
macro per input.
Show Policy Click this button to display the policies associated with this input module.

6. Save your configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 161
26 REFERENCE

PHYSICAL ACCESS
Add a Global Linkage
Global linkages are the final step in the process that defines specific actions for triggering events at specific
doors. What separates this procedure from the Macro or Trigger features, is that this feature is capable of
connecting many doors and inputs spread across many panels.

In order to create a global linkage, you must have at least one or more global actions already configured.

1. Click tab 1.
1
2. Click subtab 2.

3. Click button 3. 2
3

4. C
 onfigure the global linkage with the necessary
information. See the table below for a
breakdown of each field.

FIELD DESCRIPTION
Name Enter a descriptive name.
Select the appliance that maintains
Appliance
this linkage.
Define when this linkage is active by 5
Schedule
selecting an option.
Length of time (in secs) before the
linkage will timeout because the
chain of events is forced to stop or is
broken.

The default is 60 seconds.

Ex: The global linkage is set to pulse


an output on Panel A when an invalid
Threshold access attempt occurs at a door on
Panel B, but assume that Panel B
is offline with the appliance at that
moment. The appliance and Panel B
comes back online ten minutes later
and the event is then uploaded from
the panel to the appliance. At that
point, ten minutes or more after the
fact, you may not want to pulse the
output any longer.
Check this to indicate that the points
Points
defined in this linkage must return to
Returns
normal before an action is triggered.

5. Click button 5 to save the configuration.

162 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

6. F
 ill in the appropriate information for the devices
tab. This page allows you to add doors, inputs,
outputs, specific panels, subpanels and external
system devices to the global linkage. See the
table below for a breakdown of each field.

FIELD DESCRIPTION
Select the type of devices you want to
add. The options in the Available list
changes to match your selection. 7
Tip: To add different types of devices to
Type
the linkage, select a type and add the
required devices to the Members list then
repeat this procedure with other device
types until all required devices have been
added to the Members list.
A list of the devices that are available
Available in the system. The list changes to
match the selected type.
A list of all the devices that have been
Members
added to the linkage.

7. Click button 7 to save the configuration.

8. F
 ill in the appropriate information for the events
tab. This page allows you to add specific events
to the global linkage. See the table below for a
breakdown of each field.

FIELD DESCRIPTION
Select the type of devices you want
to add. The options in the list change
to match your selection. 9

Tip: To add different types of devices to


Type
the linkage, select a type and add the
required devices to the Members list then
repeat this procedure with other device
types until all required devices have
been added to the Members list.
A list of the devices that are available
Available in the system. The list changes to
match the selected type.
A list of all the devices that have
Members
been added to the linkage.

9. Click button 9 to save the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 163
26 REFERENCE

10. F
 ill in the appropriate information for the tokens
tab. This page allows you to add identities with
token numbers to the global linkage. See the
table below for a breakdown of each field.

FIELD DESCRIPTION
Search for the identity that is assigned
to the token you want to include in
Token
this linkage. After you click Search,
Search
the Available list refreshes to display
your search results.
A list of the identities and tokens that
Available match your search criteria. No tokens
11
are listed if you don’t perform a search.
A list of all the identities and tokens
Members
that have been added to the linkage.

11. Click button 11 to save the configuration.

12. Fill in the appropriate information for the actions


tab. See the table below for a breakdown of
each field:

FIELD DESCRIPTION
Available A list of the available global actions.
A list of the global actions that have
Members
been added to the linkage.
13
13. Click button 13 to save the configuration.

Add an Area
Areas are zones that the ACM system assigns to define a physical area within a secured location. This
area can be relatively small, like a lab or a store room; or large, like a collection of buildings. Areas often
incorporate one or more doors with their attached inputs and outputs. Once an area is defined, it can be
assigned to a role or policy to limit user access within a building or facility.

1. Click tab 1.

2. Click subtab 2. 2 1
3. Click button 3.
3

164 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

4. C
 onfigure the area. See the table below for a
breakdown of each field.

FIELD DESCRIPTION
Name Enter a name for this area.
Select the appliance that will
maintain this area. You can add 5
Appliance
doors from different appliances to
an area.
Maximum Enter the max number of card
Occupancy holders allowed in this area at a time.
Enter the minimum number of
Log Min cardholders that must enter this
Reached area before a transaction is logged
in the system.
Enter the maximum number of
Log Max cardholders that must enter this
Reached area before a transaction is logged
in the system.
Enable Check this box to enable this area in
Area the system.
Check this box to indicate a two-
person rule is imposed for this area.

If enabled, 2/more people must be


in the area at all times. When the
area is empty, 2 valid cardholders
must present their credentials to the
2-Person entry reader before entry is granted.
Control Once occupied by 2/more people,
individual access can be granted.
The same rules apply for exit until 2
cardholders are left in the area - at
this point, both cardholders must
present their credentials and must
exit the area together.

5. Click button 5 to save the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 165
26 REFERENCE

Add Macros
Macros can be extremely simple, such as turning out lights or masking an input. Or, they can be sophisticated
multi-step procedures. For example, you can define a macro that closes down the air conditioning system,
unmasks the alarms, locks all the doors connected to a panel, turns out the lights, then emails the operator for
more instructions

1. Click tab 1.

2. Click subtab 2 and click the link for the EP1501 2 1


controller.

3. Click tab 3. 3

4. Click button 4.
4

5. Click button 5.

6. Configure the macro command. See the table


below for a breakdown of each field.

FIELD DESCRIPTION
Name Enter a name for this command.
Select the type of macro command
Command this is. Depending on the option
selected, new options are displayed. 7

After you save this command, the


system assigns it a number based on
Sequence
where the command appears in the
Macro Command List.
Select the group this command
belongs to. You can assign the
command to Group A, Group B,
Group C or Group D.

Once the macro is added to a


group, you can combine the macro
Group groups into sequences. For example,
Group A is followed by Group B,
or Group D is triggered by Group
C. Also, assigning a macro to a
specific macro group enables you to
subdivide and sort macros for Global
Actions and Global Linkages.

7. Click button 7 to save the macro.


166 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

Edit Events
When you click the name of an event from the Events Listing page, the Event Edit page is displayed. This page
allows you to define what happens when the event occurs, including who will be notified of the event. Make
any changes that may be required.

1. Click tab 1.

2. Click subtab 2. 1
2
3. Once you’ve found the event you want to edit,
click the link.

4. Configure the event. See the table below for a breakdown of each field.

FIELD DESCRIPTION
Name The name of the event.
Return Name The name used to identify that this event is over, or the return-to-normal name of this event.
The event type. Only events types that have been defined in the system appear in the drop
Event Type
down list.
Source Type The device that is the source of the event.
Specify the priority of this event. The Alarm Monitor displays alarms according to their priority.
Priority
Priority 1 is the highest priority and is always displayed at the top. The priority range is 1 - 999.
Select an alarm sound that is played when a new alarm occurs while you are monitoring the
Alarm Sound
Alarms page.
Suppress Time Select a schedule when alarm events are not reported.
Enter any instructions that may be required for handling this event. The instructions are made
Instructions
available to the user on the Monitor screen.
Return Event Select an event type for the return-to-normal event.
Return Priority Enter the priority number for the return-to-normal event. The priority range is 1 - 999.
Has On/Off Check this box to indicate that this event is a toggle, involving an on/off switch logic.
Masked Check this box to indicate that this a masked event
Logged Check this box to log the event.
Check this box to auto-launch video from the linked camera feed when the event occurs. This
Show Video
feature only works if video is enabled.
Check this box to specify that two people are required to acknowledge and clear this event.
Two Person
Required to If this box is checked then the operator that executes the Clear cannot be the same operator
Clear that executes the Acknowledge. If the same operator attempts to clear the alarm, then
nothing will happen.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 167
26 REFERENCE

Enter the email address of all the people who should be notified when this event occurs.
Email
You can enter more than one email address separated by a comma.
A list of all the roles that are available to you in the system.
Available To allow specific role to have access to view or edit this event, select a role from the
Available list then click to add the role to the Member list.
A list of all the roles that are able to view or edit this event.
Members If this event is associated with at least one role, then any user who does not have the
selected roles will not be able to view or edit the event.

5. Save the configuration.

Anti-Passback Modes
When you select the Operations tab on the Door Edit page, one of the options is for APB Mode. The APB
modes may be different depending on the panels you have installed.

1. Click tab 1.

2. Click subtab 2. 2 1
3. Click the link for one of your doors.

4. Click tab 4. 4
5. In field 5, select an APB mode. See the table
below for a breakdown of each field.

FIELD DESCRIPTION
No Selection APB is not used.
Tracks each badge that enters 5
a door and generates a warning
transaction if the same badge is
used at the same door twice in
Soft Door a row. This badge is still able to
APB enter the door the second time,
but the access is logged as an
APB violation.

NOTE: This mode is only available if


using HID hardware.

168 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

Tracks each badge that enters a


door and does not allow the same
badge to enter twice in a row. This
Hard Door badge will not be able to enter
APB through the same door until it has
accessed a second door.

NOTE: This mode is only available if


using HID hardware.
Allows you to configure APB with
just one reader. The door keeps
track of each badge to enter and
does not allow the same badge
to enter twice in a row unless the
Door-Based APB time limit is reached. 6
Timed APB
Make sure you specify an APB
time limit in the APB Delay
field. Do not configure the area
entering or area leaving setting
for the door.
Tracks each door a badge has
accessed. Once the badge has
accessed one door, it must access
a second door or wait until the
Token- APB time limit is reached before it
may access the first door again.
Based
Timed APB Make sure you specify an APB
time limit in the APB Delay
field. Do not configure the area
entering or area leaving setting
for the door.
Time based hard area APB. When
the time limit expires, the hard
area APB becomes a soft area
Timed Area APB.
APB
Make sure you configure the area
entering and area leaving setting
for the specified door.

6. Click button 6 to save the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 169
26 REFERENCE

ROLES
Add an Access Group
Access groups are sets of physical access permissions for doors and elevator access levels. Once you have
defined an access group, you can assign it to a role. This allows members of the role to access the specified
doors and elevator access levels in the access group.

1. Click tab 1.

2. Click subtab 2.
2 1
3. Click button 3.

4. C
 onfigure the access group with the necessary
information. See the table below for a
breakdown of each field.

FIELD DESCRIPTION
Name Enter the name of this access group.
Appliance that manages this access
Appliance
group. This is a read-only field.
Select a schedule from the drop
down list to specify when the access 5
Schedule group is active.
Only schedules that have been
defined in the system are listed.
Check this box to indicate that this
Installed access group is currently operational
and available to the system.

5. Click button 5 to save the configuration.

6. H
 ighlight the appropriate doors and click button
6 to add the doors as members of the access
group.

7. Click button 7 to save.

170 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

Add a Role
A role is a container for all the permissions a user would need in order to perform a specific role in the
organization. Each role can be assigned:
• Access groups for doors and elevator access levels
• Delegated access to specific features within the ACM application
• Routing groups to monitor specific events that occur within the ACM system

1. Click tab 1.

2. Click subtab 2. 2 1

3. Click button 3.

4. Configure the role. See the table below for a


breakdown of each field.

FIELD DESCRIPTION
Name Enter a name for this role.
Only roles that have been defined in
the system appear in the dropdown
list. The child role will inherit all access
Parent
permissions defined in the parent role.
Also, you cannot delete a parent role 5
until you delete all its children.
Start Specify the activation date for this role.
Date Click the field to use the calendar.
Stop Specify the deactivation date for this
Date role. Click the field to use the calendar.
Check this to indicate that role is
Installed
operational and available to the system.

5. Once complete, click button 5 to save the


configuration.

6. Click tab 6. 6
7. H
 ighlight the appropriate access group and click
button 7 to make it a member of the role.

8. Click button 8 to save the configuration.


7

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 171
26 REFERENCE

Add a Delegation
A delegation is a list of permissions within the ACM system that allows an operator to configure settings and
monitor events. After you have created a delegation, you must assign it to a role to make it effective.

1. Click tab 1.

2. Click subtab 2. 2 1

3. Click button 3. 3

4. Enter an appropriate name for the delegation.

5. Click button 5 to save the configuration.

6. You will see a list of available permissions that


you can assign to a delegation. Select the
appropriate delegations and click button 6 to
add them as members of the group.

7. Click button 7 to save the configuration.

NOTE: Use the search field to filter through the list


to quickly find and add specific pages. You can also
select multiple options at one time by holding down
the CTRL key.
7

Add a Routing Group


A routing group controls which event types and event sources are routed to the Monitor screen. After you
have defined a routing group, only the event types produced by the event sources during the specified
schedule will be routed to the Monitor screen.

You must set up routing schedules and groups of hardware components before you can use routing groups.

1. Click tab 1. 1
2. Click subtab 2.
2
3. Click button 3. 3

172 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

4. C
 onfigure the routing group. See the table below
for a breakdown of each field.

FIELD DESCRIPTION
Name Enter the name of this routing group.
Select a schedule from the drop down
Schedule list. Only schedules that have been 5
defined in the system are listed.
From the drop down list, select the
option that qualifies the schedule.

•  ppliance: Relative to the local


A
time on the appliance when the
Schedule
transaction was created within
Qualifier
the ACM system
•  vent: Relative to the local time
E
when the originating event
occurred
Check this box to indicate that this
Installed routing group is currently operational
and available to the system.

5. Click button 5 to save the configuration.

6. O
 nce you save, more tabs will appear. Click on 6
tab 6. This allows you to specify which event
types should be routed in this routing group.

7. Add or remove any event types and click button


7 to save your changes.

Add Elevator Access Levels


An Elevator Access Level defines a cardholder’s access to the floors in a building. For example, you can
create an elevator access level that contains Floor 1 and Floor 3. When you add this elevator access level to
an access group, all users in that access group will have access to Floor 1 and Floor 3.

NOTE: This feature currently applies to Mercury Security elevator transactions in floor tracking mode.

1. Click tab 1.
1 2
2. Click subtab 2.

3. Click button 3.
3

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 173
26 REFERENCE

4. C
 onfigure the elevator access levels. See the
table below for a breakdown of each field.
5
FIELD DESCRIPTION
Enter the name of this elevator
Name
access level.
From the drop down list, select
Appliance the appliance that manages this
elevator access level.
Output Indicate the default output number.
The name of each floor. The floors
Description are named by default, but you can
rename them.
Indicate when a card/code has
free access to the specified floor,
meaning a valid card/code is not
required to access this floor.
Schedule
Select a schedule from the drop
down list. Only schedules that have
been defined in the system are
listed.

5. Click button 5 to save the configuration.

IDENTITIES
Add an Identity
The Identities page gives you access to all the cardholders and operators in the system. You can manually
add each identity to the system or you can use the Collaboration feature to transfer identity information from a
third party database.

1. Click tab 1.
1
2. Click button 2.

174 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

3. In the Identity Information section, fill in the


appropriate fields. For these exercises, we will
only need the name, login and password fields.

4. Click button 4 to save the configuration.

5. Highlight the appropriate role(s) and click button


5 to make the identity a member of the role.

6. Click button 6 to save the configuration.

7. On the next tab, add any token information. Click


button 7 to save the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 175
26 REFERENCE

SETUP & SETTINGS


Appliance Backup
In backup, data on the primary appliance is copied to a host computer where it is stored. In the event that the
information in the primary appliance becomes corrupted, this backup data can be transferred to the primary
and replace the corrupted data.

1. In the setup links, click link 1.

2. Click tab 2.

3. Insert a USB drive into your computer (or the


VMware machine). Once the USB is connected
to the appliance, click button 3.
2
4. If successful, a message will say, “USB State: 3
Mounted.” Click button 4.

NOTE: If using VMware, make sure you mount the


USB drive to the virtual machine. Refer to VMware
for details on how to enable USB drive on virtual 4
machines.

5. C
 onfigure the backup with the necessary
information. See the table below for a
breakdown of each field.

FIELD DESCRIPTION
Enter the name of this backup. It is recommended that the name does not use spaces. (e.g.
Name
Avigilon_Corp)
From the drop down list, select the backup type. The page refreshes to display different options
depending on the selected backup type. There are three types available:
Backup • SCP - Secure Copy, securely transfer backup data from the appliance to a remote host location
Type
• USB - Transfer backup data to a device connected to the appliance via a USB cable

• Windows Share - Transfer backup data to a Windows network location


Select the backup data type:
Data Type • Configuration - Back up all configuration data from the appliance
• Transactions - Back up all event data that occur within the system

176 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

Enter the name of the subdirectory where the backup files are stored. If the file is to be located
in a subdirectory of the share, use this format:

directory_name/

Notice that the directory name needs both a leading slash and a trailing slash. If the file is to be
Location
located in the top level of the share (no subdirectory), use this format:

/directory_name

Notice that there is only one leading slash required. There must be an entry in the Location field
for the backup to work.
Use Check this box to encrypt the backup data using AES 256-bit encryption. By default, the
Encryption password (key) for the encrypted file is the name of the appliance.
Schedule Select the days of the week when the backup should occur.
Start Time Enter the time when the backup should occur. This field uses a 24-hour clock.

6. Click button 6 to save the configuration.

Create a Schedule 1
1. Click icon 1.

2. Click link 2.
2

3. Click button 3.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 177
26 REFERENCE

4. Configure the schedule. See the table below for


a breakdown of each field.

FIELD DESCRIPTION
Name Enter a name for the schedule.
Select the mode from the drop down
list. The options include:

ON – the schedule is constantly on.


You do not need to set specific dates
or times for the schedule.
Mode
OFF – the schedule is constantly off.
5
SCAN – the schedule follows the date
and time settings defined through the
check boxes below.
Days Specify the days of the week that the
of the schedule is active by checking the
Week appropriate boxes.
Specify the holidays on which the
schedule is active. Holidays are
Holidays assigned a number in the ACM system.
Each number represents a different
type of holiday that is configured.
Enter when the schedule starts for the
days in each row.

Active You must use 24 hour clock format (for


example, 1:00 p.m. is 13:00). If 09:00 is
entered as the Active time, the actual
active time will be 09:00:00.
Enter when the schedule is inactive for
the days in each row.

Inactive The time entered includes the full


minute. So, if 17:00 was entered as an
Inactive time, the actual inactive time
will be 17:00:59

5. C
 lick button 5 to save the configuration. Repeat
these steps for each schedule you need in the
system.

178 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

Add User Defined Fields


User defined fields are custom fields that capture organization specific information for each identity. It is
recommended that you define all the fields that you need and then create new tabs as required.

Information captured by user defined fields can be used on badges to display important details about each
identity.

1. From the Setup and Settings links, click link 1.

2. Click button 2.

3. C
 onfigure the user defined field. See the table
below for a breakdown of each field.

FIELD DESCRIPTION
Enter a name of this user-defined field.
This also becomes the label of the field.
Name
Consider how the field will be read when
it is displayed on the Identities page.
4
Select the field type. Depending on the
type of field, you can choose from the
following formats:

• String: Alphanumeric format

Type • Integer: Only numbers


• Date: Creates a date field. Click
in the field and the calendar will
appear
• Boolean: creates a checkbox
field; used to confirm an option

4. Click button 4 to save the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 179
26 REFERENCE

Add User Defined Tabs


You can add one or more tabs to the Identities screen to host user defined fields.

1. Click button 1. The User Defined Tab parameters


appears.

2. Name the user defined tab and click button 2 to


save the configuration.

3. O
 n the next screen, highlight the related user
defined fields you previously created and click
button 3 to add them as members of the tab.

4. Click button 4 to save the configuration.

Add a Map
1. From the Setup and Settings links, click link 1.
1

2. Click button 2.

180 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

3. C
 onfigure the map. See the table below for a
breakdown of each field.

FIELD DESCRIPTION
Name Enter a name for the map.
Click the Browse button to select the
image you want to use as the base 4
File of the map. You can select any raster
image in BMP, GIF, JPEG, PNG, PDF, TIP
and WMF format.
Check this box to leave the map
background white.
Blank
Canvas This option is primarily for setting up
Mustering dashboards that do not need
to be on a map.
Enter the map size in pixels.

NOTE: If you enter a size that matches


the image’s aspect ratio, the map image
Re-Size is re-sized accordingly. If you enter a
To size that does not match the image’s
aspect ratio, the system centers the
image then crops the sides to match
the defined setting.

4. Click button 4 to save the configuration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 181
26 REFERENCE

Configure Email Notifications

FIELD YAHOO MAIL MSN/HOTMAIL GOOGLE GMAIL


SMTP Server smtp.mail.yahoo.com smtp.live.com smtp.gmail.com
SMTP Port 587 587 587
SMTP Host Name Leave blank Leave blank Leave blank
Use TLS No Yes Yes
Use Start TLS No Yes Yes

1. From the Setup and Settings links, click link 1.

2. C
 onfigure the email server. See the table below
for a breakdown of each field.

FIELD DESCRIPTION
Enter the mailbox server for this
system. This is the name of the
server that handles the transfer of
SMTP
email. This field and the next four
Server
are required before email alerts can
be sent automatically in case of an
alarm or event occurs.
Enter the name of the port that is
SMTP Port
used to connect to the SMTP Server.
SMTP Host Enter the name of the host used for
Name SMTP traffic.
Check this box to indicate that
Use Start this appliance uses Start TLS
TLS cryptography to communicate with
the SMTP server.
Check this box to indicate that
this appliance uses generic TLS
Use TLS
cryptography to communicate with
the SMTP server.
Enter the email address of the
SMTP Mail
person or organization that email will
From
be from.
Enter the email addresses of
SMTP
persons to which email alerts are
User
sent in case of alarms.
SMTP Enter the password required to use
Password the email server.
Send Test Click to send a test email to the
Email ‘SMTP Mail from’ email address.

182 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE

3. Click button 3 to save the settings.

4. If the configuration is correct, you will see a


dialog box saying “Test Email Request Sent.”

NOTE: For any lessons regarding email notifications,


you do need access to a Name and Time server.
Otherwise, you will receive errors.

Configure Collaborations
1. From the setup links, click link 1.

2. Click button 2.

3. C
 onfigure the collaboration with the necessary
information. Depending on the type of
collaboration you choose, different options will
appear.

4. Click button 4 to save the collaboration.

© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 183
26 REFERENCE

Add External Systems


The ACM system can connect and integrate with external systems to provide video or power backup support.
Before you can connect and use the external systems, the external system must be installed and accessible
to the appliance over the local network.

NOTE: Some external systems may not be available if your system does not have the required license.

1. In the Setup & Settings links, click link 1.

2. D
 epending on the external system, select the
appropriate tab. For this example, we will add an
Avigilon server for integration. Click button 2.
2

3. Configure the external system. See the table


below for a breakdown of each field.

FIELD DESCRIPTION
Name Name for the Avigilon ACM server.
An alternative name that is
Alt Name automatically assigned by the ACM 4
system.
If you have more than 1 appliance
Appliance in your system, select the appliance
the ACM server should connect to.
Address Enter IP address of the ACM server.
Enter the port number used to
Port communicate with the ACM server.
The default port is 80.
Remote Enter the username for accessing
Username the server.
Remote PW Enter the password for the username.
Enter an ACM identity username
Local
that the external system can use to
Username
connect to the appliance.
Local PW Enter the password for the username.
Check this box to indicate that the
Password ACM server is online and able to
communicate with the appliance.

4. Click button 4 to save the configuration.


184 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219

You might also like