ACM Installer 2 Student Workbook
ACM Installer 2 Student Workbook
CERTIFICATION
CONTROL MANAGER™
STUDENT WORKBOOK
© 2019, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, and AVIGILON CONTROL
CENTER are trademarks of Avigilon Corporation. Other product names mentioned herein may be the
trademarks of their respective owners. The absence of the symbols ™ and ® in proximity to each trademark
in this document is not a disclaimer of ownership of the related trademark. Avigilon Corporation protects
its innovations with patents issued in the United States of America and other jurisdictions worldwide. www.
avigilon.com/patents Unless stated explicitly and in writing, no license is granted with respect to any
copyright, industrial design, trademark, patent or other intellectual property rights of Avigilon Corporation or
its licensors.
Avigilon Corporation
http://www.avigilon.com
2 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
TABL E O F CO N TEN TS
01 Getting Started 5 14 Collaborations 89
Terminology Chart 6 15 Overrides 93
ACM Installer II Assessment 7
16 Emergency Lockdown 99
02 Keypad Readers 11
17 Keypad Threat Levels & Dashboards 105
03 Mustering 19
18 Token Trigger output 111
04 ACM Verify 27
19 Door Forced Trigger Output 119
05 Anti-Passback 35
20 First Token Unlock 125
06 Delegations 39
21 Elevator Controls 131
07 Limiting Roles 45
22 Backup 139
08 Groups 49
23 Macros 143
09 Policies 55
24 Triggers 147
10 Routing Groups 61
25 Interlocks 153
11 User Trace 67
26 Reference 157
12 User Defined Fields 71
13 System Integration 75
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 3
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
4 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
GETTING STARTED
WHAT YOU WILL In this certification course, students will gain an advanced
LEARN understanding of the Avigilon™ Access Control Manager (ACM) system,
including topics ranging from anti-passbacks, triggers and lockdowns.
PREREQUISITES In order to enroll in this instructor-led course, students will first need
to access the Avigilon Training Center to enroll in and complete the
following online courses:
• ACM I Certification
HOW OFTEN This course will need to be retaken every two years to receive
TRAINING IS NEEDED certification.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 5
0 1 G E T T I N G S TA R T E D
TERM I NO LO GY C HA RT
Access control terminology will sometimes vary from company to company. See the standard terminology
section for the terms that are acceptable to describe Avigilon products.
6 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 1 G E T T I N G S TA R T E D
TIME
TOPIC ASSESSMENT
LIMIT
• onfigure a schedule, add the keypad reader, add access
C
1. Keypad Readers groups for the keypad, employees and principal and add a
keypad role
• Configure ACM Verify door, pair mobile device and use ACM
3. ACM Verify
Verify to check in identities
• Create a Door Policy that will override Door Mode for Front
8. Policies
and Lab door
15. K
eypad Threat Levels & • dd global actions for card and PIN, card or PIN, disable the
A
Dashboards reader and add a door grant and configure a dashboard
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 7
0 1 G E T T I N G S TA R T E D
TIME
TOPIC ASSESSMENT
LIMIT
8 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 1 G E T T I N G S TA R T E D
Access Certifications
Students are able to access their certifications through the Avigilon Training Center.
2. Click tab 2.
2
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 9
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
10 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
KEYPAD READERS
SCENARIO The principal just added a new keypad reader to the facility and he
wants it to be configured so during school hours teachers can badge
or enter a pin number to access the facility.
System Requirements:
• uring business hours, individuals will be allowed to present their
D
token or enter a PIN number to access the facility
• fter hours, they will have to use their token and PIN to access the
A
facility
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 11
0 2 K E Y PA D R E A D E R S
KEY PA D RE A D ER S
Configure the Schedule
In this scenario, the school needs two custom schedules: one for normal business hours and another for after
hours and weekends.
1. Click icon 1.
1
2. Click link 2.
12 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 2 K E Y PA D R E A D E R S
3. Click tab 3.
Installed Checked
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 13
0 2 K E Y PA D R E A D E R S
FIELD INFORMATION
Access Group 2
Principal Access
Name
Group
Appliance Workstation XX
Schedule Employees M-F
Installed Checked
Front Door, Lab Door,
Door Access
Elevator
Access Group 3
Name Keypad Access Group
Appliance Workstation XX
Schedule 24 hours active
Installed Checked
Add the keypad
Door Access
reader (elevator)
2. Select subtab 2.
14 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 2 K E Y PA D R E A D E R S
6. Click tab 6.
6
7. Highlight the Principal Access Group and click
button 7 to make it a member of the role.
8. Click button 8 to save the configuration.
9. Repeat steps 3-8 and use the following 7
information to create a role that will be able to
access the keypad reader:
FIELD INFORMATION
Role 2 8
Name Keypad Role
Parent Leave blank
Start Date Today’s Date
Stop Date 01/01/2021
Installed Checked
Access Group Tab Keypad Access Group
Create an Identity
1
1. Click tab 1.
2. Click button 2.
2
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 15
0 2 K E Y PA D R E A D E R S
FIELD INFORMATION
During normal hours, presenting the token OR entering the PIN code will grant access. After normal hours,
users will be forced to present their token AND enter their PIN.
Accessories
1. I configured a schedule.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 17
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
18 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
MUSTERING
INTRODUCTION To help track the location of users in an emergency, the ACM system
offers a Mustering feature. Mustering allows you to create a dashboard
to monitor who has arrived at the muster station and who is still
potentially in danger.
For the purpose of this class, we are only utilizing two readers: the lab
and mustering station (front door). Assume that the school has many
other readers and teachers have been assigned to their own areas with
in/out readers so that you can track the location of people in case of an
emergency.
SCENARIO The school principal wants the ability to utilize ACM for mustering. The
school has readers in the parking lot where the mustering station is
located.
System Requirements
• he principle needs a way to determine who is still in the building in
T
case of an emergency evacuation
• e also wants to be alerted when there are more than three people
H
in the lab at one time
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 19
03 MUSTERING
MUST E RI N G
Add the Areas
1. Click tab 1 2 1
2. Click subtab 2.
3
3. Click button 3.
FIELD INFORMATION
Area 1
Name Lab Area
Appliance Workstation XX
5 4
Max Occupancy 3
Log Max Reached 3
Enable Area Checked
Area 2
Name Mustering Station
Appliance Workstation XX
Enable Area Checked
1. Click tab 1
2. Click subtab 2. 2 1
20 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
03 MUSTERING
1. Click tab 1. 2 1
2. Click subtab 2.
6. Click tab 6.
4
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 21
03 MUSTERING
FIELD INFORMATION
Alarm Sound Alert
Instructions LAB MAX reached
Roles Super Admin
FIELD INFORMATION
Name Mustering Dashboard
Use Blank Canvas Checked
Re-Size To 800 x 600
4 3
4. Click button 4 to save.
22 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
03 MUSTERING
FIELD INFORMATION
Title Mustering Station
Title Font Color #ffffff (white)
Title Font Size Medium
Opacity 100%
Location 225 x 0
Element Type Graphic & Text
Area Group/ Area Mustering Station
Graphic Shape Circle
Graphic Color #455560 (Avigilon Gray)
Graphic Size 200
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 23
03 MUSTERING
Mustering
1. I created areas for mustering control and set the max number of people allowed in each area.
24 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 25
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
26 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ACM VERIFY
INTRODUCTION The ACM Verify function allows authorized users to connect any web
browser-enabled mobile device to ACM and use the device as a virtual
station.
A virtual station controls access to places that does not have access-
controlled doors or locks. E.g. Outdoor mustering stations for fire drills,
buses for school trips or a work area in an open-plan office. People
entering an area controlled by a virtual station must verify they are
authorized to access the area by entering their PIN code on the device.
Identities with the ACM Verify Administrator role add and configure
doors as ACM Verify stations and administer the virtual stations and
paired devices in ACM. They can also administer other doors. Identities
assigned the ACM Verify User role access the ACM Verify functionality
on their mobile devices which act as virtual stations and can pair their
mobile device to ACM.
SCENARIO The school principal wants to set up ACM Verify and add a virtual
station in case of an emergency evacuation. The principal will use a
web browser/ web browser-enabled device to check in teachers’ and
students’ PIN codes once they are safely outside the building.
System Requirements
• he principal needs a way to check teachers and students in during
T
an emergency evacuation
• e also needs to add a virtual station and set up users with the
H
correct permissions
2. Add an area.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 27
0 4 AC M V E R I F Y
ACM VE RI F Y
Create a New Access Group and User
1. Click tab 1.
2 1
2. Click subtab 2.
3. Click button 3.
3
FIELD INFORMATION
Name Virtual Station
Appliance Workstation XX
Schedule 24 Hours Active
Installed Checked 4
7. Select subtab 7. 7 6
8. Click button 8 to add a new role.
28 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 4 AC M V E R I F Y
4. Click tab 4.
Add an Area
1. Click tab 1. 2 1
2. Click subtab 2.
3
3. Click button 3 to add a new area.
FIELD INFORMATION
Name Safe Area
Appliance Workstation XX
Enable Area Checked
5 4
5. Click button 5 to save.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 29
0 4 AC M V E R I F Y
2. Click link 2. 2
3. Click tab 3.
3
4. Enable check box 4 to install the Avigilon vendor.
6. Click tab 6.
7. Click subtab 7. 7 6
8. Click link 8 to add a new door.
30 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 4 AC M V E R I F Y
FIELD INFORMATION
Name Virtual Door
Appliance Workstation XX
Avigilon (Once you select this
Vendor
option, more fields appear.
Installed Checked
ACM Verify
Station Type
Managed
Geographic Select your timezone from the 10 9
Timezone dropdown menu.
Into Area Safe Area
Station
Login
Authentication
Create an Identity 1
1. Click tab 1.
2. Click button 2.
FIELD INFORMATION
Name Virtual Identity
Roles Tab Add Teacher Role
Internal Number: 1
Tokens Tab
PIN: 0000
Photos Tab Add a photo
4
4. Click button 4 to save.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 31
0 4 AC M V E R I F Y
ACM Verify
2. I added an area.
32 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 33
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
34 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ANTI-PASSBACK
INTRODUCTION APB is a feature that requires an identity to exit an area before entering
another area.
o track APB, a reader must be installed on both the inside and the
T
outside of the area entry. Users are required to use their token to enter
and exit the area
For example, a typical parking lot user would normally present their
token at the “in” reader to enter the lot and present it at the “out”
reader to exit the lot. However, if a user presents their token at the
“in” reader and passes the token back to a friend, the token would be
denied access the second time when the friend presents it.
SCENARIO The school principal wants to secure utilization of the school lab and to
know who is in the lab at all times.
System Requirements
• nsure that users have to present their tokens in order to enter and
E
leave the lab
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 35
0 5 A N T I - PA S S B AC K
1. Click tab 1.
2. Click subtab 2. 2 1
3. Click button 3 to add a new area.
3
FIELD INFORMATION
Name Main Area
Appliance Workstation XX
Enable Area Checked
5 4
5. Click button 5 to save.
FIELD INFORMATION
Door Front Door
APB Mode Hard Area APB
Into Area Main Area 4
APB Reset
In the event of an emergency, all the people in a building may leave an area at once and arrive at a mustering
area together without using their access card at each door they encounter. This may cause the system to
detect multiple anti-passback conditions. To avoid granting each individual a free pass, you can reset the anti-
passback condition for the panel.
1. Click tab 1.
NOTE: Before moving on, remember to go back into the Door Operations tab and disable the APB Mode. This
will prevent issues from occurring in other lessons.
Anti-Passback
1. I added an area.
38 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
DELEGATIONS
INTRODUCTION The delegation feature allows administrators to control what a user can
do and see in the system.
SCENARIO The school principal needs to restrict the secretary’s access to the ACM
system.
System Requirements:
• The secretary should have access to the Identities tab
• he secretary needs the ability to assign a role to other users, but all
T
other features should be disabled
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 39
0 6 D E L E G AT I O N S
DEL E GAT I O N S
Add a Delegation
1. Click tab 1. 2 1
2. Click subtab 2. 3
3. Click button 3 to add a new delegation.
2. Click subtab 2.
40 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
0 6 D E L E G AT I O N S
2. Click button 2.
FIELD INFORMATION
Name Jane Smith
Login Secretary
Password Secret123
Roles tab Secretary
4
Enter the internal number from
Token tab
one of your tokens
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 41
0 6 D E L E G AT I O N S
Monitor
Do you have access to this tab?
Alarms
If you try any other part of the system, you should receive similar error messages.
NOTE: Remember to log back in with the Super Admin account when you are finished.
Delegations
1. I added a delegation.
42 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 43
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
44 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
LIMITING ROLES
INTRODUCTION The ACM system allows administrators to limit the ability of a local
system administrator to assign roles to other users.
SCENARIO The school principal wants the secretary to add users to the system,
but he wants to limit her to only assigning school access from 8AM to
5PM on weekdays.
System Requirements:
• Standard employee with access from M-F 8AM-5PM
• Limit the secretary’s ability to assign permissions
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 45
07 LIMITING ROLES
L IMI T I N G ROLE S
Create Roles
1. Click tab 1. 2 1
2. Click subtab 2.
FIELD INFORMATION
Name Employees M-F
Parent Blank
Start Date Today’s Date
Stop Date 01/01/2021
Installed Checked
Access Group Tab Employees M-F 5 4
FIELD INFORMATION
Assign Only Weekday
Name
Access
Parent Blank
Start Date Today’s Date
Stop Date 01/01/2020
Installed Checked
Access Group Tab Employees M-F
Asgn Roles Tab Employees M-F role
46 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
07 LIMITING ROLES
STEPS
1. Log out of the appliance and log back in with the Secretary account you created in the previous section.
3. If you set this configuration up correctly, in the Roles tab, you should see “Employees M-F” as the only
available role that you can assign.
NOTE: When the secretary creates new identities, she can only assign the “Employee M-F” role to the
cardholders. If needed, you can assign other roles to her by entering more roles under the “Asgn Roles” tab
under Roles. Remember to log back in with your Super Admin account when you are finished.
Limiting Roles
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 47
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
48 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
GROUPS
SCENARIO The school principal wants group the Front Door and Lab Door
together so that a template batch update can easily be configured,
when necessary.
2. Assign components.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 49
08 GROUPS
GROU P S
Introduction
The groups feature allows you to group hardware components like cameras, doors, etc. and/or system
components such as identities, roles, etc. Groups are useful for various functions, including:
• Applying identity profiles to many people at a time using the batch update feature.
• Applying door templates to many doors at once using the batch update feature.
• Enabling operators to monitor specific event types and hardware components through routing
groups.
• Assigning policies to override settings on a group of hardware components.
2. Click subtab 2. 3
3. Click button 3 to add a new group.
FIELD INFORMATION
Name Door Group 6
FIELD INFORMATION
Type Door
Members List Lab Door, Front Door
7
NOTE: If there are 10 or more entries in the list in
the Available window, a standard Search will be
displayed and can be used to narrow the list. If
there are more than 2000 entries then an Advanced
Search will be displayed to enable you to narrow
the list.
8
8. Click button 8 to save.
50 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
08 GROUPS
NOTE: If pop-ups blockers are enabled in your web browser, there is a risk of losing a door template batch
update report. When a door template batch update is performed on a group of doors, a report is generated
that you can save to your local system. If pop-ups from the ACM client are blocked by your web browser, the
report cannot be saved. Your web browser will notify you that the pop-up is blocked, and offer you the option
to unblock the pop-up.
2. Click subtab 2.
Delete a Group
1. Click tab 1. 2
1
2. Click subtab 2.
Groups
52 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 53
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
54 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
POLICIES
SCENARIO The school principal has been informed that the card readers for the
Front Door and Lab Door are malfunctioning and will not grant access
when card tokens are presented. As he investigates this issue, he
would like to create a policy that will temporarily override the door
mode for the Front Door and Lab Door so that staff can continue to
enter freely using a PIN.
System Requirements:
• reate a policy that will override the Front Door and Lab Door’s door
C
mode from Card Only to PIN Only.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 55
09 POLICIES
POL I C I E S
Managing Policies
You can use policies to override settings on a group of doors, inputs, and outputs. This feature is useful if you
want to quickly change security settings on many components or do a full system lock-down. It may also be
used for a permanent application to ensure proper and uniform setup of doors.
In the case of a conflict between an object and the policy applied to it, the policy will win and override the
setting. For example, if a door has a door mode of “Card Only” and a policy sets a door mode of “Unlocked”,
the door will be unlocked. In the event that multiple policies are applied to an object and there is a conflict
between polices, the newest policy will apply.
Add a Policy
1. Click tab 1. 2 1
2. Click subtab 2. 3
3. Click button 3 to add a new policy.
4. S
elect the hardware types that you want to
override. Use the following information for 6
configuration:
FIELD INFORMATION
4
Name Door Policy
Installed Checked
Door Checked 5
8
56 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
09 POLICIES
1. Click tab 1.
2. Click subtab 2. 2
1
3. Select Door Group.
4. Click tab 4.
2. Click subtab 2. 1
3. Under column 3, the Front Door and Lab Door
should now be configured as PIN Only to reflect
the policy override. 3
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 57
09 POLICIES
Using the table, complete the test and describe what happens in order to verify that you set up the
configuration correctly.
Delete a Policy
1. Click tab 1. 2 1
2. Click subtab 2.
Policies
1. I added a policy.
58 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 59
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
60 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ROUTING GROUPS
INTRODUCTION Routing groups associate event types with groups to allow certain
users to monitor specific event types and components during a
specified time interval.
he user will only be able to view the event types that are generated
T
by members of the specified groups.
SCENARIO The school principal wants to limit the security guard’s visibility to the
system by only allowing him to see events related to the front door of
the school.
System Requirements:
• Security guard only sees events for the front door
• Invalid credentials, Door Held and Door Forced events
• Principal can see all events
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 61
10 ROUTING GROUPS
ROU T I N G G R O UP S
Add a Delegation
Before we can create the routing group, we need to add a delegation with permissions for the Security Guard.
1. Click tab 1.
2. Click subtab 2. 2 1
3. Click button 3 to add a new delegation. 3
62 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
10 ROUTING GROUPS
3. Click subtab 3.
FIELD INFORMATION 7
Name Guard
Type: Door
Members tab
Members: Front Door
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 63
10 ROUTING GROUPS
13. Access the Security Role and click tab 13. Add 13
“Security Guard” to the Members list.
14
64 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
10 ROUTING GROUPS
Routing Groups
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 65
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
66 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
USER TRACE
INTRODUCTION The trace feature allows for individual identity tracking as they present
their tokens to readers.
SCENARIO The principal wants to receive an alert when a particular teacher arrives
at the school.
System Requirements
• eeds the ability to track a particular individual upon arriving at the
N
school
• Send an email alert to the principal for individual tracking
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 67
1 1 U S E R T R AC E
U SE R T RAC E
Configure Card Trace Event
1. Click tab 1. 1
2
2. Click subtab 2.
FIELD INFORMATION
“Operator, contact school principal
Instructions
and report this user onsite”
Your Email Address (if email
Email
notifications have been set up)
Super Admin
Trace an Identity
Now that you have the event configured, we need to apply this to an identity. Access the Identities page in
your ACM system and complete the steps.
68 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 1 U S E R T R AC E
FIELD INFORMATION
“Operator, contact school principal
Instructions
and report this user onsite”
User Trace
70 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
USER DEFINED FIELDS
INTRODUCTION The Identities feature is the part of the system where administrators
define and store information about each user.
SCENARIO The school principal would like to store some additional information
that is not currently present in the standard ACM fields. He would like
three tabs containing various information.
System Requirements:
• Emergency Tab
• Vehicle Tab
• Personal Info Tab
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 71
12 USER DEFINED FIELDS
U SE R DE F I N ED F I E LD S
Add User Defined Fields 1
1. From the setup links, click icon 1.
2. Click link 2.
3. Click button 3.
FIELD INFORMATION
Emergency Contact Name
Emergency Contact Number
Model
Make 5
Name
License Plate
Cell Phone
Certification Level
Home Address
72 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
12 USER DEFINED FIELDS
1. Click tab 1. 1
2. Click button 2.
74 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
SYSTEM INTEGRATION
INTRODUCTION The Avigilon system integration allows you to achieve a unified security
system. An Access Control Manager appliance can be integrated into
an Avigilon Control Center site so that the events occurring in the ACM
software can trigger rules in the ACC software to initiate action.
SCENARIO The principal would like the cameras to start live streaming when
front door access is denied after hours. With this setup, the night time
security guards can see who is attempting to access the stadium after
hours.
System Requirements:
• Unified ACC ACM
• SHA-256 Fingerprint ID
ACC
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 75
1 3 S Y S T E M I N T E G R AT I O N
ACC / ACM I N T E G R AT I O N
Introduction
An ACM appliance can be integrated into an ACC site so that events occurring in the ACM software can
trigger rules in the ACC software to initiate actions. For example, door events in the ACM software can trigger
a rule that allows an ACC operator to grant door access, or an input event from a panic button or motion
sensor in the ACM software can trigger a live camera feed, or video recording.
ACM Setup
1. Create a delegation for interacting with ACC.
1. Select tab 1.
2. Click subtab 2. 1
2
3. Click button 3 to create a new delegation for
integrating with the ACC software.
3
76 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N
FIELD INFORMATION
Partition If applicable
4
Appliance Listing
Delegations Listing
Doors Grant
Doors Listing
Identities Listing
Identities Login - Remote
Members Identities Photo Render 5
Inputs Listing
Panels Listing
Partitions List
Roles Listing
Subpanels Listing
System Summary Listing
Create a Routing Group for Working with the ACC Software ACM
1. Click subtab 1. 1
2. Click button 2 to create a new routing group.
2
FIELD INFORMATION
Partitions If applicable
FIELD INFORMATION
Create a Role that Allows Communication between ACC and ACM ACM
1. Click subtab 1.
1
2. Click button 2 to create a new role.
2
FIELD INFORMATION
Parent Default
Installed Checked
Partitions If applicable
78 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N
To protect the security of the connection between the ACM and ACC systems, the dedicated identity should
only have the permissions outlined in this procedure.
1. Click subtab 1. 1
2. Click button 2 to create a new identity.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 79
1 3 S Y S T E M I N T E G R AT I O N
FIELD INFORMATION
Password AVO2019!
80 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N
2
1. Login to ACC software using the workstation
cards and credentials provided by the instructor.
FIELD INFORMATION
Port 443
4
Username ACC ACM Integration Identity
Password AVO2019!
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 81
1 3 S Y S T E M I N T E G R AT I O N
To provide users with control over doors, you must import roles from the ACM application. When you import a
role, you are also importing all the identities that are assigned to the role.
Imported roles can be edited like any existing group in the ACC Client software. You can assign a rank,
feature privileges, and device access rights to the imported role. However, be aware that you cannot assign
users to the role from the Client software.
Imported identities can be added to any existing group in addition to the role they were imported with.
Imported identity information, including login credentials, is maintained by the ACM application. In the ACC
Client software, you can only disable an imported user or configure the user’s Login Timeout settings.
2. Click tab 2.
6. Click button 6.
6
82 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 83
1 3 S Y S T E M I N T E G R AT I O N
Door Setup
Doors can only be linked if they:
Steps
or subpanels.
2. Click button 2.
1
2
3. Select button 3.
84 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N
2. Click button 2.
4. Click button 4.
3
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 85
1 3 S Y S T E M I N T E G R AT I O N
FIELD INFORMATION
Schedule Always
9
Rule is Enabled Checked
86 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 3 S YS T E M I N T E G R AT I O N
2
FIELD INFORMATION 3
Username ACC ACM Integration Identity
Password AVO2018!
3. Select subtab 3.
5. Click button 5. 5
System Integration
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 87
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
88 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
COLLABORATIONS
INTRODUCTION Collaborations allow the ACM system to exchange data with third party
databases and applications.
SCENARIO The principal needs to import identity information from a third party
system that can generate a CSV file.
System Requirements:
• Import first/last name and employee number
• One time import
2. Run a collaboration.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 89
1 4 C O L L A B O R AT I O N S
2. S
ave the file as CSV (comma delimited). If you
see a pop up message about losing some
features of the workbook, click yes to proceed.
2. Click button 2.
FIELD INFORMATION
Name CSV Import
Appliance Workstation XX
Type Identity CSV one-time Long Format
Installed Checked
Delimiter , (comma)
File Your saved CSV File
4 3
4. Click button 4 to save the collaboration.
90 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 4 C O L L A B O R AT I O N S
Search for the identities you just Click in one of the records and you should see that only three
Identities
imported, What information can you fields were imported: Last name, First name and External
Search
see about them? System ID.
Collaborations
2. I ran a collaboration.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 91
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
92 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
OVERRIDES
Possible schedules:
• Take effect immediately
• Configured in advance
System Requirements:
• Overrides can only be added to doors that users are authorized to
access and are on the same ACM server.
• Overrides are only supported on Mercury panels using firmware
1.27.1, or later.
2. Add an override.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 93
15 OVERRIDES
OVE RRI DE S
Introduction
Overrides can be used to apply a temporary one-time change to the normal door mode of a selected set of
doors. They can be scheduled to take effect immediately, or in advance. When an override ends, the door(s)
returns to the mode they are supposed to be in according to their schedule at that time.
NOTE: Overrides are only supported on Mercury panels using firmware 1.27.1, or later.
Discussion
What are some scenarios in which overrides would be beneficial?
Override Priorities
Override functionality is designed to work best with your regular door schedules. Overrides have a medium
priority-level in the ACM priority hierarchy and many higher-priority actions take precedence. For example, a
manual command to a specific door, or a priority lockdown command to a set of doors, takes precedence. If a
priority lockdown occurs while an override is in effect, the priority lockdown becomes active. After the priority
lockdown has been cleared by the Priority ACM Operator, the override becomes active on the doors if it is still
in effect; otherwise, each door returns to its regular schedule for that time.
An override starts and ends at the beginning of the minute of its scheduled time. Therefore it always overlaps
or matches the start or end time of a regular schedule or override when the end time of one is the same as
the start time of the other.
Override Accessibility
You can only add an override to doors you are authorized to access that are on the same ACM server.
However, you can modify or delete any override, and your changes will apply to all the doors in the override,
including doors you are not normally authorized to access. If partitioning is used in your ACM system and
you expect users authorized for specific partitions to modify an override, define individual overrides for each
partition rather than a single override that spans multiple partitions. Otherwise, users can modify overrides
that affect doors they cannot see and be unaware of any changes.
94 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 5 OV E R R I D E S
Add an Override
1. Click tab 1. 2
1
2. Click subtab 2. The Door Listing page is
displayed.
3
3. Check Front Door and click button 3. The
Override dialog box is displayed.
FIELD INFORMATION
Parent Teacher Interview: Unlock
Name
Front Door
Facility Code Only 4
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 95
15 OVERRIDES
96 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 5 OV E R R I D E S
Monitor Overrides
Maps can be used to monitor overrides on doors. When a door that is displayed on a map is included in an
override, the status indicator for the door is updated to display a blue disk. See below for an example:
Overrides
2. I added an override.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 97
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
98 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
EMERGENCY LOCKDOWN
INTRODUCTION Global actions are a powerful feature of the ACM system and can
provide custom setup where customers require a specific functionality.
SCENARIO The school principal needs some help to improve the functionality of
the school’s ACM system. Due to recent events in schools throughout
the country, the principal needs the ability to immediately lock the
building down, in case of an emergency.
System Requirements:
• Use a special badge to lock the system down from any reader
• Use a secondary badge to restore the system to normal operation
• hen the system is in lockdown mode, only the principal can
W
restore the system using the restore badge. (He will have this badge
with him at all times)
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 99
1 6 E M E R G E N C Y LO C K D OW N
EME RG E N CY LO C K D OW N
Add Global Actions
1. Click tab 1. 1
2. Click subtab 2. 2
3. Click button 3 to add a new global action. 3
FIELD INFORMATION
Name Lock all Doors
Appliance Workstation XX
Type Door Mode
Sub-Type Restored
Priority Checked
Members Front Door, Lab Door, Elevator Door 5
4
5. Click button 5 to save.
FIELD INFORMATION
Name Restore all Doors
Appliance Workstation XX
Type Door Mode
Sub-Type Restored
Priority Checked
Members Front Door, Lab Door, Elevator Door
100 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 6 E M E R G E N C Y LO C K D O W N
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 101
1 6 E M E R G E N C Y LO C K D OW N
Emergency Lockdown
102 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 103
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
104 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
KEYPAD THREAT LEVELS &
DASHBOARDS
INTRODUCTION You can use global actions and linkages to change system behavior. In
this lesson, we will introduce the concept of “threat levels”. This gives
administrators the ability to configure the system to accommodate
various customer needs.
SCENARIO The principal wants the ability to implement security threat levels in the
ACM system at the school.
ll perimeter doors are secured with Card and Pin Readers and some
A
perimeter doors are unlocked during normal operation.
System Requirements
• Three security threat levels:
◦◦ Green: Normal conditions and keypad readers allow for badge
OR pin
◦◦ Yellow: All perimeter keypad readers will require a badge AND
pin
◦◦ Red: No access to the building
• A button that manually grants access to the front door
2. Create a dashboard.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 105
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S
Global
1. Card and PIN
2. Card or PIN
4. U
se the following information to add the Card
and Pin global action:
FIELD INFORMATION
Name Card and Pin
Type Door Mode
Sub-type Card and Pin
Members Elevator Door
5 4
5. Click button 5 to save.
6. Repeat steps 1 to 5 and use the following
information to add the Card or Pin global action:
FIELD INFORMATION
Name Card or Pin
Type Door Mode
Sub-type Card or Pin
Members Elevator Door
106 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S
FIELD INFORMATION
Name Grant Access to Front Door
Type Door Grant
Members Front Door
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 107
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S
5. U
se the following information to configure the
dashboard:
5
FIELD INFORMATION
Name Threat Level Dashboard
File Security Dashboard Threat Levels file 7
Re-Size To 800 x 600
108 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 7 K E Y PA D T H R E AT L E V E L S & DA S H B OA R D S
2. I created a dashboard.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 109
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
110 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
TOKEN TRIGGER OUTPUT
SCENARIO
The school principal is looking to implement an initiative to reduce
the amount of electricity consumed in the school district. This is a pilot
program and if his school goes well, they will implement the solution
statewide.
System Requirements:
• token for teachers that will trigger the output to turn on the air
A
conditioner in the classrooms
• token for the principal that will turn off the air conditioners in all
A
classrooms when presented to any reader in the school
• predetermined schedule at the end of business hours which will
A
turn the AC off in case the principal is not at the school
3. Add global actions to trigger the LED as the output for the AC.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 111
1 8 TO K E N T R I G G E R O U T P U T
TO K E N T RI GGER O UT P UT
Add the Teacher Identity
Since you already have your Principal identity configured, we now need to create the Teacher identity.
Remember, there are three components you need when configuring users in the ACM system.
1. Click tab 1.
2. Select subtab 2.
2 1
3. Click button 3 to add a new access group.
FIELD INFORMATION
Name Teacher Access Group
Appliance Workstation XX
Schedule Employees M-F
5 4
Installed Checked
Members Front Door, Lab Door, Elevator
112 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 8 TO K E N T R I G G E R O U T P U T
8. Click tab 8. 8
9. Click button 9.
FIELD INFORMATION
Name Norah Parks
Login Teacher2
Password Teach000
Roles tab Teacher Role
Use the internal number
Token tab
from one of your tokens
2. Click subtab 2. 3
4. Click button 4. 4
FIELD INFORMATION
Output Air Conditioner (Subpanel 0 Output 2)
Installed Checked
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 113
1 8 TO K E N T R I G G E R O U T P U T
FIELD INFORMATION
Name Air Con On
Appliance Workstation XX
Type Output
Sub-Type Activate
Door Air Conditioner (red LED)
5 4
5. Click button 5 to save.
FIELD INFORMATION
Name Air Con Off
Appliance Workstation XX
Type Output
Sub-Type De-activate
Door Air Conditioner (red LED)
114 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 8 TO K E N T R I G G E R O U T P U T
FIELD INFORMATION
Name Teacher Token Turn On AC
Appliance Workstation XX
Points Returns Leave blank
Type: Door
Devices tab
Members: Add all of your doors
4
Members: Local Grant, Local
Events tab
Grant - Not Used
Tokens tab Members: Teacher token
Actions tab Members: Air Con On
FIELD INFORMATION
Name Principal Token Turn Off AC
Appliance Workstation XX
Points Returns Leave blank
Type: Door
Devices Tab
Members: Add all of your doors
Members: Local Grant, Local
Grant - Not Used
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 115
1 8 TO K E N T R I G G E R O U T P U T
2. Click tab 2. 2
3. Click button 3 and add a new Job Specification
using the following information: 3
FIELD INFORMATION
Name Auto AC Off
Type Global Action
Global Action Air Con Off
116 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
1 8 TO K E N T R I G G E R O U T P U T
Green LED:
Red LED:
Green LED:
Red LED:
3. I added global actions to trigger the LED as the output for the AC.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 117
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
118 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
DOOR FORCED TRIGGER
OUTPUT
INTRODUCTION This lesson will show you how to configure an alarm to trigger an
output.
SCENARIO
The school needs the ability to turn on a set of lights if/when anyone
forces the back door open. In addition, the principal wants to receive
an email alert when this happens.
System Requirements:
• Monitor the forced door alarm for the back area of the school
• Display alarm in the monitor event viewer
• Trigger an output to turn on the lights in the back of the warehouse
• Email notification sent to the principal’s email
2. A
dd global actions to turn the LED on/off and to send an email
notification.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 119
19 DOOR FORCED TRIGGER OUTPUT
DOO R F O RC ED T R I G GER
OUTPUT
Add Global Actions
Global
1. Turn LED On
1. Click tab 1.
2. Click subtab 2.
1
3. Click button 3 to add a new global action. 2
3
FIELD INFORMATION
Name Turn LED On
Appliance Workstation XX
Type Output
Sub-Type Activate
Members Red LED output (Subpanel 2 Output 3)
5 4
5. Click button 5 to save.
FIELD INFORMATION
Name Turn LED Off
Appliance Workstation XX
Type Output
Sub-Type Deactivate
Members Red LED output (Subpanel 2 Output 3)
120 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
19 DOOR FORCED TRIGGER OUTPUT
FIELD INFORMATION
Name Email Principal
Appliance Workstation XX
Type Email
Email Address Your email address
Global
1. Door Forced Activate
Linkages
1. Click subtab 1.
1
2
FIELD INFORMATION
Name Door Forced Activate
Appliance Workstation XX
Points Returns Leave blank
Type: Door
Devices tab
Add all of your doors
4
Events tab Forced Door
Email Principal and turn
Actions tab
LED on
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 121
19 DOOR FORCED TRIGGER OUTPUT
FIELD INFORMATION
Name Door Forced Deactivate
Appliance Workstation XX
Points Returns Checked
Type: Door
Devices tab
Add all of your doors
Events tab Forced Door
Actions tab Turn LED Off
1. Click tab 1.
3. Click tab 3.
3
4. Scroll down to find the Forced Door event and
click button 4.
FIELD INFORMATION
Alarm
Intruder Alert
Sound
6
122 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
19 DOOR FORCED TRIGGER OUTPUT
Acknowledge the alarm to move the active alarm to the Acknowledged Alarms section.
2. I add global actions to turn the LED on/off and to send an email notification.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 123
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
124 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
FIRST TOKEN UNLOCK
SCENARIO
The principal wants the front door to unlock with the first valid token of
the day and remain open until the end of the business day.
System Requirements:
• Unlock the front door with the first valid token after 8AM M-F
• Automatically lock the front door after 5PM every day
• If a valid token is presented to the front door during business hours,
the system should lock the door
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 125
2 0 F I R S T TO K E N U N LO C K
FIR ST TO K E N UN LO C K
Add the Global Actions
In order to complete the customer’s order, we need to configure the global actions and trigger them using
global linkages.
1. Click tab 1.
2. Click subtab 2.
1
3. Click button 3 to add a new global action. 2
3
FIELD INFORMATION
Name Unlock Front Door
Appliance Workstation XX
Type Door Mode
Sub-Type Unlock
5 4
Members Front Door
FIELD INFORMATION
Name Restore Front Door
Appliance Workstation XX
Type Door Mode
Sub-Type Restore
Members Front Door
126 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 0 F I R S T TO K E N U N LO C K
FIELD INFORMATION
Unlock Front Door with Valid
Name
Token during Business Hours
Appliance Workstation XX
Schedule Employees M-F
Points Returns Leave blank
Type: Door 4
Devices tab
Members: Front Door
Events tab Local Grant
Add all of your tokens (except for
Tokens tab
the Principal’s emergency token)
Actions tab Members: Unlock Front Door
FIELD INFORMATION
Lock Front Door with Valid
Name
Badge During Business Hours
Appliance Workstation XX
Schedule Employees M-F
Points Returns Leave blank
Type: Door
Devices tab
Members: Front Door
Opened Unlocked Door
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 127
2 0 F I R S T TO K E N U N LO C K
2. Click tab 2. 2
3. Click button 3 and add a new Job Specification
using the following information: 3
FIELD INFORMATION
Name Lock Front Door after 5 PM
Type Global Action
Global Action Restore Front Door
128 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 0 F I R S T TO K E N U N LO C K
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 129
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
130 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
ELEVATOR CONTROLS
SCENARIO
The principal wants to configure an elevator with secure control for a
new school wing. They have one cab with six floors.
System Requirements
• Valid tokens will allow access from the lobby to the first four floors
• Fifth floor is secured for accounting
• Sixth floor is secured for principal and admin staff
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 131
2 1 E L E VATO R C O N T R O L S
ELE VATO R C O N T R O LS
Configure Elevator Door
Before beginning this lesson, configure the elevator door using the information below.
1. Click tab 1.
FIELD INFORMATION
Access Type Elevator Feedback
Door Mode Card Only
If there is a custom mode or
Others
schedule, remove it
5. Click tab 5.
6 7
8
132 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 1 E L E VATO R C O N T R O L S
Elevator
1. Lobby: First Four Floors
1. Click tab 1.
1 2
2. Click subtab 2.
3. Click button 3.
4. U
se the following information to configure
elevator access levels:
5
FIELD INFORMATION
Floors 1 - 4
Description Floors 1-4 M-F 8 AM-5 PM
Schedule Employee M-F
Floors 5
Description Floors 5 M-F 8 AM-5 PM
Schedule Employee M-F
Floors 6
Description Floors 6 Staff Only
Schedule 24/7
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 133
2 1 E L E VATO R C O N T R O L S
1. Click tab 1.
2. Select subtab 2.
2 1
3. Click button 3 to add a new access group.
FIELD INFORMATION
Access Group 1
Name Elevator Floors 1-4 Access Group
Appliance Workstation XX
Schedule Employees M-F
Elevator
Floors 1-4 M-F 8 AM-5 PM
Access Level
Installed Checked
Doors Add the Elevator Door
Access Group 2
4
Name Elevator Floor 5 Access Group
Appliance Workstation XX
Schedule Employees M-F
Elevator
Floors 5 M-F 8 AM-5 PM
Access Level
Installed Checked
Doors Add the Elevator Door
Access Group 3
Name Elevator Floor 6 Access Group
Appliance Workstation XX
Schedule 24/7
Elevator
Floors 6 Staff Only
Access Level
Installed Checked
Doors Add the Elevator Door
134 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 1 E L E VATO R C O N T R O L S
2. Select subtab 2.
4. U
se the following information to create 3 roles
for elevator floors 1-4, 5 and 6.
FIELD INFORMATION
4
Role 1
Name Elevator Floors 1-4 Role
Start Date Today’s date
Stop Date 01/01/2021
5
Installed Checked
Access Groups Elevator Floors 1-4 Access Group
Role 2
Name Elevator Floor 5 Role
Start Date Today’s date
Stop Date 01/01/2021
Installed Checked
Access Groups Elevator Floor 5 Access Group
Role 3
Name Elevator Floor 6 Role
Start Date Today’s date
Stop Date 01/01/2021
Installed Checked
Access Groups Elevator Floor 6 Access Group
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 135
2 1 E L E VATO R C O N T R O L S
1. Click tab 1.
1
2. Search and click the link for your Principal
(Tommy Jones).
3. Click tab 3.
FIELD INFORMATION
Secretary
Search Jane Smith
Roles tab Add Elevator Floors 1-4 Role
Teacher 5
Search Will Turner
Roles tab Add Elevator Floor 5 Role
136 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 1 E L E VATO R C O N T R O L S
Elevator Controls
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 137
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
138 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
BACKUP
SCENARIO
Now that the school’s system is configured, the principal wants to
make sure they have a copy of the configuration in case the appliance
becomes corrupted.
System Requirements
• Schedule a backup every day at 10 PM
• The backup will be stored in a shared folder on the school network
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 139
2 2 B AC K U P
BAC K U P
Run a Backup
Backups can be used to restore information if an appliance’s configuration or transaction data ever becomes
corrupted. Backups can either be scheduled or manually initiated and stored on a USB drive or shared
folder. After you’ve set up a backup event, you can manually initiate a system backup outside the configured
schedule. First, verify the host’s sharing permissions. In this example, your USB drive is the host.
Backup
140 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 141
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
142 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
MACROS
acros can range from a simple process like turning off the lights or
M
masking an input, to sophisticated multi-step procedure that closes
down the air conditioning system, unmasks alarms, locks all doors
connected to a panel, turns out lights and then e-mails the operator for
more instructions.
SCENARIO
The principal wants a buzzer to turn on if anyone holds the front door
open.
System Requirements
• If the front door is held open, a buzzer should sound for as long as
the door is kept open
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 143
23 MARCROS
MAC RO S
Add a Macro
Complete each of the steps on your workstation to configure a macro on Panel 2, Output 4.
1. Click tab 1.
3. Click tab 3.
Macros
146 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
TRIGGERS
INTRODUCTION Areas are zones that Access Control Manager assigns to define a
physical area within a secured location. This area can be relatively
small, like a lab or a storeroom; or large, like a collection of buildings.
Areas often incorporate one or more doors with their attached inputs
and outputs. Once an area is defined, it can be assigned to a role or
policy to limit user access within a building or facility.
SCENARIO The principal needs some help to restrict occupancy in the school lab.
System Requirements:
• Lab has a maximum occupancy of three users
• hen capacity is reached, turn on a sign outside the lab indicating
W
Max Capacity
• The sign turns off when occupancy count has returned to zero
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 147
24 TRIGGERS
TR IG G E RS
Area and Door Operations
We will need to use the lab area we configured in previous lessons and build upon that in order to complete
the order for this customer. We have also already configured the door operations that are necessary for this
configuration. In a normal situation, you may have to do that at the time of setup.
1. Click tab 1.
3. Click tab 3. 3
4. Click button 4.
5. Click button 5.
FIELD INFORMATION
Occupancy reached Limit Turn
Name
On LED
Command Output control
Output Red LED (Subpanel 2 Output 2)
Function On 6
7
Group Group A
148 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
24 TRIGGERS
FIELD INFORMATION
Name Occupancy Reached Zero, LED Off
Command Output control
Output Red LED (Subpanel 2 Output 2)
Function Off
Group Group B 8
1. Click tab 1.
3. Click tab 3. 3
4. Click button 4.
FIELD INFORMATION
Name Occupancy LED On
Enabled Checked
Schedule 24 hours active
Macro Occupancy Count LED On
Command Execute only actions A
Source Type Area
Source Lab Area 5
6
Event Type Area Status Change
Event Area - occupancy - max reached
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 149
24 TRIGGERS
FIELD INFORMATION
Name Occupancy LED Off
Enabled Checked
Schedule 24 hours active
Macro Occupancy Reached Zero, LED Off
Command Execute only actions B
Source Type Area
7
Source Lab Area
Event Type Area Status Change
Event Area-occupancy count - zero
Triggers
150 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 151
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
152 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
INTERLOCKS
SCENARIO
The principal wants to add a panic button at the receptionist desk to
disable the front door in case of an emergency.
System Requirements:
• nce the panic button is pressed, the front door reader will be
O
disabled
• he principal will utilize his/her token to return the front door to
T
normal operation
2. Add interlocks.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 153
2 5 I N T E R LO C K S
INTE RLO CK S
Configure an Input
The Principal wants the Receptionist to be able to push a button in case of an emergency, which means we
need to configure an input to take care of that.
1. Click tab 1.
Add Interlocks
1. Once you save your Panic Button input, you will 1
be taken back to the Input listing page. Click on
link 1.
154 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
2 5 I N T E R LO C K S
FIELD INFORMATION
Name Input Disable Front Door
Enable Checked
Schedule 24 hours active
Source Type Input point
Event Type Point change of state
Event Point in alarm
Interlocks with: Type Door
Interlocks with: Target Front door reader
Command Door mode control
Function Disable the door
Interlocks
1. I configured an input.
2. I added interlocks.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 155
01 Getting Started
02 Keypad Readers
03 Mustering
04 ACM Verify
05 Anti-Passback
06 Delegations
07 Limiting Roles
08 Groups
09 Policies
10 Routing Groups
11 User Trace
12 User Defined Fields
13 System Integration
14 Collaborations
15 Overrides
16 Emergency Lockdown
17 Keypad Threat Levels & Dashboards
18 Token Trigger Output
19 Door Forced Trigger Output
20 First Token Unlock
21 Elevator Controls
22 Backup
23 Macros
24 Triggers
25 Interlocks
26 Reference
156 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
REFERENCE
HOW TO USE Refer to this section as a “how-to” for configuring the features within
THIS SECTION the ACM system
tudents will not have the steps broken out in each lesson, so direct
S
them to these pages for help while setting up the workstation
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 157
26 REFERENCE
EP1501
MR52, ADDRESS 2
MR52, ADDRESS 1
From the physical access page, you can continue to add more panels and subpanels and configure them with
the necessary information. For training purposes, we will only configure one EP1501 controller and two MR52
subpanels on the workstation.
158 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
PHYSICAL ACCESS
Add a Global Action
Global actions allow you to perform one or more actions simultaneously at a large number of doors connected
to more than one panel.
1. Click tab 1.
1
2. Click subtab 2.
3. Click button 3.
2
3
FIELD DESCRIPTION
Enter a descriptive name for the
Name
global action.
Select the appliance that the related
Appliance 5
panels and devices are connected to.
Select the type of action you want
to be performed. Additional options
appear depending on the option you
Type choose.
NOTE: If you select the “Panel Macro”
type in this field, be aware that macros
are only supported on Mercury panels.
Additional options appear depending
Sub-Type
on the option you choose.
Configure Outputs
Outputs are devices that perform tasks in response to input data. This includes things like unlocking a door,
setting off a fire alarm, activating an elevator or turning off air conditioning.
1. Click tab 1. 1
2. Click subtab 2. 2
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 159
26 REFERENCE
5. T
he first output should be your front door strike.
Select an output link and configure it with the
necessary information. See the table below for a
breakdown of each field.
FIELD DESCRIPTION
This is the name of the output point.
Output The default name is the location of
the output point on the subpanel.
Check this to indicate that this output
Installed
point is connected and active.
6
The read-only address for the
Address
output point on the subpanel.
Select how the panel knows when
the output point is active:
• nergized When Active – a
E
current is expected to pass
Operating through the output point
Mode when it is active
• ot Energized When Active
N
– a current expected to pass
through the output point
when it is inactive
Enter the pulse interval time. This is
the number of secs that the output
will activate when a pulse command
Pulse Time
is issued. (This field is only available
on outputs not associated with
doors e.g. auxiliary relays).
Define when this output is active
by selecting a schedule. Only
Schedule
schedules that have been defined in
the system are listed.
Show Click button to display the policies
Policy associated with this output module.
Configure Inputs 1
1. Click tab 1. 2
160 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
5. C
lick the input link for the input you will be editing and configure the input with the necessary information.
See the table below for a breakdown of each field.
FIELD DESCRIPTION
The name of the input. The default name of the input is the input’s location on the
Input
subpanel.
Installed Check this box to indicate that this point is connected and active.
Address The read-only address of this input point.
Select the input mode:
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 161
26 REFERENCE
PHYSICAL ACCESS
Add a Global Linkage
Global linkages are the final step in the process that defines specific actions for triggering events at specific
doors. What separates this procedure from the Macro or Trigger features, is that this feature is capable of
connecting many doors and inputs spread across many panels.
In order to create a global linkage, you must have at least one or more global actions already configured.
1. Click tab 1.
1
2. Click subtab 2.
3. Click button 3. 2
3
4. C
onfigure the global linkage with the necessary
information. See the table below for a
breakdown of each field.
FIELD DESCRIPTION
Name Enter a descriptive name.
Select the appliance that maintains
Appliance
this linkage.
Define when this linkage is active by 5
Schedule
selecting an option.
Length of time (in secs) before the
linkage will timeout because the
chain of events is forced to stop or is
broken.
162 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
6. F
ill in the appropriate information for the devices
tab. This page allows you to add doors, inputs,
outputs, specific panels, subpanels and external
system devices to the global linkage. See the
table below for a breakdown of each field.
FIELD DESCRIPTION
Select the type of devices you want to
add. The options in the Available list
changes to match your selection. 7
Tip: To add different types of devices to
Type
the linkage, select a type and add the
required devices to the Members list then
repeat this procedure with other device
types until all required devices have been
added to the Members list.
A list of the devices that are available
Available in the system. The list changes to
match the selected type.
A list of all the devices that have been
Members
added to the linkage.
8. F
ill in the appropriate information for the events
tab. This page allows you to add specific events
to the global linkage. See the table below for a
breakdown of each field.
FIELD DESCRIPTION
Select the type of devices you want
to add. The options in the list change
to match your selection. 9
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 163
26 REFERENCE
10. F
ill in the appropriate information for the tokens
tab. This page allows you to add identities with
token numbers to the global linkage. See the
table below for a breakdown of each field.
FIELD DESCRIPTION
Search for the identity that is assigned
to the token you want to include in
Token
this linkage. After you click Search,
Search
the Available list refreshes to display
your search results.
A list of the identities and tokens that
Available match your search criteria. No tokens
11
are listed if you don’t perform a search.
A list of all the identities and tokens
Members
that have been added to the linkage.
FIELD DESCRIPTION
Available A list of the available global actions.
A list of the global actions that have
Members
been added to the linkage.
13
13. Click button 13 to save the configuration.
Add an Area
Areas are zones that the ACM system assigns to define a physical area within a secured location. This
area can be relatively small, like a lab or a store room; or large, like a collection of buildings. Areas often
incorporate one or more doors with their attached inputs and outputs. Once an area is defined, it can be
assigned to a role or policy to limit user access within a building or facility.
1. Click tab 1.
2. Click subtab 2. 2 1
3. Click button 3.
3
164 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
4. C
onfigure the area. See the table below for a
breakdown of each field.
FIELD DESCRIPTION
Name Enter a name for this area.
Select the appliance that will
maintain this area. You can add 5
Appliance
doors from different appliances to
an area.
Maximum Enter the max number of card
Occupancy holders allowed in this area at a time.
Enter the minimum number of
Log Min cardholders that must enter this
Reached area before a transaction is logged
in the system.
Enter the maximum number of
Log Max cardholders that must enter this
Reached area before a transaction is logged
in the system.
Enable Check this box to enable this area in
Area the system.
Check this box to indicate a two-
person rule is imposed for this area.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 165
26 REFERENCE
Add Macros
Macros can be extremely simple, such as turning out lights or masking an input. Or, they can be sophisticated
multi-step procedures. For example, you can define a macro that closes down the air conditioning system,
unmasks the alarms, locks all the doors connected to a panel, turns out the lights, then emails the operator for
more instructions
1. Click tab 1.
3. Click tab 3. 3
4. Click button 4.
4
5. Click button 5.
FIELD DESCRIPTION
Name Enter a name for this command.
Select the type of macro command
Command this is. Depending on the option
selected, new options are displayed. 7
Edit Events
When you click the name of an event from the Events Listing page, the Event Edit page is displayed. This page
allows you to define what happens when the event occurs, including who will be notified of the event. Make
any changes that may be required.
1. Click tab 1.
2. Click subtab 2. 1
2
3. Once you’ve found the event you want to edit,
click the link.
4. Configure the event. See the table below for a breakdown of each field.
FIELD DESCRIPTION
Name The name of the event.
Return Name The name used to identify that this event is over, or the return-to-normal name of this event.
The event type. Only events types that have been defined in the system appear in the drop
Event Type
down list.
Source Type The device that is the source of the event.
Specify the priority of this event. The Alarm Monitor displays alarms according to their priority.
Priority
Priority 1 is the highest priority and is always displayed at the top. The priority range is 1 - 999.
Select an alarm sound that is played when a new alarm occurs while you are monitoring the
Alarm Sound
Alarms page.
Suppress Time Select a schedule when alarm events are not reported.
Enter any instructions that may be required for handling this event. The instructions are made
Instructions
available to the user on the Monitor screen.
Return Event Select an event type for the return-to-normal event.
Return Priority Enter the priority number for the return-to-normal event. The priority range is 1 - 999.
Has On/Off Check this box to indicate that this event is a toggle, involving an on/off switch logic.
Masked Check this box to indicate that this a masked event
Logged Check this box to log the event.
Check this box to auto-launch video from the linked camera feed when the event occurs. This
Show Video
feature only works if video is enabled.
Check this box to specify that two people are required to acknowledge and clear this event.
Two Person
Required to If this box is checked then the operator that executes the Clear cannot be the same operator
Clear that executes the Acknowledge. If the same operator attempts to clear the alarm, then
nothing will happen.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 167
26 REFERENCE
Enter the email address of all the people who should be notified when this event occurs.
Email
You can enter more than one email address separated by a comma.
A list of all the roles that are available to you in the system.
Available To allow specific role to have access to view or edit this event, select a role from the
Available list then click to add the role to the Member list.
A list of all the roles that are able to view or edit this event.
Members If this event is associated with at least one role, then any user who does not have the
selected roles will not be able to view or edit the event.
Anti-Passback Modes
When you select the Operations tab on the Door Edit page, one of the options is for APB Mode. The APB
modes may be different depending on the panels you have installed.
1. Click tab 1.
2. Click subtab 2. 2 1
3. Click the link for one of your doors.
4. Click tab 4. 4
5. In field 5, select an APB mode. See the table
below for a breakdown of each field.
FIELD DESCRIPTION
No Selection APB is not used.
Tracks each badge that enters 5
a door and generates a warning
transaction if the same badge is
used at the same door twice in
Soft Door a row. This badge is still able to
APB enter the door the second time,
but the access is logged as an
APB violation.
168 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 169
26 REFERENCE
ROLES
Add an Access Group
Access groups are sets of physical access permissions for doors and elevator access levels. Once you have
defined an access group, you can assign it to a role. This allows members of the role to access the specified
doors and elevator access levels in the access group.
1. Click tab 1.
2. Click subtab 2.
2 1
3. Click button 3.
4. C
onfigure the access group with the necessary
information. See the table below for a
breakdown of each field.
FIELD DESCRIPTION
Name Enter the name of this access group.
Appliance that manages this access
Appliance
group. This is a read-only field.
Select a schedule from the drop
down list to specify when the access 5
Schedule group is active.
Only schedules that have been
defined in the system are listed.
Check this box to indicate that this
Installed access group is currently operational
and available to the system.
6. H
ighlight the appropriate doors and click button
6 to add the doors as members of the access
group.
170 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
Add a Role
A role is a container for all the permissions a user would need in order to perform a specific role in the
organization. Each role can be assigned:
• Access groups for doors and elevator access levels
• Delegated access to specific features within the ACM application
• Routing groups to monitor specific events that occur within the ACM system
1. Click tab 1.
2. Click subtab 2. 2 1
3. Click button 3.
FIELD DESCRIPTION
Name Enter a name for this role.
Only roles that have been defined in
the system appear in the dropdown
list. The child role will inherit all access
Parent
permissions defined in the parent role.
Also, you cannot delete a parent role 5
until you delete all its children.
Start Specify the activation date for this role.
Date Click the field to use the calendar.
Stop Specify the deactivation date for this
Date role. Click the field to use the calendar.
Check this to indicate that role is
Installed
operational and available to the system.
6. Click tab 6. 6
7. H
ighlight the appropriate access group and click
button 7 to make it a member of the role.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 171
26 REFERENCE
Add a Delegation
A delegation is a list of permissions within the ACM system that allows an operator to configure settings and
monitor events. After you have created a delegation, you must assign it to a role to make it effective.
1. Click tab 1.
2. Click subtab 2. 2 1
3. Click button 3. 3
You must set up routing schedules and groups of hardware components before you can use routing groups.
1. Click tab 1. 1
2. Click subtab 2.
2
3. Click button 3. 3
172 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
4. C
onfigure the routing group. See the table below
for a breakdown of each field.
FIELD DESCRIPTION
Name Enter the name of this routing group.
Select a schedule from the drop down
Schedule list. Only schedules that have been 5
defined in the system are listed.
From the drop down list, select the
option that qualifies the schedule.
6. O
nce you save, more tabs will appear. Click on 6
tab 6. This allows you to specify which event
types should be routed in this routing group.
NOTE: This feature currently applies to Mercury Security elevator transactions in floor tracking mode.
1. Click tab 1.
1 2
2. Click subtab 2.
3. Click button 3.
3
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 173
26 REFERENCE
4. C
onfigure the elevator access levels. See the
table below for a breakdown of each field.
5
FIELD DESCRIPTION
Enter the name of this elevator
Name
access level.
From the drop down list, select
Appliance the appliance that manages this
elevator access level.
Output Indicate the default output number.
The name of each floor. The floors
Description are named by default, but you can
rename them.
Indicate when a card/code has
free access to the specified floor,
meaning a valid card/code is not
required to access this floor.
Schedule
Select a schedule from the drop
down list. Only schedules that have
been defined in the system are
listed.
IDENTITIES
Add an Identity
The Identities page gives you access to all the cardholders and operators in the system. You can manually
add each identity to the system or you can use the Collaboration feature to transfer identity information from a
third party database.
1. Click tab 1.
1
2. Click button 2.
174 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 175
26 REFERENCE
2. Click tab 2.
5. C
onfigure the backup with the necessary
information. See the table below for a
breakdown of each field.
FIELD DESCRIPTION
Enter the name of this backup. It is recommended that the name does not use spaces. (e.g.
Name
Avigilon_Corp)
From the drop down list, select the backup type. The page refreshes to display different options
depending on the selected backup type. There are three types available:
Backup • SCP - Secure Copy, securely transfer backup data from the appliance to a remote host location
Type
• USB - Transfer backup data to a device connected to the appliance via a USB cable
176 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
Enter the name of the subdirectory where the backup files are stored. If the file is to be located
in a subdirectory of the share, use this format:
directory_name/
Notice that the directory name needs both a leading slash and a trailing slash. If the file is to be
Location
located in the top level of the share (no subdirectory), use this format:
/directory_name
Notice that there is only one leading slash required. There must be an entry in the Location field
for the backup to work.
Use Check this box to encrypt the backup data using AES 256-bit encryption. By default, the
Encryption password (key) for the encrypted file is the name of the appliance.
Schedule Select the days of the week when the backup should occur.
Start Time Enter the time when the backup should occur. This field uses a 24-hour clock.
Create a Schedule 1
1. Click icon 1.
2. Click link 2.
2
3. Click button 3.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 177
26 REFERENCE
FIELD DESCRIPTION
Name Enter a name for the schedule.
Select the mode from the drop down
list. The options include:
5. C
lick button 5 to save the configuration. Repeat
these steps for each schedule you need in the
system.
178 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
Information captured by user defined fields can be used on badges to display important details about each
identity.
2. Click button 2.
3. C
onfigure the user defined field. See the table
below for a breakdown of each field.
FIELD DESCRIPTION
Enter a name of this user-defined field.
This also becomes the label of the field.
Name
Consider how the field will be read when
it is displayed on the Identities page.
4
Select the field type. Depending on the
type of field, you can choose from the
following formats:
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 179
26 REFERENCE
3. O
n the next screen, highlight the related user
defined fields you previously created and click
button 3 to add them as members of the tab.
Add a Map
1. From the Setup and Settings links, click link 1.
1
2. Click button 2.
180 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
3. C
onfigure the map. See the table below for a
breakdown of each field.
FIELD DESCRIPTION
Name Enter a name for the map.
Click the Browse button to select the
image you want to use as the base 4
File of the map. You can select any raster
image in BMP, GIF, JPEG, PNG, PDF, TIP
and WMF format.
Check this box to leave the map
background white.
Blank
Canvas This option is primarily for setting up
Mustering dashboards that do not need
to be on a map.
Enter the map size in pixels.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 181
26 REFERENCE
2. C
onfigure the email server. See the table below
for a breakdown of each field.
FIELD DESCRIPTION
Enter the mailbox server for this
system. This is the name of the
server that handles the transfer of
SMTP
email. This field and the next four
Server
are required before email alerts can
be sent automatically in case of an
alarm or event occurs.
Enter the name of the port that is
SMTP Port
used to connect to the SMTP Server.
SMTP Host Enter the name of the host used for
Name SMTP traffic.
Check this box to indicate that
Use Start this appliance uses Start TLS
TLS cryptography to communicate with
the SMTP server.
Check this box to indicate that
this appliance uses generic TLS
Use TLS
cryptography to communicate with
the SMTP server.
Enter the email address of the
SMTP Mail
person or organization that email will
From
be from.
Enter the email addresses of
SMTP
persons to which email alerts are
User
sent in case of alarms.
SMTP Enter the password required to use
Password the email server.
Send Test Click to send a test email to the
Email ‘SMTP Mail from’ email address.
182 © 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219
26 REFERENCE
Configure Collaborations
1. From the setup links, click link 1.
2. Click button 2.
3. C
onfigure the collaboration with the necessary
information. Depending on the type of
collaboration you choose, different options will
appear.
© 2019, Avigilon Corporation. All rights reserved. No license is granted with respect to any copyright, industrial design, trademark, patent or other IP rights of Avigilon Corporation or its licensors. REV. 1219 183
26 REFERENCE
NOTE: Some external systems may not be available if your system does not have the required license.
2. D
epending on the external system, select the
appropriate tab. For this example, we will add an
Avigilon server for integration. Click button 2.
2
FIELD DESCRIPTION
Name Name for the Avigilon ACM server.
An alternative name that is
Alt Name automatically assigned by the ACM 4
system.
If you have more than 1 appliance
Appliance in your system, select the appliance
the ACM server should connect to.
Address Enter IP address of the ACM server.
Enter the port number used to
Port communicate with the ACM server.
The default port is 80.
Remote Enter the username for accessing
Username the server.
Remote PW Enter the password for the username.
Enter an ACM identity username
Local
that the external system can use to
Username
connect to the appliance.
Local PW Enter the password for the username.
Check this box to indicate that the
Password ACM server is online and able to
communicate with the appliance.