Andover Continuum Tac Ia Data Exchange Reference Guide
Andover Continuum Tac Ia Data Exchange Reference Guide
2010, Schneider Electric All Rights Reserved No part of this publication may be reproduced, read or stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission of Schneider Electric. All brand names, trademarks and registered trademarks are the property of their respective owners. Information contained within this document is subject to change without notice. Distributed, manufactured and sold by Schneider Electric. I/A Series trademarks are owned by Invensys Systems, Inc. and are on this product under license from Invensys. Invensys does not manufacture this product or provide any product warranty or support. For service, support and warranty information, contact Schneider Electric at 1-888-444-1311. This document is produced in the United States of America. Title: Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide Revision: B Date: December, 2010 Schneider Electric part number: 30-3001-406 Software application version number 1.81 or higher The information in this document is furnished for informational purposes only, is subject to change without notice, and should not be construed as a commitment by Schneider Electric. Schneider Electric assumes no liability for any errors or inaccuracies that may appear in this document. Schneider Electric One High Street North Andover, MA 01845 (978) 975-9600 Fax: (978) 975-9782 http://www.schneider-electric.com/buildings
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
30-3001-406 Revision B
December, 2010
Contents
9
9 10
Chapter 1
11
12 12 13 14 14 14 14 15 15 15 16 16 16 16 17
1
XDriver SelfObject ............................................................. 17 XDriver Client Object ........................................................ 17 XDriver Server Object ....................................................... 17 Door ..................................................................................... 18 Door Attributes .................................................................. 18 Events ................................................................................. 18 Alarms ................................................................................ 18 Schedules ............................................................................ 18 User ..................................................................................... 19 Programmer ....................................................................... 19 Supported Device Configurations .............................................. 20 Workplace Tech/MNB-1000 Controller/ACX 57xx/CyberStation 20 Enterprise Server/UNC/ENC Controller/ACX 57xx/CyberStation ...................................................................................... 21 Enterprise Server/web.Client - 2 machine ........................ 21 Enterprise Server/web.Client/CyberStation - 3 machine 22 Multiple ACX 57xx Controllers ......................................... 22 Role of XDriver and Plain English in Integration ..................... 23 Role of XDriver Points ....................................................... 23 Role of PE Programs .......................................................... 23
Chapter 2
CyberStation .........................................................................
Introduction ................................................................................. System Requirements and Pre-Installation .............................. Minimum/Recommended Hardware Requirements ......... Software Requirements ..................................................... Overview of Common CyberStation Tools and Tasks ............... ACX 57xx Controller Update/Configuration .................... XDriver Support ................................................................. Creating Points .................................................................. To create a point .......................................................... PE Programs ...................................................................... web.Client for Web-based Access ......................................
25
26 27 27 27 30 30 30 30 31 32 33
Chapter 3
35
36 36 36
2 Schneider Electric
BACnet/IP XDriver Installation ........................................ 37 Configuration ............................................................................... 39 Overview ............................................................................. 39 Parameters ......................................................................... 40 Point Access ................................................................. 41 Type .............................................................................. 42 Instance ........................................................................ 42 ...................................................................................... 43 Property ........................................................................ 43 BACnet Network .......................................................... 44 IP Address .................................................................... 44 BACnet XDriver Points Overview .............................................. 47 Client BACnet XDriver Points .......................................... 47 Examples of a Client BACnet XDriver Point ............. 48 Server BACnet Points ........................................................ 51 Example 1 Server BACnet Point ................................................... 52 Example 2 Server BACnet Point with Engineering Units ........... 53 Example 3 Server BACnet Point with Engineering Units, Relinquish Default, and Priority Level ......................................... 54 ..............................................................................................DeviceSelf Object ............................................................................. 55 Programming Introduction ......................................................... 60 Plain English Programming Language ............................ 60 Programming Examples - Single ACX 57xx Controller ... 60 Program Type 1 Distribute Door Attribute Values to MNB-1000 or UNC/ ENC Controllers When a Persistent Door Attribute Changes .......................................................................................61 Program Type 2 Modify Door Attribute Values from MNB-1000 or UNC/ENC Controllers ................................................................... 63 Program Type 3 Distribute Door Attribute Values to MNB-1000 or UNC/ ENC Controllers When a One-Scan Door Attribute Changes 64 Programming Examples Multiple ACX 57xx Controllers 65 Program Type 1 ........................................................... 66 Distribute Door Attribute Values to MNB-1000 or UNC/
Andover Continuum CyberStation Access Control Essentials Guide 3
ENC Controllers when a Persistent Door Attribute Changes in the SecondACX ........................................................ 66 Program Type 2 Modify Door Attribute Values in SecondACX from MNB1000 or UNC/ENC Controllers ................................... 67 Program Type 3 Distribute Door Attribute Values to MNB-1000 or UNC/ ENC Controllers When a One-Scan Door Attribute Changes in SecondACX .............................................................. 68
Chapter 4
web.Client ..............................................................................
web.Client Overview ................................................................... web.Client User Documentation ................................................ A Typical System before web.Client .......................................... A Typical System Implementing web.Client ............................. Differences between web.Client and CyberStation ................... Hardware and Software Requirements for LAN System ......... Hardware and Software Requirements for a Standalone System
69
70 71 72 73 75 76 79
Appendix A
83
Appendix B
91
92
Appendix C
95
4 Schneider Electric
Regulatory Notices
Industry Canada
ICES-003 This is a Class A digital device that meets all requirements of the Canadian Interference Causing Equipment Regulations.
Regulatory Notices
UL Listing
UL 916 UL listed product for the United States and Canada: Open Energy Management Equipment
6 Schneider Electric
Regulatory Notices
CAUTION All pertinent state, regional, and local safety regulations must be observed when installing and using this product.
For reasons of safety and to assure compliance with documented system data, repairs to components should be performed only by the manufacturer.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
Regulatory Notices
8 Schneider Electric
Chapter One - Introduction and System Overview: This chapter contains a basic look at what the Andover Continuum Security and TAC I/A Series solution is and how it works. It contains information regarding nomenclature, supported devices and the system integration between I/A Series and Andover Continuum products. Chapter Two - CyberStation: This chapter focuses on the Continuum CyberStation software that is used to perform certain functions within the security solution. Chapter Three - Using the BACnet/IP XDriver: This chapter explains the BACnet XDriver data exchange solution for access control. Installation, configuration and programming examples are covered in this section. Chapter Four - web.Client: This chapter introduces the web.Client internet-based tool for use with the security solution. This is an additional resource for use with the Andover Continuum Security and TAC I/A Series security solution. Appendix A - Supported Access Control Elements: This appendix is a spreadsheet view of the devices and attributes supported by this security solution. Appendix B - Best Practices: This section of the reference guide provides hints and suggestions for successful implementation of the security solution. Common issues and questions relating to this data exchange are covered. Appendix C - Related Documentation/Resources: This section provides readers a list of resources that can be referred to for additional information relating to this system integration.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
Symbols Used
The Notes, Warnings and Cautions used in this manual are listed below. Note: Contains additional information of interest to the user.
CAUTION or WARNING Type of hazard
How to avoid hazard.
10 Schneider Electric
Chapter 1
Introduction and System Overview
Description of the Andover Continuum Security and TAC I/A Series security solution Purpose of this document Common terms and nomenclature used with this solution Supported device configurations Roles of XDriver points and PE Programs
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
11
The first chapter provides I/A Series users with an overview of the Andover Continuum products and their role in this security solution. The subsequent chapters describe the solution and provide instructions for implementing and configuring this solution. More detailed information is located in referenced documentation. The appendices provide useful reference information that will assist in the implementation of the solution.
12 Schneider Electric
System Architecture
The following diagram shows components that can comprise an Andover Continuum Security and TAC I/A Series security system:
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
13
Network
The network is a medium through which electronic hardware communicates. Andover Continuum products use several types of networks. Network controllers communicate with a user workstation and with each controller via an Ethernet TCP/IP network. Andover Continuum products support physical wire and fiber versions of the Ethernet as well as wide-area wireless Ethernet.
Andover Continuum
Andover Continuum is system of hardware and software that has been designed to monitor and control the various functions of a building such as security, access control, lighting, and video control. For this specific application, the security and access control capabilities are used. The hardware consists of equipment controllers, network communication controllers, input and output interfaces. The software is a computer program that allows you to communicate with, monitor and control the operation of the system.
14 Schneider Electric
The values of each point in the system, the settings for limits, the configuration of the hardware, the personal data of the personnel granted access to your building and more are contained within this powerful software structure.
Port
A comm port on a controller is the physical interface from the ACX 57xx controller to another device. The ACX 57xx controller has one ethernet Comm Port connector (COMM1).
CyberStation
One of the key components of the Andover Continuum system is a Windows based application program called CyberStation that runs on a PC workstation and interacts with the control system. Andover Continuums second key software component is the database that stores all the vital information pertaining to the security management system.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
15
CyberStation software provides Continuum with a graphic user interface that can display and manipulate data that allows the entire site management of adjusting schedules, managing video recording, acknowledging alarms, controlling doors, and tracking personnel. CyberStation is the workstation software used to create and configure ACX 57xx controllers, access control features, XDriver objects, and Plain English programs.
Database
The information that describes the structure and operation of your building is stored in a software database. The database engine that Continuum uses is either Microsoft SQL Server or MSDE 2000.
web.Client
web.Client software provides access to the Andover Continuum system via a web browser. However, web.Clients user interface differs from the Andover Continuum user interface. web.Client is an additional tool that you may use in conjunction with the Continuum Security and TAC I/A Series solution.
Points
The control of equipment requires monitoring individual inputs and actuating individual outputs. These are software objects located in the ACX 57xx controller. In Continuum systems, these discrete entities are
16 Schneider Electric
called points. Youll see references to output point or input point often. A point may be classified as one of the following: InfinityInput, InfinityOutput, or InfinityNumeric. Note: The term points may be used interchangeably with objects in this solution.
XDriver
XDrivers are gateway software that provides non-native protocol connectivity to third-party devices. In this solution, the XDriver provides communication through BACnet/IP from the I/A Series controllers to the ACX 57xx access controller.
XDriver SelfObject
An XDriver SelfObject is a user-defined object that makes the XDriver device visible to the BACnet/IP network.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
17
Door
A door is a software object in the ACX 57xx controller that logically represents the physical characteristics of a Door in a building. This may include access events, alarming and locks.
Door Attributes
Door attributes refer to the individual characteristics of a Door object. Some examples of Door attributes are: Alarm, DoorSwitch, Duress, EntryLastCard, Override, Value, Invalid Attempt, and Forced Entry.
Events
During operation, access control functions occur as a result of actions taken by users, by the controllers, or as the result of no action. This might include the triggering of motion detection or the discovery of a forced door entry. In Continuum systems, these are classified as events. There are several types of events. Each type can be monitored and acted upon through automatic and programmed control. All events are stored by the system.
Alarms
Alarms are a type of event that signal the controller of an unusual occurrence. Typical alarms might include glass break and intrusion attempts.
Schedules
Schedules allow the operation of the system to be regulated according to a particular time, day, week, month, and year.
18 Schneider Electric
User
The user (or operator) is a person who manually acknowledge alarms, monitor system activity, and interact with the system on a regular basis.
Programmer
The programmer is a person who determines the operational flow of the system. The programmer writes programs in the Plain English programming language.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
19
WorkPlace Tech
MNB Controller
CyberStation
20 Schneider Electric
UNC Controller
CyberStation
Enterprise Server
web.Client
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
21
Enterprise Server
web.Client
CyberStation
22 Schneider Electric
Role of PE Programs
Plain English programs facilitate the transfer of data between XDriver objects and values in the access control system, typically Door attributes. PE programs are created manually in ACX 57xx controllers with CyberStation software using a predefined language syntax. These programs contain the logic that determines what access control values are shared across the combined system and the interval at which those values are shared. You can customize the number and content of the PE programs used in this system. This allows for maximum system flexibility.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
23
For more information regarding PE programs, please refer to the Andover Continuum CyberStation Plain English Language Reference, 30-3001-872.
24 Schneider Electric
Chapter 2
CyberStation
Introduction to CyberStation System requirements and pre-installation Overview of common CyberStation tools and tasks
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
25
Chapter 2: CyberStation
Introduction
Cyberstation is the application program that allows your workstation PC to configure, monitor and control the Continuum hardware. It is a collection of tools and applications that work together to help you create and interface with all the objects in the system. The figure below illustrates some of them.
26 Schneider Electric
Chapter 2: CyberStation
Recommended
2.4 GHz Pentium IV processor 1024 MB RAM 40 GB hard drive CD ROM drive 10/100 MB Ethernet Network Interface card Parallel or USB port
a. CyberStation performance is directly related to processor speed and RAM. Faster processor speeds and more RAM available to the program will increase performance.
Software Requirements
Depending on the configuration of your system (standalone or multiuser), you must meet a set of software requirements for your workstation PC prior to installing CyberStation. See the software requirements table on the next page.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
27
Chapter 2: CyberStation
Software Requirements
Standalone
Windows XP Professional with Service Pack 2 with Microsoft hotfix 884562 OR: Windows Server 2003 with Service Pack 1 Internet Explorer 6.0 with Service Pack 1 or Internet Explorer 7.0 MSDE 2000 (included on the Installation CD and installed automatically) with Service Pack 4 .NET Framework 2.0 AND: .NET Framework 3.0 (for VideoLayout editor) Windows Installer 3.1 Full Microsoft Outlook or Microsoft Exchange software package
a
28 Schneider Electric
Chapter 2: CyberStation
Failure to observe this precaution will result in loss of CyberStation functionality and degraded system performance over a period of time.
For more detailed information regarding CyberStation installation and system requirements, see: Andover Continuum Cyberstation Installation Guide, Version 1.81, 30-3001-720.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
29
Chapter 2: CyberStation
XDriver Support
CyberStation is used to install and configure the BACnet/IP XDriver. For more detailed information regarding installing and configuring an XDriver, see Chapter 3 - Using the BACnet/IP XDriver.
Creating Points
One of the main uses of CyberStation in the Andover Continuum Security and TAC I/A Series solution is to create points (also called objects) within the ACX 57xx controllers. The types of points that can be created are: InfinityInputs, InfinityOutputs and InfinityNumerics. These points will later be configured as XDriver objects.
30 Schneider Electric
Chapter 2: CyberStation
For details about specifying these configurations, see the Parameters section in Chapter 3 - Using the BACnet/IP XDriver.
To create a point
To create a point perform the following steps:
Step 1:
Step 2: Select the ACX 57xx controller in which you would like to store the new point. Step 3: Right-click the controller or select New in the Object menu to display a popup list of object classes. Step 4: Select one of the three applicable object classes: InfinityInput, InfinityOutput or InfinityNumeric.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
31
Chapter 2: CyberStation
For example, select InfinityNumeric to create an InfinityNumeric point object. Step 5: The New dialog, shown below, appears with the object type you selected displayed in the Objects of type field. In this case, it shows an InfinityNumeric object.
Step 6: In the New dialog, enter a name for the point in the Object name field. CyberStation automatically fills in the Alias field, which you can change. Note: When creating an XDriver object, it is advised to use 16 or fewer characters for an object name. This allows the object name and alias to remain identical. Step 7: Click Create to enter the editor of the point you are creating. For more detailed information about creating points and objects, see Continuum CyberStation Configurators Guide, 30-3001-781 or the Continuum online help.
PE Programs
Plain English is a proprietary programming language developed by Schneider Electric. In the Andover Continuum Security and TAC I/A Series system, Plain English programs are used to facilitate the
32 Schneider Electric
Chapter 2: CyberStation
transfer of data between the access control system and the XDriver objects. You will use the Plain English IDE in CyberStation to create and edit the programs needed for this task. For detailed information about Plain English programming, refer to the Andover Continuum CyberStation Plain English Language Reference, 30-3001-872, or the Continuum online help.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
33
Chapter 2: CyberStation
34 Schneider Electric
Chapter 3
Using the BACnet/IP XDriver
Overview of the BACnet/XDriver security solution Installation concepts and guidelines for the XDriver Configuration of the XDriver point parameters Description of XDriver objects used with this solution General programming guidelines for the XDriver solution
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
35
From Continuum Explorer, double-click the controller where you will be loading the XDriver OR Highlight the controller and select Open from the File menu.
Step 2:
When the controller editor window appears, click the Options tab.
36 Schneider Electric
Step 3:
Verify that the Comm Port 1 is bit value 9 (hex). If the bit value of Xdriver Comm 1is 9, then the comm port is ready for installation of the BACnet/IP XDriver.
Note: The item in parenthesis after the bit value in the Xdriver Comm field is the checksum appropriate to that version of the XDriver.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
37
Step 1:
Click the controller or click on the + sign next to the controller icon to display its contents in the viewing pane.
Step 2: Step 3:
Double-click on the COMM1 object under the controller. From the General tab, select Xdriver from the Default Mode dropdown menu.
Step 4:
Step 6: Step 7:
Click the OK button to close the Comm Port editor. Right-click on the controller from step 1 and select Send To Controller to reload the controller. Once the controller is reloaded, open the Comm Port editor for Comm1. Click the XDriver Status button to confirm that it was properly installed on the controller. indicating Xdrvinstalled, which means the XDriver is loaded and ready for use. See below:
Step 8:
Step 9:
Step 10: The XDriver details window should respond with the status
Configuration
Overview
The BACnet I/P Xdriver allows the creation of three types of points: Client XDriver point, Server XDriver point, and a DeviceSelf Object. The Client XDriver point is a point that polls and/or writes new values to an object that resides in another BACnet device.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
39
Server XDriver points operate in a passive mode. They give other BACnet devices visibility and control over their points. Server XDriver points include a security option that can be set to read-only or read/ write access. The DeviceSelf Object is a required object for the BACnet/I/P XDriver. There must be only one DeviceSelf Object per BACnet XDriver. Its function is to specify operating parameters for the XDriver. A DeviceSelf Object MUST be created to enable communication, and to start the driver. Although the XDriver can contain both Client and Server objects, the XDriver operates most efficiently as a BACnet client, especially when large amounts of data are transferred between the access control system and the BACnet/IP network. As such, the user is advised to utilize Client objects to distribute access control values whenever possible. Server objects are used only when an access control value must be adjusted from outside the access control system.
Parameters
InfinityInput, InifintyOutput and InfinityNumeric points created in CyberStation must be configured with specific parameter values when used as XDriver objects. After the comm port is enabled and the BACnet/IP XDriver is installed, new points should be configured with the following values. To configure these points:
Step 1:
Double-click on the point that you would like to configure to open the corresponding object editor. To create an entirely new Infinity point, see the To Create a Point section in Chapter 2 - Cyberstation.
40 Schneider Electric
Step 2:
Six additional fields appear below the "Port" field. They are "Point Access", "Type", "Instance", "Property", "BACnet Network" and "IP Address".
Step 3:
See below for the values required for each parameter field.
Point Access
From the table below: Value 0 Access Type Client or Self Description The point will poll and/or write as a Client XDriver Point BACnet can ONLY read this point. BACnet can read and write to this point.
1 2
1. Select the appropriate Point Access type. 2. Enter the value into the Point Access field. 3. Press TAB.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
41
Type
From the table below: Value 0 1 2 3 4 5 Object Type Analog Input Analog Output Analog Value Binary Input Binary Output Binary Value
XDriver Client object: the type matches the BACnet object type of the remote object that it is referencing. XDriver Server object: the type determines the BACnet object type of the internal XDriver Server object.
Instance
This field accepts a number from 1 to 65,535.
42 Schneider Electric
If an Instance number > 65535 is required, then set the Instance Number to 0 and add the number to the end of the I/P address. The Instance number must be prefixed with a capital I (i.e. xxx:xxx:xxx:xxx Iyyyyyy where xxx is the IP address and yyyyyy is the Instance number).
Property
For Client or Server points, the value should always be 85 (Present Value).
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
43
BACnet Network
1. Enter the BACnet/IP network number that this XDriver is connected to. 2. Press TAB.
IP Address
If this point is a Client XDriver point, then this field must contain the TCP/IP address of the other BACnet device, using the format: XXX.XXX.XXX.XXX Optional Parameters The additional optional parameters referenced below are allowed in this IP Address field. These options must be added after the TCP/IP address, if one is used, and require a <space> character between each parameter. Instance Number If an instance number > 65535 is required then set the instance number to 0 and add the number to the end of the TCP/IP address. the instance number must be prefixed with a capital I as shown below: XXX.XXX.XXX.XXX IYYYYYY where XXX is the IP address and YYYYYY is the instance number. Engineering Units If the point or object is configured as a BACnet Server point or object, the engineering units for each point may be assigned using this field. The units are defined by entering U followed by the enumerated value from the Engineering Units conversion table. The example below would correspond to Pascal: U53
44 Schneider Electric
Priority The present value of Analog Output, Analog Value, Binary Output, and Binary Value points or objects can be read or written with a priority level. Different priority levels may be assigned to individual points by assigning the priority parameter to each XDriver point. For both Client and Server objects, if no Priority is assigned the XDriver uses priority 10 when reading or writing the present value. If a Priority is assigned to the DeviceSelf object then the XDriver uses that priority level as its default priority level. To clear the value from the priority array set the XDriver point to NotSet. This will clear the appropriate value (determined by the priority level of this point) from the priority array. The following sample parameter would assign priority level 6 when the value of the point/object is modified: P6 Relinquish Default For Server objects only: When all 16 entries in the priority array are empty the value of the commandable property shall have the value specified by the relinquish default property. This determines the server objects value when present value has been written at no priority. The example below would set the Relinquish Default value to 100: R100
Destination Address
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
45
For Client XDriver objects only: This optional parameter is used to communicate through BACnet routers, so that messages can be relayed from the BACnet/IP network to another. (i.e. MS/TP or ISO 8802-3 Ethernet). The destination address is used in conjunction with the BACnet network number (Param5) to address messages to devices on other networks. The Destination address (DADR) must be denoted as follows: DADR=<BACnet MAC Address> Examples for an MS/TP network would be (specified in decimal notation). DADR=1 DADR=19 Examples for an ISO 8802-3 (Ethernet) would be: DADR=00:0B:DB:A2:A0:15 DADR=00:40:11:3C:4F:22 Note: The Destination address must be in capital letters with equals = sign and no spaces. BACnet/IP Port By default the XDriver uses UDP port 0xBAC0. This may be changed by adding the following command PORT= to the BACnet DeviceSelf object. PORT=BAC1 Note: The BACnet UDP port address must be in capital letters with equals = sign and no spaces. The address must be represented in hexadecimal format and may only be added to the BACnet DeviceSelf object.
46 Schneider Electric
When a Client object is created, you must set the Point Access parameter to 0. The Type parameter is set to match the kind of object the Client object is referencing on the other BACnet device. The Instance Number is set to match the instance number of the object that the Client references. The Type and Instance Number must be unique for each Client point. The IP Address is set to the TCP/IP address of the host BACnet device.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
47
z z z z z z
Point Access = 0 (Client BACnet XDriver Point) Type = 1 (Analog Output) Instance = 4 ( Instance is 4) Property = 85 (Present Value) BACnet Network = 1 (BACnet network number is 1) IP Address = 172.16.83.24 = (TCP/IP Address of other device)
Note: If an Instance number > 65535 is required the Instance field should be set to 0 and the Instance number appended to the end of the IP address with a <space> Iyyyyyy separating the 2 parameters.
48 Schneider Electric
z z z z z z
Point Access = 0 (Client BACnet XDriver Point) Type = 4 (Binary Output) Instance = 1 (Instance is 1) Property = 85 (Present Value) BACnet Network = 1 (BACnet network number is 1) IP Address = 172.16.83.99 = (TCP/IP Address of other device)
Priority Level = 8
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
49
Example 3 Client BACnet XDriver point with network addressing (MS/TP device)
z z z z z z
Point Access = 0 (Client BACnet XDriver Point) Type = 0 (Analog Input) Instance = 3 (Instance is 3) Property = 85 (Present Value) BACnet Network = 2765 (BACnet network number is remote) IP Address = 172.16.83.4 DADR=1
50 Schneider Electric
When a Server object is created, you must specify the Point Access (1 or 2). The Type field is set to match the kind of object you are creating. The Instance is a number with a unique value in the range of 1 65535. Care should be taken when choosing values for BACnet objects. You should ensure that no two objects have the same type/ instance combination. The IP Address field is left blank unless optional parameters are required:
Engineering units have to be prefixed with the letter U followed by their corresponding numeric value. Priority levels are prefixed with the letter P. The Relinquish Default values are prefixed with the letter R.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
51
z z z z z z
Point Access = 2 (Read/Write BACnet Server Point) Type = 2 (Analog Value) Instance = 8 (Instance is 8) Property = 85 (Present Value) BACnet Network = 1 (BACnet network number is 1) IP Address = <blank> (Not Required)
52 Schneider Electric
z z z z z z
Point Access = 2 (Read/Write BACnet Server Point) Type = 2 (Analog Value) Instance = 32 (Instance is 32) Property = 85 (Present Value) BACnet Network = 1 (BACnet network number is 1) IP Address =
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
53
Example 3 Server BACnet Point with Engineering Units, Relinquish Default, and Priority Level
z z z z z z
Point Access = 2 (Read/Write BACnet Point BACnet Server) Type = 2 (Analog Value) Instance = 1 (Device Instance) Property = 85 (value) BACnet Network = 1 (BACnet network number is 1) IP Address =
54 Schneider Electric
DeviceSelf Object
There can be only one DeviceSelf object per BACnet/IP XDriver. The DeviceSelf object is an InfinityNumeric and is required to enable the BACnet XDriver. Its function is to configure the XDrivers run-time parameters.
z
The Point Access must be set to Read/Write (2). The DeviceSelf object must be accessible via BACnet for remote devices to query driver information. The Type must be set to 200 to specify this is the Device Self Object. The Instance should be set to a unique value between 1 - 65535. This number must be unique among all the BACnet devices participating in the entire BACnet internetwork. For the DeviceSelf object, the Property is used as a tuning variable called Service Limit. The Service Limit parameter specifies the number of BACnet/IP packets to send per second. If it is set to 25 and there are less than 26 packets to be sent then all of the packets will be sent for each second. If there are more than 25 to be sent for each second then the BACnet/IP XDriver will send up to 25, then wait for one second before continuing to send the remainder of the point values. Valid values are 1 25. BACnet Network is used to specify the BACnet network number that this XDriver is connected to. The range is 1 65534. The default is 0. The IP Address field is only used to change the default priority level and/or the BACnet/IP UDP Port address.
z z
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
55
z z z z z z
Point Access = 2 (2 is required for DeviceSelf Object) Type = 200 (200 is required for DeviceSelf Object) Instance = 99 (Device SelfObject unique Instance is 99) Property = 25 (Tuning variable: 25 points per second) BACnet Network = 1 (BACnet network number is 1) IP Address = <Blank> (Not Required)
56 Schneider Electric
z z z z z z
Point Access = 2 (2 is required for DeviceSelf Object) Type = 200 (200 is required for DeviceSelf Object) Instance = 62 (DeviceSelf Object unique Instance is 62) Property = 25 (Tuning variable: 25 points per second) BACnet Network = 1 (BACnet network number is 1) IP Address = PORT=BAC1
This would set the BACnet UDP port to 0xBAC1, by default the UDP port is set to 0xBAC0.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
57
z z z z z z z
Point Access = 2 (2 is required for DeviceSelf Object) Type = 200 (200 is required for DeviceSelf Object) Instance = 99 (Device Self Object unique Instance is 99) Property = 25 (Tuning variable: 25 points per second) BACnet Network = 1 (BACnet network number is 1) IP Address = <Blank> (Not Required) Default Priority Level = 8
58 Schneider Electric
If no priority levels are assigned the XDriver uses priority level 10 for all commandable objects (Analog Output, Analog Value, Binary Output, Binary Value) If no priority level is assigned to the DeviceSelf object the XDriver uses this priority as its default priority level. If a priority level is assigned to any XDriver Server point then that priority level is used when that point is commanded. When all entries in the priority array are empty the value of the commandable property shall have the value specified by the relinquish default property.
z z z
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
59
Programming Introduction
This section describes Schneider Electric proprietary Plain English(PE) programming language, and provides many programming examples.
60 Schneider Electric
The examples in this section correspond to the table in Appendix A Supported Access Control Elements". Please refer to this appendix to view the different access control elements which Plain English programs may reference. Note: The program type for each example corresponds to the Program Type field in Appendix A.
Program Type 1 Distribute Door Attribute Values to MNB-1000 or UNC/ENC Controllers When a Persistent Door Attribute Changes
In our first sample program we show how to distribute a Door attribute value to an MNB-1000 or UNC/ENC controller whenever the value of that attribute changes. In this case we distribute the value of, "State", which indicates whether or not the door is currently enabled. For the purposes of this example it is assumed that the user has previously created an XDriver Client object named, " XdrvrClientObj" that updates an object in and MNB-1000 or UNC/ENC controller each time the value of XdrvrClientObj changes. Since the range of values for the attribute State is limited to 0 or 1, the BACnet object type of the associated MNB-1000 or UNC/ENC controller object could be either Analog or Binary. Note: This program and all other sample programs in this section should be configured as Looping and Autostart. Program Type 1 Numeric nState Line 1 nState = Door1 State XdrvrClientObj = nState Goto 2 Line 2
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide 61
If nState <> Door1 State Then nState = Door1 State XdrvrClientObj = nState EndIf Line E Goto 1 The first thing to notice is that we defined the variable, "nState", in the variable declaration section, prior to Line 1. This variable is then used in Line 1 to store the current State value (typically this value is True or 1, meaning "Enabled"). The program then assigns value of nState to, "XdrvrClientObj", which in turn updates the value of the associated MNB-1000 or UNC/ENC object. Once directed to Line 2, further program execution will occur only when State differs from nState (typically when the value changes to False or 0, meaning "Disabled"), by including in the line, "If nState <> Door1 State Then". When this condition is met, the program will execute the two lines inside the If/End If clause. The first of these statements, "nState = Door1 State" initializes the variable with the new State value, while the following statement, " XdrvrClientObj = nState" again causes the X-Driver Client object to distribute the most recent value. Note: Because Line 2 does not contain a "GoTo" statement the program will remain in Line 2, waiting for the next change of value, until the controller restarts or a run-time error occurs. If a run-time error occurs, the program will automatically disable unless the program includes a line label at the end of the program, "Line E". You will notice that the current program's Line E contains a single GoTo statement that directs program execution back to Line 1. This will cause the program to attempt to distribute the most recent State value whenever communication with the second device is restored. We recommend that you include a Line E in all of your programs.
62 Schneider Electric
Note: The most common cause of a run-time error is when a remote device with which the program attempts to communicate cannot be contacted.
Program Type 2 Modify Door Attribute Values from MNB-1000 or UNC/ENC Controllers
In the second sample program we examine how to modify a Door attribute value by setting the attribute equal to the value of an XDriver Server object that an MNB-1000 or UNC/ENC controller modifies. In this case we change the PermanentUnlock attribute, which indicates whether the door is indefinitely unlocked. The door is not indefinitely unlocked when PermanentUnlock is False or 0 (the default value), and is indefinitely unlocked when PermanentUnlock is True or 1. For the purposes of this example it is assumed that the user has previously created an XDriver Server object named, "XdrvrSrvrObj ", using the BinaryValue BACnet object type. Program Type 2 Numeric nCurrentValue Line 1 nCurrentValue = XdrvrSrvrObj Door1 PermanentUnlock = nCurrentValue Goto 2 Line 2 If nCurrentValue <> XdrvrSrvrObj Then Goto 1 Line E Goto 1 As we did in the first sample program we have declared a single program variable prior to Line 1, this time named, "nCurrentValue". In this program nCurrentValue will temporarily store the value of
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
63
XdrvrSrvrObj whenever the program starts or the value of XdrvrSrvrObj changes. The PermanentUnlock attribute is then set equal to the variable's value. Notice that in Line 1 nCurrentValue first receives the value of XDriver Server object when the statement, "nCurrentValue = XdrvrSrvrObj" executes. This value is then assigned to PermanentUnlock at the next statement, "Door1 PermanentUnlock = nCurrentValue". Once directed to Line 2 the program compares the values of nCurrentValue and XdrvrSrvrObj and returns to Line 1 only when those values differ, using the statement, "If nCurrentValue <> XdrvrSrvrObj Then Goto 1". Once in Line 2 these values should differ only when a MNB-1000 or UNC/ENC device changes the value of XdrvrSrvrObj.
Program Type 3 Distribute Door Attribute Values to MNB-1000 or UNC/ENC Controllers When a One-Scan Door Attribute Changes
Our final example deals with distributing values when a one-scan attribute changes. As previously mentioned, a one-scan value deviates from its default value for only a single controller scan and is therefore available only within the first execution of the program's current line label. Program Type 3 Line 1 If Door1 ValidAccess = TRUE then XdrvrClientObj1 = Door1 EntryLastCard XDrvrClientObj2 = Door1 EntryLastSite XdrvrClientObj3 = Door1 EntryCount EndIf Line E Goto 1
64 Schneider Electric
In this sample program we update several XDriver Client objects each time the door attribute, "ValidAccess" becomes True. For the purposes of this example it is assumed the user has created three XDriver Client objects, "EntryLastCard", "EntryLastSite", and "EntryCount", each of which updates a different MNB-1000 or UNC/ENC object value. Since the range of values for these attributes is not limited to 0 or 1, the BACnet object type of the corresponding MNB-1000 or UNC/ENC controller objects should be Analog (Output or Value). Note: The program execution will remain in Line 1 unless an error occurs. You will notice that this program uses no program variables and instead directly updates the XDriver Client objects each time ValidAccess is True, indicating that the door has received a valid request to unlock (typically this occurs when a cardholder presents a valid card at the door's electronic reader). Also, ValidAccess is always False except for the controller scan coinciding with a valid access event.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
65
Program Type 1 Distribute Door Attribute Values to MNB-1000 or UNC/ENC Controllers when a Persistent Door Attribute Changes in the SecondACX
For the purposes of this example it is assumed that the user has previously created an XDriver Client object named, "XdrvrClientObj" in FirstACX that updates an object in an MNB-1000 or UNC/ENC controller each time the value of XdrvrClientObj changes. This program should be created in SecondACX. Program Type 1 Numeric nState Line 1 nState = Door1 State FirstACX\XdrvrClientObj = nState Goto 2 Line 2 If nState <> Door1 State Then nState = Door1 State FirstACX\XdrvrClientObj = nState EndIf Line E Goto 1 Similar to the first example from the previous section, we again update the value of the pre-configured Client XDriver point, XdrvrClientObj. In this case, however, since the XdrvrClientObj is contained in FirstACX and this program in SecondACX, the program must reference XdrvrClientObj using remote object reference syntax.
66 Schneider Electric
Notice that the name of FirstACX precedes the name of the Client XDriver point, and those names are separated by a backslash ("\"). The value we wish to transmit is then assigned directly to XdrvrClientObj in Lines 1 and 2.
Program Type 2 Modify Door Attribute Values in SecondACX from MNB-1000 or UNC/ENC Controllers
In the second sample program we show how to modify a Door attribute value in SecondACX by setting the attribute equal to the value of an XDriver Server object from FirstACX. For the purposes of this example it is assumed that the user has previously created an XDriver Server object named, "XdrvrSrvrObj" in FirstACX, using the BinaryValue BACnet object type. This program should be created in FirstACX. Program Type 2 Numeric nCurrentValue Line 1 nCurrentValue = XdrvrSrvrObj SecondACX\Door1 PermanentUnlock = nCurrentValue Goto 2 Line 2 If nCurrentValue <> XdrvrSrvrObj Then Goto 1 Line E Similar to the second example from the previous section, we again update the value of pre-configured Server XDriver point, XdrvrSrvrObj. Since XdrvrSrvrObj and this program are contained in FirstACX and the target Door object in SecondACX, the program must again use remote object reference syntax, as shown in Line 1.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
67
Program Type 3 Distribute Door Attribute Values to MNB-1000 or UNC/ENC Controllers When a One-Scan Door Attribute Changes in SecondACX
In our final example, we show how to distribute one-scan values in a multiple ACX 57xx controller environment. For the purposes of this program it is assumed that FirstACX has the Client XDriver objects, " XdrvrClientObj1", " XdrvrClientObj2", and " XdrvrClientObj3". This program should be created in SecondACX. Program Type 3 Line 1 If Door1 ValidAccess = TRUE then FirstACX\XdrvrClientObj1 = Door1 EntryLastCard FirstACX\XDrvrClientObj2 = Door1 EntryLastSite FirstACX\XdrvrClientObj3 = Door1 EntryCount EndIf Line E Goto 1 Notice once again that Client objects in FirstACX are referenced using the remote object reference syntax, and that the appropriate values are transmitted whenever the one-scan value changes.
68 Schneider Electric
Chapter 4
web.Client
Introduction to the web.Client tool System and Pre-Installation Requirements web.Client Setup Configurations Hardware and Software Requirements for LAN System Hardware and Software Requirements for a Standalone System web.Client User Documentation
Note:
Before installing or upgrading to web.Client version 1.81, be sure the requirements outlined in this chapter are satisfied. web.Client users must have a password to log on. web.Client user names and passwords are the same as Continuum user names and passwords.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
69
Chapter 4: web.Client
web.Client Overview
web.Client is an application that can provide you with web-enabled access to your access control system. By using a standard browser, your authorized personnel can access the access control system in real time across your sites local area network (LAN) or across your wide-area network (WAN). web.Client is either added to a LAN Continuum CyberStation system or installed with a standalone CyberStation on a single PC. The web.Client application can be accessed via a web browser on an Enterprise Server/WorkPlace Pro machine for use with this Andover Continuum Security and TAC I/A series solution. With the basic web.Client Personnel Manager option, you can:
z z z z
Create, search for, edit, and delete personnel records Change employee access privileges View a persons access events View and generate reports of all access events, including area access events, access events by persons, and distribution-event transactions via the Access Distribution View Edit and view schedules and calendars. Change a password.
z z
With the advanced web.Client Pro option, you have all the features of the basic web.Client Personnel Manager option as well as the following additional features:
z
Create, run, and view graphical reports (class object Report), including bar charts, pie charts, trend charts, text reports, and so on. List and view graphics and groups View live system alarms and live events View live video, as well as search for and view recorded video, via the class object, VideoLayout.
z z z
70 Schneider Electric
Chapter 4: web.Client
Search for web.Client objects by exploring a folder tree hierarchy or a network/device tree hierarchy, or by using a text search engine.
Related Documents
Document
Continuum web.Client Planning and Installation Guide for Version 1.81 Andover Continuum CyberStation for TAC I/A Series Access Control Essentials Guide (Version 1.81) web.Client online help (Version 1.81)
Document Number
30-3001-835 30-3001-503
Extensive online help is available within the web.Client application browser window. To view the help topics for web.Client, click the question mark button that appears at the top of every web.Client screen. The online help covers all of the major features in the web.Client user interface. .
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
71
Chapter 4: web.Client
An integrated system without web.Client consists of a database server and high powered, dedicated workstations connected via the TCP/IP network. Also note that all administration must be performed at one of the dedicated workstations. The following illustration shows the administration of the typical system would entail. In this security example, a single administrator is responsible for assigning all security privileges for engineering and manufacturing personnel.
72 Schneider Electric
Chapter 4: web.Client
A database server Dedicated workstations for configuration A dedicated web.Client application server PCs running Internet Explorer 6.0 or 7.0 connecting web.Client
You will be installing either a web.Client for a LAN system or a standalone with web.Client. A LAN system has two servers: a database server and a web.Client application server. In a standalone system, the database and web.Client application reside on one server.
Note:
You can delegate security tasks to authorized personnel who then assign security privileges for their departments (in this case, engineering and manufacturing personnel). You use the dedicated workstation, and the authorized personnel use web.Client on their own computers. In the administration of a web.Client system, for example, you would be responsible for assigning privileges to engineering and manufacturing designees, who in turn are responsible for assigning all security privileges for engineering and manufacturing personnel. Similarly, you could grant access rights to:
z z z z
A coordinator to schedule a conference room and activate the lighting A technician to take control of a door during service A manager to search video for an incident A facilities manager to graphically monitor and adjust building conditions and monitor alarms
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
73
Chapter 4: web.Client
74 Schneider Electric
Chapter 4: web.Client
Delete
X X Events within schedules only
Create
X Events within schedules only X
Reports Areas Groups Loops Graphics Alarms Events Distribution Events Points and objects
X X X X X X X X X
X X X X
X
a
a. Video can be modified, but not saved. For example, you can change cameras, show/hide time, change focus, zoom, but you will lose these changes if the page is refreshed or you open another editor.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
75
Chapter 4: web.Client
If your system has no more than 25 users, select one server as the web.Client IIS server. This IIS server should be dedicated to running the web.Client application. For a larger LAN system (at least for any system having more than 25 users) your site must have more than one IIS server.
Depending on your particular LAN installation, the IIS server can be:
z z
Windows XP Professional workstation (maximum of two users) Windows Server 2003 (maximum of 25 users per IIS server)
The IIS server must be on a network that can connect to the Continuum/SQL database server. The browser PCs should be on a network that can connect to the IIS server. web.Client version 1.81 will upgrade any previous version on IIS server. web.Client 1.81 includes CyberStation 1.81, and installing it upgrades the IIS machine to 1.81. Workstations not at version 1.81
76 Schneider Electric
Chapter 4: web.Client
must be upgraded before installing web.Client. The following table shows the hardware and software requirements for the IIS server and the client browser on LAN systems: Hardware Requirements for IIS Server for LAN Systems
Minimum
1.6 GHz Pentium IV processor
a
Recommended
2.4 GHz Pentium IV processor 1024 MB RAM plus 5 MB per connection 40 GB hard drive (NTFS Partition) CD ROM drive 10/100 MB Ethernet Network Interface card Parallel or USB port
512 MB RAM plus 5 MB per connection 20 GB hard drive (NTFS Partition) CD ROM drive 10/100 MB Ethernet Network Interface card Parallel or USB port
a. Memory and processor speed - Performance is directly related to processor speed and RAM. Increasing hard drive size allows for growth of applications (graphics, programs, and so on). Faster processor speeds and more RAM available to the program will increase performance.
Note:
Every connection to the IIS server by a browser PC accessing web.Client uses 5 MB of RAM on the IIS server. (For example, two browser PCs connected to the IIS server accessing web.Client use 10 MB of RAM on the IIS server. For this configuration, Schneider Electric recommends 512 MB plus 10 MB (used by the two PCs) or a minimum of 522 MB of RAM on the IIS Server.)
The following software is recommended for LAN systems: Software for LAN Systems
Tested & Supported Software for LAN Systemsa Server
Microsoft Windows XP Professional workstation, Service Pack 2. This accommodates up to two users. OR: Microsoft Windows Server 2003 (Service Pack 1). This accommodates up to 25 users OR: Microsoft Server 2003 R2. This accommodates up to 25 users. Internet Explorer 6.0, with Service Pack 1 OR: Internet Explorer 7.0 IIS: Microsoft Windows XP: IIS 5.0 Microsoft Windows Server 2003: IIS 6.0
Browser
Internet
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
77
Chapter 4: web.Client
TCP/IP Microsoft .NET Framework version 2.0 (for web.Client) AND: Microsoft .NET Framework version 3.0 (for Schneider Electric Video Layout Control) Windows Installer 3.1
a. Internet Explorer, IIS, and TCP/IP are included with the Microsoft operating systems. Upgrades and service packs are available free of charge from Microsofts web site, www.microsoft.com.
The following table shows the Browser PCs that are recommended for LAN systems: Browser PCs for Users on a LAN System
Tested & Supported Browser PCs for Users on a LAN System Hardware
The video feature requires network access to a digital video recorder. This may require you to open port 18772 or establish a Virtual Private Network (VPN) connection if there is a firewall.
Software
The client browser PC on a LAN system can be running one of the following:
z z
Internet Explorer 6.0, service pack 1 OR: Internet Explorer 7.0 Verify IE defaults are enabled for: Cookies and JavaScript
78 Schneider Electric
Chapter 4: web.Client
web.Client version 1.81 will upgrade any previous versions IIS server. web.Client 1.81 includes Cyberstation 1.81, and installing it upgrades the IIS machine to 1.81. Workstations other than the IIS server that are not at version 1.81 must be upgraded before installing web.Client. (Refer to the Andover Continuum CyberStation Installation Guide, 303001-720, for upgrade procedures.) The following table lists hardware and software requirements for the IIS workstation and the client browser on standalone systems: Hardware Requirements for Standalone Systems
Minimum
1.6 MHz Pentium IV 512 MB RAM 20 GB hard drive CD ROM drive 10/100 MB Ethernet Network Interface card Parallel or USB port processora
Recommended
2.4 GHz Pentium IV processor1 1024 MB RAM 40 GB hard drive CD ROM drive 10/100 MB Ethernet Network Interface card Parallel or USB port
a. Memory and processor speed - Performance is directly related to processor speed and RAM. Increasing hard drive size allows for growth of applications (graphics, programs, and so on). Faster processor speeds and more RAM available to the program will increase performance.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
79
Chapter 4: web.Client
Note:
Every connection to the IIS server by a browser PC accessing web.Client uses 5 MB of RAM on the IIS server. For example, two browser PCs connected to the IIS server accessing web.Client use 10 MB of RAM on the IIS server. In this configuration, Schneider Electric recommends 512 MB plus 10 MB (used by the two PCs) or a minimum of 522 MB of RAM on the IIS Server.)
The following table shows the software that is recommended for standalone systems: Software for Standalone Systems
Tested & Supported Software for Standalone Systems Server
Microsoft Windows XP Professional workstation, Service Pack 2. This accommodates up to two users. OR: Microsoft Windows Server 2003 (Service Pack 1). This accommodates up to two users. OR: Windows Server 2003 R2 Internet Explorer 6.0, with Service Pack 1 OR: Internet Explorer 7.0 IIS: Microsoft Windows XP: IIS 5.0 Microsoft Windows Server 2003: IIS 6.0
Browser
Internet
Continuum CyberStation Version 1.81 MSDE 2000 database engine with the Continuum database (Service Pack 4) TCP/IP Note: Internet Explorer, IIS, and TCP/IP are included with the Microsoft operating systems. Upgrades and service packs are available free of charge from their web site, www.microsoft.com.
Other
Microsoft .NET Framework version 2.0 (for web.Client) AND: Microsoft .NET Framework version 3.0 (for Video Layout Control) Windows Installer 3.1
80 Schneider Electric
Chapter 4: web.Client
The following table shows the browser PCs that are recommended for standalone systems: Browser PCs for Users on a Standalone System
Tested & Supported Browser PCs for Users on a Standalone System Hardware
The video feature requires network access to a digital video recorder. This may require you to open port 18772 or establish a Virtual Private Network (VPN) connection if there is a firewall.
Software
The client browser PC on a standalone system can be running one of the following:
z z
Internet Explorer 6.0, with Service Pack 1 OR: Internet Explorer 7.0 Verify IE defaults are enabled for Cookies and JavaScript
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
81
Chapter 4: web.Client
82 Schneider Electric
Appendix A
Supported Access Control Elements
The following tables list the different access control elements shared by the integrated system that Plain English programs can reference.
z
First column: Lists the different categories of access control elements - Door attributes, ACX 57xx system variables, ACX 57xx points, and ACX 57xx point attributes. The values of any of these elements can be distributed to MNB-1000 or UNC/ENC controllers by creating Plain English programs that update one or more XDriver Client objects when element values change. Second column: Provides a description of each element. Third column: Indicates whether or not the element is read-only. Plain English programs can modify the values of some access control elements, if the element is not a read-only value. Fourth column: Indicates whether or not the element is a "onescan" value, a value that exists for only one scan of the controller before reverting to its default value. Fifth column: The Program Type value in this column corresponds to the different example types from the Chapter 3 section, Programming Introduction. Sixth and Seventh columns: Lists the BACnet object type of the associated XDriver object, plus the permissible range of values that the access control element can take, respectively.
z z
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
83
Description Whether Alarm 1 is active Whether Alarm 2 is active Whether Alarm 3 is active Whether Alarm 4 is active Whether Alarm 5 is active Whether Alarm 6 is active Whether Alarm 7 is active Whether Alarm 8 is active Bitstring value of Alarm 1 - Alarm 8 Whether the Door is open longer than door ajar time Bitstring value of door fault combinations 1 - 5 Value of the associated supervised input User has initiated a durress event. Indicates if there any entry/egress violation.
Values/Ranges 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 (no positions active) ... 255 (all positions active) 0 = False 1 = True 0 (no faults are active) ... 31 (all faults are active) 0 = Open 1 = Closed 2 = Trouble 0 = False 1 = True 0 = False 1 = True
DoorAjar DoorFault
Yes Yes
Yes No
3 1
Binary Analog
DoorSwitch
Yes
No
Analog
Duress EntEgrViolation
Yes Yes
Yes Yes
1 1
Binary Binary
84 Schneider Electric
Description Number of cardholders entered on entry side of door Card number of the last person entered Site code of the last person entered Number of cardholders entered on exit side of door Card number of the last person exited Site code of the last person exited Value of the associated supervised input A forced entry violation occurred An invalid card was used. Department number of the last person entered Department number of the last person exited Unlocks the door for a definite amount of time. Indicates if the door has been overridden. Indicates the actual value of the door when it has been overridden.
Values/Ranges 0...65535
No No No No No No
1 1 1 or 2 1 1 1
0...4294967295 0..65535 0...65535 0...4294967295 0...65535 0 = Open 1 = Closed 2 = Trouble 0 = False 1 = True 0 = False 1 = True 0...4294967296 0...4294967296 0 = False 1 = True 0 = False 1 = True 0 = False 1 = True
No Yes No No No No No
1 3 1 1 1 or 2 1 1
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
85
Description Unlock the door indefinitely. Indicates whether the door is currently enabled. Indicates a valid access through the door. Indicates the state of the door.
* Program Type 1 = Distribute value to BACnet/IP network 2 = Modify value via BACnet/IP network 3 = Distribute one-scan value to BACnet/IP Network
Description Value of the CabinetTamper system variable Value of the SystemStatus system variable
Values/Ranges 0 = False 1 = True 0 = Coldstart 1 = Normal 2 = NoComm 3 = NoDatabase 0 = No reader connected 1 = Reader connected 0 = No reader connected 1 = Reader connected
Rdr1Connected
Yes
No
1 or 2
Analog
Rdr2Connected
Yes
No
1 or 2
Analog
86 Schneider Electric
Values/Ranges 0 = No reader connected 1 = Reader connected 0 = No reader connected 1 = Reader connected 0 = No reader connected 1 = Reader connected 0 = No reader connected 1 = Reader connected 0 = No reader connected 1 = Reader connected 0 = No reader connected 1 = Reader connected
Rdr4Connected
Yes
No
1 or 2
Analog
Rdr5Connected
Yes
No
1 or 2
Analog
Rdr6Connected
Yes
No
1 or 2
Analog
Rdr7Connected
Yes
No
1 or 2
Analog
Rdr8Connected
Yes
No
1 or 2
Analog
* Program Type 1 = Distribute value to BACnet/IP network 2 = Modify value via BACnet/IP network 3 = Distribute one-scan value to BACnet/IP Network
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
87
Values/Ranges 0 = All access disallowed 1 = Door opens normally 0 = Access control in effect 1 = Door is permanently unlocked 0 = All access disallowed 1 = Door opens normally 0...n 0...n
No
No
1 or 2
Binary
No
No
1 or 2
Binary
Value of the associated Output object Value of the associated Input object
No Yes
No No
1 or 2 1
Analog Analog
* Program Type 1 = Distribute value to BACnet/IP network 2 = Modify value via BACnet/IP network 3 = Distribute one-scan value to BACnet/IP Network
88 Schneider Electric
Description Indicates whether Alarm 1 is active. Indicates whether Alarm 2 is active. Indicates whether Alarm 3 is active. Indicates whether Alarm 4 is active. Indicates whether Alarm 5 is active. Indicates whether Alarm 6 is active. Indicates whether Alarm 7 is active. Indicates whether Alarm 8 is active. Bitstring value of Alarm 1...8
Values/Ranges 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = Not active 1 = Active 0 = (no positions active) ... 255 (all positions active)
* Program Type 1 = Distribute value to BACnet/IP network 2 = Modify value via BACnet/IP network 3 = Distribute one-scan value to BACnet/IP Network
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
89
90 Schneider Electric
Appendix B
Best Practices
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
91
3. Test XDriver Client objects before referencing them in a program. Before referencing an XDriver Client object in a program, test whether the object is correctly configured. Change the XDriver Client object's value and determine whether the corresponding object in the external device is updated. 4. Test XDriver Server objects before referencing them in a program. Before referencing an XDriver Server object in a program, test whether an external device can modify the object. 5. Use short names for objects, whenever possible. When creating XDriver Client or Server objects, use 16 or fewer characters for object names. This practice reduces the amount of manual coding in programs and keep the object name in the database and controller consistent. Objects names should also not
92 Schneider Electric
contain spaces, and characters other than "." and "_", and should begin with an alpha character. 6. Use a unique Instance for the DeviceSelf Object. The Instance value of the DeviceSelf Object determines its BACnet Object Identifier. Ensure that this value conflicts with no other device on the BACnet inter-network, as unpredictable behavior might occur. 7. Make all programs Looping and Autostart. When creating Plain English programs always configure the program to be Autostart and Looping. These settings cause the program to begin whenever the controller starts or when a change to the program is saved. They also will cause the program to remain running unless an error occurs. 8. Use a "Line E" in all Programs. This prevents programs from disabling when a run-time error occurs. The most common cause of a run-time error is when a remote device cannot be contacted. 9. Limit the number of referenced objects to 100. Limit the number of objects that a single program references to 100. This includes XDriver Client and Server objects. Multiple programs can be utilized to accommodate greater numbers of point value distributions. 10. Group One-Scan Attributes in the same program. Group as many one-scan attributes in the same program as possible. This practice tends to reduce the overall application complexity. 11. Disable the ReadPropertyMultiple requests, if more than 10 XDriver Server objects are referenced from the same Enterprise Server. If 10 or more XDriver Server objects are referenced from the same Enterprise Server, the Device object for the ACX 57xx controller should be configured to not use ReadPropertyMultiple requests. To disable the initiation of ReadPropertyMultiple requests use the appropriate setting in the Configuration tab of the Properties page for the applicable ACX 57xx device in the Enterprise Server/ WorkPlace Pro.
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
93
12. When configuring the Parameters for a Client XDriver point that will distribute values to another BACnet/IP device, make sure the BACnet Network value (Parameter 5) matches the BACnet Network value for the DeviceSelf object. The Client XDriver object does not send updated point values if these values are different.
94 Schneider Electric
Appendix C
Related Documents and Resources
The following table contains related documents referenced in this guide as well as additional resources useful in implementing the Continuum I/A Series integrated access control system: Document Name Andover Continuum CyberStation Installation Guide for Version 1.81 Continuum CyberStation Configurators Guide Continuum CyberStation Configurators Guide Addendum - 1.81 Andover Continuum CyberStation Plain English Language Reference Andover Continuum web.Client Planning and Installation Guide Andover Continuum Security and TAC I/A Series Access Control Essentials Guide ACX 57xx Series Controller Operation and Technical Reference Guide Part Number 30-3001-720 30-3001-781 30-3001-880 30-3001-872 30-3001-835 30-3001-503 30-3001-999
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide
95
Document Name Continuum online help web.Client online help Niagra BACnet Integration Reference TAC I/A Series MicroNet BACnet Wiring and Networking Guide Workplace Tech Tool 5.6 Engineering Gide Supplement See Applicable Doc Table, page iv TAC I/A Series MicroNet BACnet WorkPlace Commissioning Tool and Flow Balance Tool Users Guide
Part Number
96 Schneider Electric
Andover Continuum Security and TAC I/A Series Data Exchange Reference Guide Document Number 30-3001-406 Revision B