EST EST3 v1.0 Keypad Display Configuration User Manual
EST EST3 v1.0 Keypad Display Configuration User Manual
User Manual
P/N 3100130 • Rev 1.0 • 25OCT01
DOCUMENT HISTORY
Date Revision Reason for change
25OCT01 01.00 Initial release.
Chapter 1 Introduction•1.1
Using this manual•1.2
KDC minimum system requirements•1.3
System features•1.4
What is the KDC program?•1.5
KDC building blocks•1.6
Setting up the system•1.7
Chapter 5 Operators•5.1
What is an operator?•5.2
Creating a new operator record•5.3
Setting operator privileges•5.5
Activating and deactivating an operator•5.8
Logging on as a new operator•5.10
Changing your operator password•5.11
Editing and deleting an operator record•5.13
Changing operator information•5.14
Chapter 6 Tasks•6.1
What is a task?•6.2
Default tasks•6.3
Creating a task•6.4
Starting a task•6.5
Assigning a task to KPDISPs•6.7
Activating and deactivating a task schedule•6.8
Viewing the status of a task•6.9
Editing and deleting a task•6.11
Chapter 11 Reports•11.1
What is a report?•11.2
Default reports•11.3
Creating a report•11.5
Filtering reports•11.7
Setting the styles for a custom report•11.11
Adding fields to a custom report•11.14
Running a report•11.16
Viewing and printing a report•11.17
Editing and deleting a report•11.19
Y Glossary•Y.1
Z Index•Z.1
Important information
Limitation of liability
This product has been designed to meet the requirements of
Underwriters Laboratories, Inc., Standard 294. Installation in
accordance with this manual, applicable codes, and the
instructions of the authority having jurisdiction is mandatory.
EST shall not under any circumstances be liable for any
incidental or consequential damages arising from loss of
property or other damages or losses owing to the failure of EST
products beyond the cost of repair or replacement of any
defective products. EST reserves the right to make product
improvements and change product specifications at any time.
While every precaution has been taken during the preparation of
this manual to ensure the accuracy of its contents, EST assumes
no responsibility for errors or omissions.
Intended audience
This manual was written for people who have a working
knowledge of Windows-based computer programs.
Organization
This manual is organized to serve as a guide for the first-time
user. It takes you through the steps required to set up the system
for the first time, introducing you to each KDC feature or
function as it’s needed. The chapters are presented in the
sequence you will need as you work through the KDC program
from start to finish.
If your system has already been set up by your administrator and
all you wish to do is add users, proceed to Chapter 09: People:
basic. For you to be able to gain access to the KDC, your system
administrator must set you up as an operator with proper
privileges.
The manual consists of the following chapters:
Chapter 1: Introduction. This chapter introduces you to the KDC
software and discusses the program’s functions within an
integrated life safety system.
Chapter 2: Getting started. This chapter provides information
and procedures required to navigate and customize the KDC
program. It also describes the Log In process for first-time users
and shows how to import a Resource Profile (RP) file.
Chapter 3: Basic operations. This chapter shows you the steps
for common operations including downloading, saving, backing
up, and exiting from the program.
Chapter 4: System and hardware configuration. This chapter
provides information about the administration functions of the
KDC. It also provides procedures for configuring hardware
elements of the program.
Chapter 5: Operators. This chapter provides general information
required for defining and creating additional operators. The
functions the operators can perform are controlled by the
privileges that are assigned to them.
Chapter 6: Tasks. This chapter defines KDC tasks and the
important functions they perform. Tasks are used to perform
system updates and database maintenance.
Chapter 7: Outbound ports and routes. This chapter shows you
how to configure your system to communicate with the Keypad
Purpose
The purpose of this manual is to give users of the KDC detailed
operating instructions for the program.
This manual provides a reference for both novice and
experienced users of the KDC software. The manual assumes
that the necessary hardware and software installation has been
successfully completed.
Note: Depending on your specific operator privileges, you may
not see all of the system menus shown or described in this
manual.
Summary
Welcome to the Keypad Display Configuration (KDC) software.
The KDC is feature-rich software that makes it easier and more
efficient to manage your Keypad Displays (KPDISPs). This
chapter introduces the KDC program, and discusses the
program’s functions within an integrated life safety system. It
also covers the conventions we use in this manual when giving
the instructions for completing specific tasks.
Content
Using this manual • 1.2
Mouse vs. keyboard • 1.2
Step-by-step instructions • 1.2
KDC minimum system requirements • 1.3
System features • 1.4
What is the KDC program? • 1.5
KDC building blocks • 1.6
Access levels • 1.6
People • 1.6
Setting up the system • 1.7
Step-by-step instructions
The table below shows the conventions used in this manual.
Notation Meaning
Ctrl + P Simultaneous key press: Press and
hold Ctrl, press and hold P, then
release both keys
Alt, P, N Sequence of key presses: Press and
release Alt, press and release P,
press and release N
Tip: Text of the tip. Tips, displayed in the left column, give
keyboard shortcut or alternative
method for the particular task
Note: Text of the note. Notes are important facts that can
save you time or prevent serious
mistakes
System features
The KDC provides a user-friendly environment for configuring
your KPDISPs. It makes managing your fire and security system
easier and more efficient.
The KDC includes these features:
• Data import from several commonly used databases
• Filter-defined search capability for KPDISP user
• User data import from an external file
• Administrator definable operator privileges
• Access levels to control fire alarm and security privileges
• Database reports
• Encrypted external communications
Access levels
Not all people require the same type of privileges. Therefore, the
KDC lets you create different groups of privileges. These
predefined groups are called access levels.
In practice, you will define an access level for each group of
people having the same security and fire alarm needs.
Example: A manager might have fire alarm, arm, and disarm
privileges, while a janitorial worker would not.
Each access level consists of the following:
• Fire alarm privileges
• Security privileges
KPDISPs have the following fire alarm privileges:
• Disable privilege
• Panel silence privilege
• Reset and alarm silence privilege
KPDISPs also have the following security privileges, which
apply only to the partition:
• Arm away privilege
• Arm stay privilege
• Bypass/Disable privilege
• Disarm privilege
People
The users of your system are referred to as people in the KDC.
Each person record you create has a password and an access
level. The access level contains privileges. The access level
defines what the person can and can not control from each
KPDISP.
Summary
This chapter defines the process of logging on for the first time
and importing the Resource Profile (RP) file for your company.
Not all of the KDC’s features and functions become active until
an RP file is imported.
This chapter also provides general information about screen
layouts and navigation for the KDC program. Included are
discussions on the menus, functions, and procedures of the KDC.
Content
Starting the program • 2.2
Logging on for the first time • 2.4
What is an RP file? • 2.4
Logging in as an installer • 2.4
Changing the installer password • 2.5
Importing an RP file • 2.6
Importing a sample RP file • 2.9
What you should and should not add to the sample
database • 2.9
Importing the real RP file into the sample RP file • 2.10
Removing the sample RP file hardware • 2.11
Logging on after RP file import • 2.13
Importing an RP file into an existing company • 2.14
Modifications to the existing SDU project • 2.14
Importing a new SDU project • 2.15
Deleting an SDU project • 2.17
Deleting a company • 2.18
Interface overview • 2.19
Title bar • 2.19
Menu bar • 2.20
Toolbar buttons • 2.22
Tabs • 2.24
Selection list or tree • 2.25
Left, middle, and right panes • 2.25
Status bar • 2.25
• Click Start > Programs > Access Control DataBase > Access
Control DataBase, or double-click the Access Control
DataBase icon on your desktop.
The KDC displays a progress bar indicating that the program is
starting.
Log In
The Log In option is the entry point for using the software. Users
are issued an Operator ID and a password that lets them gain
entry to the program and make modifications to their system.
Exit
The Exit option lets you exit from the program.
Help
The Help option launches an online version of this manual. The
online version includes three navigation tabs:
• The Contents tab provides a table of contents view of the
help system
• The Index tab is an alphabetical list of terms. Use the index
to find topics associated with each term.
• The Search tab lets you search for keywords you enter. This
is generally the fastest method of locating answers to your
questions.
About
The About option brings up a box displaying the current version
of the KDC software. This information is useful if you decide to
upgrade your software and need to know what version you are
currently running.
What is an RP file?
The RP file defines the integrated system for the KDC program.
It includes detailed information about each KPDISP and
partitions used in your system. It contains the following:
• KPDISPs, partitions, and buildings in the system
• Routing required to access each device for downloads
• KPDISP fire alarm command privileges
• Primary partition for each KPDISP
• Number of allocated people for each KPDISP
• Number of allocated access levels for each KPDISP
• All MODCOM (integrated system dialer/modem card)
information
Logging in as an installer
If you do not have an operator ID and a password, you must
import an RP file to obtain them. Begin by logging on to the
software as the installer.
Note: The initial installer password is 3333. We suggest that you
change the installer password after your initial login. Make sure
to record and save the revised password in a safe place.
Importing an RP file
After logging on as an installer, your next task is to import an RP
file. The integrated system installer should have given you the
RP file for your company. The RP file contains the database for
a single site. This includes information about the company,
buildings, partitions, and KPDISPs.
Note: To improve the performance of the KDC, we recommend
that you download to the hardware of your system immediately
after importing your RP file. Log on as the administrator to
download.
Each RP file represents one site of one company. A large
company may have multiple sites.
Example: A company has two different locations of operation.
One is in New York and the other is in Tennessee. Each site
would have a separate RP file.
You can only import one RP file at a time. Importing the first RP
file defines the company. If you have two sites, you import the
second RP file into the existing company.
Note: To import any additional RP files into an existing
company, you must log off as the installer and log on as the
administrator (ADMIN1).
At the end of the import, the KDC assigns an administrator ID
and password, using the default password ADMIN.
Each company is assigned an administrator ID after the RP file is
imported. You can use this ID and password to begin to add
information to your KDC system.
The default operator ID is ADMIN1, with password ADMIN.
ADMIN1 is always used for the first company imported by the
integrated system installer. If a second company is imported, the
operator ID is ADMIN2, again using password ADMIN.
If your integrated system installer has not completed or given
you your RP file, proceed to Importing a sample RP file in this
chapter. Importing a sample RP file will allow you to begin
working with the software while your installer completes your
RP file.
Note: You must be logged in as an administrator to be able to
import additional RP files.
Before using the KDC you must import an RP file, using the
Resource Profile Manager (RPM) file import dialog box
To import an RP file:
Tip: Press Alt + F, I, R to 1. From the file menu, click Import > RPM Configuration
launch the Import Information.
Resource Profile (RPM)
File dialog box. 2. Locate the RP ZIP file you want to import, select it, and
click Open.
If your integrated system installer gave you a floppy disk
containing your RP file, insert the disk and select the RP file
from your floppy drive.
3. Click OK to confirm that the KDC has extracted your
database.
4. Type a company name if your company name does not
match the company name given and click Done.
5. Type a Site name and click Done.
Both company and site are new, since this is the first RP file
import. An example of a site name is Chicago Campus or
North Campus.
6. Click OK.
Note: The system displays the administrator operator ID and
password. Write these down in a safe place.
7. Click OK.
Note: To improve the performance of the KDC and assure
hardware connection, we recommend that you download to the
hardware of your system immediately after importing your RP
file. Log on as the administrator to download. See Chapter 7:
Outbound ports and routes for information on configuring the
KDC for downloading.
Tip: Press Alt + F, I, R to 1. From the file menu, click Import > RPM Configuration
launch the Import Information.
Resource Profile (RPM)
File dialog box. 2. Locate the Sample_Company ZIP file on your installation
CD, select it, and Click Open.
3. Click OK to confirm that the database has been extracted.
4. Click Done for company.
5. Type the Site name, A_Sample_Site and click Done.
Both company and site are new, since this is the first RP file
import.
6. Click OK.
Note: The system displays the administrator operator ID and
password. Write these down in a safe place.
7. Click OK.
Note: Once you have imported the Sample RP file, do not
download to the hardware of your system.
3. Locate and select the updated RP ZIP file you want to import
and click Open.
If your integrated system installer gave you a floppy disk
containing your RP file, insert the disk and select the RP file
from your floppy drive.
4. Click OK to confirm that the database has been extracted.
5. Click Yes to confirm that you are importing a different
project into your database.
6. Select the existing company name.
7. Type the new site or select the existing site and click OK.
Type new site for a project from a separate location.
Select the existing site if the project is from the same
building.
8. If you selected an existing site, select an existing building
where the project is located.
A project being imported into an existing building can
contain no more than one building.
9. In the Options tab, click an Update Option, then click Done.
• Always overwrite with data from import
• Ask for each change
• Never overwrite
Note: The overwrite options do not apply to the hardware of
your system. All KPDISPs are overwritten each time you import
a new RP file. The overwrite options only apply to company
address and company contact information, and building address
and building contact information.
10. Click OK.
Deleting a company
If needed, you can delete a company from the KDC database. A
company represents all RP imports including all sites, buildings,
partitions, KPDISPs, and MODCOMs. Deleting the company
removes all RP files and data from the database (people, access
levels, etc.). After the company has been deleted, you can import
a RP file that contains the correct information for your company.
To delete a company you must log on to the KDC as the
Installer. Refer to Logging on as an installer in this chapter.
To delete a company:
Interface overview
Once you log on, the first screen you see is the main window of
the program. This window contains the navigation tools that you
need for performing tasks within the program.
The program defaults to the People tab, but you can navigate to
any part of the program by selecting the appropriate tab.
The main window has these features:
• Title bar
• Menu bar
• Toolbar with buttons
• Page tabs
• Selection list or tree
• Left, middle, and right panes
• Status bar
Title bar
Menu bar
Toolbar
Page tabs
Selection
list or tree
Status bar
KDC window
Title bar
The title bar shows if the current record you are working on has
been modified or is currently being modified. This makes it
easier to track which records have been modified.
Menu bar
Below the title bar is the menu bar. The menus available are:
Tip: When a menu • File
command has a keyboard • Edit
shortcut, the shortcut is • View
displayed on the menu. • Action
This helps you learn faster, • Tools
more efficient ways to use • Reports
the program.
• Help
Toolbar buttons
Below the menu bar is the toolbar. The toolbar buttons execute
many of the commands found in the menus.
When you point to a button, a tool tip is displayed indicating the
function of the button. Not all toolbar buttons are active at all
times. When a button is not active, it is grayed out.
Toolbar buttons
Tabs
Below the toolbar are the tabs. The tabs separate the KDC
program into its main sections.
KDC tabs
People tab
The People tab stores information about each KPDISP user. The
information includes KPDISP password and access level.
Schedules tab
Not used in the KDC.
Holidays tab
Not used in the KDC.
Reports tab
The Reports tab is used to generate reports. Reports can be
generated with information in the KDC database concerning
people. You can choose reports from templates that have been
included or you can customize your own reports to include
information that you specify.
Administration tab
The Administration tab includes these subordinate tabs: System,
Operators, Tasks, Outbound Ports, and Routes. Only operators
with administration privileges have access to the Administration
tab. Options on the administration tabs let your system
administrator tailor the features and functions of the KDC.
Status bar
The status bar is located at the very bottom of the KDC window.
The KDC displays the following information in the status bar:
• The operator that is currently logged on
• Summary of device troubles
• Who the currently selected record is locked by
• The current state of the record
• The last date and time the record was modified
• The current help message
To obtain additional information about any of the status bar
information, click on the information in the status bar. The KDC
displays a dialog box with additional information.
Summary
The KDC makes use of several basic functions. Learning these
basic functions will help you use the KDC more effectively and
save you time in your day-to-day work. This chapter introduces
you to the basics of the KDC.
Content
Entering a startup screen caption • 3.2
Setting system options and preferences • 3.3
Operator tab • 3.3
Preferences tab • 3.3
Company Information tab • 3.4
Viewing the selection table • 3.6
Navigating with the arrow buttons • 3.6
Selecting with the letter tabs • 3.7
Saving your changes • 3.8
Multiple selection • 3.9
Selecting multiple records with the four action
commands • 3.9
Additional methods to select multiple records • 3.10
Downloading information • 3.11
When to download • 3.11
Downloading failure • 3.11
Backing up your system • 3.13
Moving your database to a new PC • 3.14
Exiting from the KDC • 3.15
Operator tab
The Operator tab lets you view information for the operator
currently logged on. You can also change the operator’s
password using this tab.
The Operator tab also shows the date and time for the current
operator’s last session. See Chapter 5: Operators for detailed
information regarding operators.
Preferences tab
Preferences are set for the current operator of the KDC.
Operators can set their own preferences. The Preference tab is
divided into three subtabs:
• General
• Confirmations
• Diagnostics
General tab
The General tab has the following fields:
• Time Display: Determines whether time is displayed in 12
hour or 24 hour format.
• Date Display: Determines whether dates are displayed in
short or long date format.
Example of long date: Thursday, January 11th, 2001
Example of short date: 01/11/01
• Automatic Logout: Sets the program to automatically log
you off after a specified time.
In addition there is a group of fields called Miscellaneous
options. This includes:
• Weeks Start On Sunday: Determines the starting day
(Sunday or Monday) for calendars.
• Restore to Last Context: Saves your location in the KDC and
starts each session where you ended the previous session.
Normally, the software opens at the People tab.
• Restore Last Operator ID at Login: Retains your login ID
when logging on to the software.
Confirmations tab
For some actions, the system displays a confirmation dialog box.
You can choose whether or not the system displays confirmation
dialogs for the following actions:
• Deleting photos
• Setting privileges
• Resetting privileges
• Adding command lists
• Deleting command lists
Diagnostic tab
The Preferences tab provides diagnostic information for client
activity within the KDC. This section is for factory use only.
The arrow buttons at the top and letter tabs at the bottom are two
ways to navigate through a selection table
Multiple selection
You can select two or more items at once and make a single
change to all selected items. Most tabs with selection tables
allow this functionality.
When you have selected multiple records, some fields can not be
changed. The KDC automatically hides fields that can not be
changed with multiple selections.
To select Do this
A single Hold down Ctrl and select the record
record
Nonadjacent Hold down Ctrl and select the individual records
records
A large range Hold down Ctrl and select the first record of the
of records range, and then hold down Shift and click the
last record in the range
Downloading information
Once information has been entered into the KDC, the data must
be downloaded to your system. Only after the information has
been downloaded will users of the KPDISPs be able to gain
access.
Any time changes are made to the KDC that affect your system,
the revised data must be downloaded. No changes will be active
in the KPDISPs until they are downloaded.
For you to be able to download to the KPDISPs, the Outbound
port and Route of the KDC must be configured. For further
information, see Chapter 7: Outbound ports and routes.
Note: You can download changes to your system at any time or
from any tab within the software. Make sure all information has
been saved before downloading.
• From the File menu, click Send Changes, or click the Send
Changes button on the toolbar.
Note: Verify that the date and time are current at the system
panel. Incorrect date and time causes incorrect operation of the
system.
When to download
To improve the performance of the KDC, it is recommended that
downloads are performed at specific times while setting up your
database. The following gives the times when you should
download.
• After importing your companies RP file
• After creating and activating no more than 1000 cardholders
Downloading failure
When a yellow X is displayed over a KPDISP this indicates that
the system failed to download to this KPDISP. This can be seen
from the tree view in the Access Levels tab and the
Administration > System tab.
If you see a yellow X over a KPDISP, confirm that the device
has not been removed from your system and that it is functioning
properly. Also, confirm that you have configured your outbound
ports and routes properly.
The yellow X over a KPDISP shows that the KDC could not
download to it because of a communication error
Summary
This chapter defines the process of configuring your fire and
security system including Keypad Displays (KPDISPs).
Note: As an end user, you may not be required or allowed to edit
the configuration of your system. This section is provided so you
can have a complete understanding of all program options, and is
not meant to imply that all operators must perform these
configuration procedures. If you have any questions regarding
system setup, check with your KDC administrator for
clarification.
Content
Configuring your system • 4.2
Configuring your system in company view • 4.3
Reviewing and editing company information • 4.3
Viewing the project site information • 4.4
Reviewing and editing building information • 4.5
Viewing the partition information • 4.6
Configuring your system in hardware view • 4.7
Viewing SDU, CPU, and 3-SAC • 4.8
MODCOM • 4.8
Viewing Keypad Displays (KPDISPs) • 4.9
Communication routes • 4.10
Other companies with access • 4.10
Company information
MODCOM
The MODCOM is only visible in the hardware view. The
MODCOM has modem and dialer capabilities. It is used for
downloading information from remote sites. MODCOMs are
configured, programmed, and installed by your system installer.
You can not change any of their parameters except their
communication route.
Each MODCOM has one communication route. The
communication route defines how the KDC downloads
information to the MODCOM. All MODCOMs are initially set
to a default route. For information on how to change the
communication route for a MODCOM refer to Chapter 7:
Outbound ports and routes.
KPDISP privileges
The privileges for a fire alarm KPDISP differ from the privileges
for a security KPDISP. The same KPDISP can be displayed
under a building for fire alarm applications and under a partition
for security applications.
The company view shows which fire alarm privileges are
available for a given KPDISP. These privileges are assigned
when you create access levels. See Chapter 8: Access levels for
more information.
Communication routes
Each KPDISP has a communication route. The communication
route defines how the KDC downloads information to these
devices. All KPDISPs are initially set to a default route. For
information on how to change the communication route for
KPDISPs refer to Chapter 7: Outbound ports and routes.
Summary
Operators are users of the KDC. The system administrator can
define as many operators as required. You define each operator
by specifying the command privileges that the operator has. This
chapter shows you how to define and create operators.
Content
What is an operator? • 5.2
Creating a new operator record • 5.3
Operator information • 5.3
Last Login and Logout • 5.4
Setting operator privileges • 5.5
Default operator privileges • 5.5
Privilege tabs • 5.5
Activating and deactivating an operator • 5.8
Activating an operator • 5.8
Deactivating an operator • 5.8
Logging on as a new operator • 5.10
Changing operators while the system is running • 5.10
Changing your operator password • 5.11
Changing your password from the Operators tab • 5.11
Changing your password from the Tools menu • 5.12
Resetting an operator's password • 5.12
Editing and deleting an operator record • 5.13
Editing an operator record • 5.13
Deleting an operator record • 5.13
Changing operator information • 5.14
What is an operator?
An operator is someone who enters data into the Keypad Display
Configuration (KDC) database. An operator ID and password are
required in order for an operator to log on to the KDC.
We suggest that you designate a single administrator for each
company in your KDC. The administrator is an operator with full
privileges, including the ability to create and revise operator
records.
The KDC assigns each company an administrator operator ID
and password when importing the RP file. When first logging on
to the KDC you must use this ID and password.
The default administrator operator ID is ADMIN1, with
password ADMIN. ADMIN1 is always used for the first
company imported by the integrated system installer. If a second
company is imported, the operator ID is ADMIN2, again using
password ADMIN.
When you log on, the KDC prompts you to change your
password for future use. To change the ADMIN password, see
Changing an operator password, later in this chapter.
Operator information
You use the Information tab to enter personal information about
the operator, such as name and address.
Operator ID
Operator ID is the first field entered when logging in. The ID can
consist of up to 20 characters. You can use upper case letters or
numbers for Operator IDs. The Operator ID and Password are
required when logging on.
Name
The first information required is the operator’s full name and an
optional title, e.g., Mr., Mrs., Ms, or Miss. Operator names can
be up to 25 characters long.
Passwords
Each operator has an individual password that is required when
logging into the system. The password is specific to the
individual operator. Operators are responsible for remembering
their own passwords. The Operator ID and Password are
required when logging in.
A new operator has the initial default password of PASSWORD.
The operator should change this default password after logging
in.
Privilege tabs
The privilege check boxes are divided into three tabs.
Regular: The regular tab contains privileges for KPDISPs users,
access levels, and reports.
Administration: The administration tab contains privileges for
systems, operators, tasks, outbound ports, and routes.
Special: The special tab contains privileges for company
information and for sending changes to the system.
Example 1: If you need to set privileges for an operator allowing
him read-only rights to the system, you deny all privileges, then
grant the ability to browse system information. You can do this
manually, or simply by clicking the Browse Only default button.
Example 2: If you need to set privileges for an operator to enter
KPDISP users only, you deny him all privileges except the
ability to create, browse, and edit information on the People tab.
You would do this manually.
can go back and delete the privileges for certain items you do not
want them to be able to browse.
Since each site has different parameters for their operators, it is
up to the administrator of the KDC to set and assign the
appropriate privileges for the operators in your system.
Inactive operator
To activate an operator:
Deactivating an operator
The ability to deactivate an active operator lets you temporarily
deny the operator access to the KDC.
Example: An operator has a temporary job function in the KDC
and can be activated and deactivated as needed. This prevents
you from having to reenter the operator each time you need him
to work in the KDC.
To deactivate an operator:
To change operators:
Tip: Press Alt + A, L to log 1. From the Action menu, click Login.
off.
2. Click OK to log off.
3. Type in the new operator ID and password and click OK.
Summary
Tasks let you automate important KDC operations. For example,
tasks can update hardware or purge old data from the database.
This chapter provides information on how to create, define, edit,
activate, and schedule tasks.
Content
What is a task? • 6.2
Default tasks • 6.3
Creating a task • 6.4
DB maintenance • 6.4
Hardware initialization • 6.4
System update • 6.4
People re-initialization • 6.4
Hardware configuration initialization • 6.4
Run transaction queue • 6.5
Starting a task • 6.6
Starting a task manually • 6.6
Scheduling a task • 6.6
Setting properties for a DB maintenance task • 6.7
Assigning a task to KPDISPs • 6.8
Activating and deactivating a task schedule • 6.9
Activating a task schedule • 6.9
Deactivating a task schedule • 6.9
Viewing the status of a task • 6.10
Editing and deleting a task • 6.12
Editing a task • 6.12
Deleting a task • 6.12
What is a task?
Tasks let you automate important KDC functions, such as:
• System updates
• Database maintenance
• Hardware initialization
System updates
Whenever you make changes to your KDC, those changes must
be sent to the hardware of your site. System update tasks send
the new information from the database to the keypad display
modules (KPDISP) of your site.
Database maintenance
A task can be used to purge old records from the KDC database.
You can schedule a database maintenance task to routinely
remove old records. You can also define the age of the records to
be removed.
Hardware initialization
A task can initialize the hardware of your site. The task loads all
security information to the designated hardware. This task is
used for new hardware that has been added to your system. It
also can be used for damaged hardware that may have lost its
information.
The Tasks tab lets you create, edit, schedule, and run tasks
Default tasks
Several default tasks are included in the KDC. Default tasks
serve as templates for most commonly used tasks.
You can modify the default tasks to meet your specific needs;
however, you cannot modify the Update task in any way. The
Update task is the task that runs when you click Send Changes
from the File menu or click the Send Changes button on the
toolbar.
All tasks, except Update, can be started manually or given a
starting schedule (see Starting a task in this chapter). The default
tasks are:
Creating a task
New tasks can be created and added to the list of default tasks. A
task can be one of these types:
• Database (DB) maintenance
• Hardware initialization
• System updates
• Cardholder re-initialization
• Hardware configuration initialization
• Run transaction queue
DB maintenance
DB maintenance tasks can be used to purge old data from the
database. A DB maintenance task is one of the default tasks
provided. The age of the data to be purged is set by you. You can
also schedule the task to run daily, weekly, or monthly.
Hardware initialization
Hardware initialization tasks initialize the hardware in your
system. If a piece of hardware (KPDISP) has lost its database or
had its data degraded, database information can be restored using
this task type. Typically, your service department would use this
task to restore data to hardware. Hardware initialization tasks are
also used when new hardware is added to your site.
System update
The system update task is used to send changes from your
database to the hardware (KPDISPs) in your site. This task only
sends changes that have been made since the last update. A
default system update task is provided, Update. Update is the
task that activates when the Send Changes button on your toolbar
is pressed. If you want to automate the system update task, create
a new task and schedule it to activate at a desired day and time.
People re-initialization
The Cardholder Re-init task reinitializes the users of your
system. The task reloads all people, not including hardware
configuration, to all hardware (KPDISPs).
To create a task:
Starting a task
All tasks, except for Update, can be started manually or by a
schedule. A scheduled task can be run on a daily, weekly, or
monthly basis. If you do not want to schedule the start of your
task, it can be set to start on demand.
1. In the left pane, select the task you want to start manually.
2. Click the Start Now button.
Scheduling a task
You can use the Schedule tab to schedule a task to run on a
daily, weekly, monthly, or demand basis. The frequency you
select determines the scheduling options for the task.
To schedule a task:
In process
The In Process tab shows the status of the task as it is running.
The In Process tab provides a table with the following columns:
• ID
• Started
• Type
• Priority
• Current Status
• Name
• Task ID
• tip.Current Status
This information lets you accurately track the process of the task
as it is running.
Note: The Transaction Not Sent tab does not show task failures
due to communication errors.
1. In the left pane, select the task for which you want to view
the status.
2. Click the Status tab.
To edit a task:
Deleting a task
You can delete all tasks except for the Update task. You may
find it easier deactivate a task rather than deleting it. A
deactivated task can be reactivated later. A deleted task is gone
forever.
Note: Before deleting a task, you must deactivate its schedule.
To delete a task:
Summary
This chapter shows you how to create and configure outbound
ports and routes. Outbound ports and routes define how the KDC
downloads information to the hardware of your system.
Content
Outbound ports and routes overview • 7.2
Outbound ports • 7.2
Routes • 7.3
Creating an outbound port • 7.6
Creating a route • 7.7
Configuring the default route • 7.8
Configuring your system for an alternative route • 7.9
Modifying the default route for MODCOMs and
KPDISPs • 7.9
Assigning a new route to MODCOMs and KPDISPs • 7.10
Editing and deleting an outbound port • 7.12
Editing an outbound port • 7.12
Deleting an outbound port • 7.12
Editing and deleting a route • 7.13
Editing a route • 7.13
Deleting a route • 7.13
Outbound ports
An outbound port specifies the computer and port you are
transmitting from.
During installation, the KDC detects your PC ports
automatically. These are displayed on the Outbound Port tab of
the Administration tab.
Typically, a PC has communication ports at COM1 and COM2.
You are not bound to the automatically detected outbound ports.
You can edit, delete, and add outbound ports as needed.
Routes
Routes define how the KDC connects to the hardware of your
fire and security system. There are two different types of routes:
• Modem connection
• Direct connection (RS-232)
Modem
A modem route uses a telephone line to communicate. The
connection leaves the modem from the PC and connects to the
modem at the control panel.
For a modem route, you configure the Outbound Properties tab
and ModCom tab for that route. The receiving modems are
imported into the KDC with your RP file.
RS-232
An RS-232 route connects directly to the control panel. The
RS-232 runs from your PC serial port and plugs directly into the
control panel.
Communication parameters
Field Default Description
Baud rate None The speed at which at which data can be
transmitted
Maximum 8 The number of times the KDC will try to
retries communicate before timing out
Maximum 800 The maximum length of the message
message sent at any one time
length
Timeout 20 The amount of time before the KDC will
retry to connect
Tracing None Tracing tells the KDC to generate trace
files of the communications stream.
Technical support uses the trace files to
determine communication problems.
Default routes
The KDC automatically creates two default routes for you. (If
your system does not contain a MODCOM, the KDC will not
create a Modcom default route.) The default routes:
• 3-CPU Default
• Modcom Default
If your control panel has no MODCOM, the KDC uses the
3-CPU Default route to communicate to the hardware of your
system. The KDC assigns all KPDISPs to this default route.
If your control panel has a MODCOM, the KDC uses the
Modcom Default route to communicate.
When you click Send Changes from the Action menu or click the
Send Changes button on the toolbar, the system uses the
appropriate default route to communicate to your fire and
security system. The system will not use the default route if you
create an alternative route and assign it to the KPDISPs. See
Configuring your system for an alternative route in this chapter.
Although the KDC creates a default route for you, the default
route still requires configuration. See Configuring default routes
in this chapter.
Routes tab
Creating a route
After you have created your outbound port, you can either assign
the outbound port to the default route or create a new route.
Each KPDISP automatically uses the default route. For a
KPDISP to use a different route, you must manually assign that
route to the device. See Configuring your system for an
alternative route in this chapter.
To create a route:
To edit a route:
Deleting a route
You can delete a route at any time. You might want to delete a
Tip: Use the multiple select route if your access system is no longer using the route to
toolbar buttons or the
download information.
multiple select action menu
items, to select multiple
routes for deleting. You can To delete a route:
delete all selected records
at once.
1. Click the Administration tab.
2. Click the Route tab.
3. In the left pane, select the route you want to delete.
Tip: Press Alt + F, D to
delete an outbound port. 4. From the File menu click Delete or click the Delete button
on the toolbar.
5. Click Yes to delete.
Summary
This chapter describes access levels and shows you how they
work. It also covers the process of creating access levels and
assigning privileges to an access level.
Users of KPDISPs can not log on to any devices until access
levels are created. Assigning access levels to people defines their
access privileges for each KPDISP.
Content
What is an access level? • 8.2
Access level tab • 8.2
Icons on the access level tree • 8.2
Access level toolbar and view buttons • 8.3
States of an access level • 8.4
Creating an access level • 8.6
Expanding and collapsing an access level • 8.7
Setting KPDISP privileges • 8.9
KPDISP security privileges • 8.9
KPDISP fire alarm privileges • 8.11
Setting KPDISP privileges • 8.11
Setting KPDISP privileges for multiple KPDISPs • 8.11
Removing KPDISP privileges • 8.12
Deleting an access level • 8.13
The access level shown above gives all privileges to any user
that is assigned this access level
The Security access level has a red X over all icons. This
indicates that no privileges have been assigned to this access
level.
Disarm privilege
A KPDISP with disarm privileges allows users to disarm a
partition with the keypad. When you disarm a partition, you are
advising the system to stop monitoring devices in the partition
for security alarm events.
Disable privilege
The fire alarm disable privilege allows a user to disable a fire
alarm device from a keypad.
Tip: Press Alt + F, D to 2. From the File menu, click Delete or click the Delete button
delete an access level. on the toolbar.
3. Click Yes to delete the access level.
The access level state changes to Pending Deletion.
4. From the File menu, click Send Changes or click the Send
Changes button on the toolbar.
This downloads the database to your access control system.
After the download, the system changes the access level’s state
to Deleted. When you exit from and restart the KDC, the deleted
access level is no longer present.
Summary
This chapter provides instructions for creating user records and
entering basic information on the People tab. People are users of
the Keypad Display (KPDISPs) devices. Users are granted
privileges to the KPDISPs of your site by assigning access
levels.
Content
What is a user? • 9.2
Creating a user record • 9.3
KPDISP password • 9.3
Access levels • 9.3
Adding personal information • 9.6
Activating and deactivating users • 9.8
Activating a user • 9.8
Deactivating a user • 9.8
Filtering user information • 9.10
Letter tabs • 9.10
Filters • 9.10
Editing and deleting user records • 9.12
Editing user records • 9.12
Deleting a user record • 9.12
What is a user?
The People tab is where you create records and assigned access
levels for users of the KPDISPs. A user is any person to whom
you assign an access level that gives privileges to KPDISPs. The
user record is then downloaded to the KPDISPs of your system.
Each user can be assigned different levels of privileges. Access
levels are customized according to site specifications.
People tab
Name
The first fields in a user record are the user’s full name. The title
(Mr., Mrs., Ms, or Miss) is optional.
Status
All users of the KDC should have the status of Employee. Do
not use Visitor or Visitor Requiring Escort. Visitor or Visitor
Requiring Escort are used for access control and not security or
fire.
KPDISP password
To gain access to any KPDISP, a user record must contain an
access ID and a PIN number. The password to log on to a
KPDISP consists of seven digits. The password consists of the
last three digits of the access ID plus the four-digit PIN number.
Access levels
An access level defines access privileges for user groups.
Properties of an access level consist of the following:
The Access Level #1 list contains all the access levels you
created earlier, using the Access Level tab
Level name
User privileges are determined by assigning the appropriate
access levels.
Note: Access levels must be created before you can assign them.
Activation date
An activation date is required for each access level you assign.
The default is the current date, but if you need to delay activation
for any reason, you can select a future date and the system denies
access until that date.
Expiration date
In some cases an expiration date is required. An expiration date
is used to deactivate a user’s privileges at a site.
You can enter activation and expiration dates by selecting them
from the calendar tool that opens when you click the list
pull-down arrow. You can edit dates using this tool, or by typing
in the list box.
Tip: You can press the Tab 6. Type the Access ID.
key on the keyboard to 7. Type a four digit PIN number for the user.
move from field to field
within the People tab. 8. In Access Level #1, select an access level for the user.
9. Select an activation date.
10. If the user’s access level needs to have an expiration date,
clear the Does not expire check box and select an expiration
date.
11 Save the user record.
1. From the left pane, select the user for whom you want to
enter personal information.
2. Click the Personal tab.
3. Type the address.
4. Type the city.
5. Select the country.
6. Type the ZIP code.
7. Type the home and business phone numbers and extension.
8. Type the employee ID.
9. Type the emergency telephone number, extension, and
contact information.
10. Save the record.
An inactive user
To activate a user:
Tip: By using the
multi-select toolbar buttons 1. In the left pane, select the user you want to activate.
or the multi-select action
menu items, you can select 2. Click the Activate Card button.
multiple users for activating 3. Save the record.
or deactivating. All selected
users can be activated or The status of the user record changes from Inactive to Pending
deactivated at one time. Active indicating that the information is now ready to be
downloaded to the hardware of your system.
It is recommended that no more than 1000 users be activated and
downloaded at any one time.
Note: Data that is saved is not active until it is downloaded to the
KPDISPs. See Chapter 3: Basic operations for information about
downloading.
Deactivating a user
Any active user can be deactivated. A deactivated user does not
have any privileges. A user that is made inactive is removed
from your hardware (KPDISPs), but not from the database.
To deactivate a user:
Letter tabs
The simplest method is to use the letter tabs at the bottom of the
selection list. These tabs let you display only those records
beginning with the letter you select.
Filters
You can show specific users by applying various filters to the
list. To apply a filter, you select a field from the On list, then
specify a value for that field. All records matching the specified
value are displayed. The values entered are not case sensitive.
Filter Definition
Access Level Access Level filters show users that match the
specified level of access
Active? Active filters show users that match the
specified status (active, pending active, etc.)
Card ID Card ID filters show the user that matches the
specified card ID
Last Name Last Name filters show users that match the
last name specified.
Address Address filters show users that match the
specified address. The address information
must be typed exactly as it appears in the
database.
Filter Definition
To apply a filter:
1. At the top of the name list in the left pane, check the Filter
check box.
2. In the On list, select the desired filter.
3. In the field below, select or type the desired value.
Records that meet the filtered criteria are shown in the left pane.
Tip: Press Alt + F, D to 1. In the left pane, select the record you want to delete.
delete a user. 2. From the File menu click Delete or click the Delete button
on the toolbar.
3. Click Yes to delete the record.
Summary
This chapter provides detailed instructions on the advanced
features for users in the KDC.
Content
Assigning central monitoring station user IDs • 10.2
Modifying a CMS user ID • 10.3
Deleting a CMS user ID • 10.3
Importing users from an external database • 10.4
Start the database import utility • 10.4
Creating an import definition • 10.4
Assigning import fields • 10.7
Importing the data • 10.8
The People > System tab lets you assign CMS user ID numbers
to individual users
1. From the bottom left list, select the import definition you
want to use.
2. From the Unassigned External Fields list, drag each field
you want to import into the Crossed Field Name column.
Place it beside the CH Display Name (KDC field) in which
the data should be stored.
Note: The CH Display Name is where the imported data will
be stored in the KDC. Not all fields need to be dragged from
the Unassigned External Fields column to the Crossed Field
Name column. Only drag the fields you want to import into
the KDC.
Summary
This chapter describes the KDC reports, and shows how to create
and run reports. You will find that reports are a valuable tool for
providing information about your site.
Content
What is a report? • 11.2
The Reports tab • 11.2
Default reports • 11.3
Customizing a default report • 11.3
Creating a report • 11.5
Filtering reports • 11.7
Filtering conditions • 11.7
Setting the styles for a custom report • 11.11
Creating report headings • 11.11
Creating report groups • 11.12
Setting report fonts • 11.12
Setting report orientation • 11.13
Adding fields to a custom report • 11.14
Running a report • 11.16
Viewing and printing a report • 11.17
Deleting a previously requested report • 11.17
Editing and deleting a report • 11.19
Editing a report • 11.19
Deleting a report • 11.19
What is a report?
A report is information that is gathered about your KDC
database, then displayed in a preview format. Reports use data
from the KDC database. They can include information that is
stored about KPDISP users, access levels, or CMS user IDs.
Default reports
The KDC has several predefined or default reports. You can use
the default reports as they are, customize them, or create new
custom reports. The default reports are listed below.
Creating a report
If the default reports or customized default reports do not meet
your needs, an entirely new custom report can be created. All
reports fall into one of the following report types.
Filtering reports
Default reports, customized reports, and new reports can be
filtered, using the Filter tab. Filtering lets you narrow the
information provided in a report.
Not all report types have the Filter tab or all filter options. The
following table shows the reports you can filter, and the sub-tabs
available.
Filtering conditions
You can create complex selection and filtering criteria to further
refine your reports. The logical statements you create on the
Conditions tab limit the data included in the report.
Each statement is composed of brackets and conditions that limit
the data included in your report. You can use the brackets and
conditions to include or exclude data.
The filter begins with a bracket (the first bracket is provided for
you). The bracket reads Choose records where all of the
following apply. Each bracket can have one of four properties.
• All
• Any
• None
• Not all
Clicking the word all lets you select one of the four properties.
The bracket will apply to every condition added under it.
You can add a condition by clicking on the circle to the left of
the bracket. The condition is defined by clicking on the three
underlined parts of the condition.
You can continue to add as many conditions and brackets as
necessary.
5. Click the circle in front of the word Choose and select Add
Condition.
8. Click the blank line at the end of the condition, and select
from the list or type the specific item of the condition.
If a list is provided, it is displayed (as shown below). If no
list is provided, a text box appears in which you can type
your specific item.
This report includes all users with the status equal to Active.
Additional conditions and brackets can be added or deleted.
To group a report:
To select fonts:
Portrait
Landscape
To orient a report:
1. In the left pane, select the report you want to add fields to.
2. Click the Fields tab.
3. Select the field you want to include in your report and click
the large right arrow to add the field. Fields must be selected
and added one at a time.
4. If you want to sort a field, select the field from the right pane
and click the sorting arrow. Select Not sorted, Ascending, or
Descending.
Note: Not Sorted is the default setting. The first item sorted
takes priority over any items that follow.
5. For each of your report fields, click and drag the column
width to the desired width in the Set Report Column Widths
box.
Note: This is the width of the column as it appears in your
report. You may have to adjust this after running and
viewing your report. If you want a column to be wider or
narrower, adjust it and then run the report again.
6. Save the report record.
Running a report
You can run a report at any time by clicking the Run Now
button. The report runs as soon as you click Run Now. As the
report is running, its status can be viewed on the Status tab.
Once all the information for the report is gathered, the KDC
displays a preview of the report. From the preview window the
report can be reviewed, saved, and printed. All reports are stored
and can be viewed from the Reports Status tab.
To run a report:
1. In the left pane of the Report tab, select the report you want
to run.
2. Click the Run Now button.
The KDC displays the report for you.
View button 1. In the left pane, select the report you want to view.
2. Click the Status tab.
Delete button
3. Click the Finished Reports tab.
4. From the Finished Reports table, select the report you want
to view.
5. Click the View button.
6. From the Preview window click the Print button.
7. Click the Close button.
To edit a report:
Deleting a report
You can delete a Report at any time. It may be easier to edit the
report into a new report rather than delete it and start over.
To delete a report:
badging (in or out) A general term for the process whereby a cardholder presents
credentials to a reader in order to request access into or out of
a controlled area.
bypass Devices can be bypassed or disabled. When a device is
bypassed, the system ignores its alarm events, but continues to
monitor other events. When a device is disabled, the system
ignores all event messages from the device.
bypass time The bypass time is the number of seconds (0 to 255) that the
CRC suppresses audible annunciation and alarm notification.
card reader Any of the different types of credential reader supported by the
CRC. We use card reader as a general term to refer to
proximity, Wiegand pin, magnetic stripe, and smart card
readers, as well as readers equipped with a keypad.
Card Reader Controller CRC. A module that performs card access processing
module (CRC) decisions for a door, and grants or denies access to a
cardholder. Each CRC stores a complete database and is
capable of granting or denying access without external
communication.
cardholder A general term used to refer to any user of an access control
system issued with a valid access card (or other access
credentials). This also refers to users of a security system.
central monitoring station CMS. A station to which alarm and supervisory signaling
devices at the site transmit event messages. The central
monitoring station is staffed continuously to monitor, record,
and investigate alarm or trouble signals.
Central Processor module CPU. The primary processing module for an EST3 control
panel.
CMS See central monitoring station.
command list A predefined event that can be used to trigger execution of
SDU rules The CRC can be programmed to transmit these to
the control panel in response to certain access events.
Command lists are typically used to trigger transmission of
access event messages to a CMS, or to trigger activation of
remote gates, CCTV, or relay modules.
common door An access control application where a given door is used by
several different companies, as in the main entrance of an
office building.
company General term for a group of end-users who use the access
control or security system at the project site. Projects can
include one or more companies. Generally, the resources of
dedicated security and access control devices are controlled by
a single company. Several companies may share the resources
of common devices.
construction card Special access cards that will work with any CRC prior to a
database being downloaded.
construction mode Before a database is downloaded to a CRC it is in construction
mode. Building contractors can use specially coded
irregular entry Entry into a building outside the cardholders normal access
time.
KDC See Keypad Display Configuration
Keypad Display Configuration KDC. A version of the ACDB that is used to add users and
configure keypad display modules.
keypad Some card readers are equipped with a keypad to allow entry
of a PIN number in addition to the access card. We do not use
the term keypad to refer to the KPDISP Keypad Display
module.
Keypad Display module KPDISP. A control and display module used in security and life
safety applications. The KPDISP includes an LCD display, a
telephone-style keypad, a variable-tone sounder, and an
internal processor. It is most typically used to arm and disarm
security partitions.
KPDISP See Keypad Display module.
KPDISP password A password that allows cardholders access to the KPDISP. It
contains seven digits, the last three digits of the cardholder’s
access card and a four digit PIN number.
LED Light emitting diode.
lock Any type of door securing device. We use lock as a general
term to refer to both strikes and maglocks.
maglock Magnetic lock. A type of lock that secures the door (holds it
shut) when power is applied.
magnetic stripe card A type of access card having a data encoded magnetic tape or
stripe on one side.
manual open timer The manual open time is the number of seconds that the
auxiliary relay stays active, when an open command is received
from the fire alarm system, Fireworks, or from a local ADA
request to open device.
manual unlock timer The manual unlock timer is the number of seconds that the
door stays open before relocking, when an unlock command is
received from the fire alarm system, Fireworks, or a local
request to exit device.
MODCOM See Modem Communication module.
Modem Communication MODCOM. An communication module with modem and dialer
module capabilities. The MODCOM can be used to download
information from remote sites or to report events to a central
monitoring station. The MODCOMP can communicate to
telephone pagers using TAP protocol.
muster An access control application that lets users determine who has
exited a controlled area in the event of an emergency
evacuation.
muster report station A PC located in a secure area, outside the controlled area,
equipped with the ACDB program. Security staff use this PC to
create a muster report after an emergency evacuation.
muster station A CRC located outside the controlled area at which cardholders
badge out after an emergency evacuation.
NFPA 72 National Fire Alarm Code.
normal Devices can be in different states. States are classified as
normal or off-normal.
When a smoke detector is operating perfectly and there is no
smoke in the area, the device is said to be in a normal state.
If smoke is detected the device goes into an alarm state. If the
device is damaged, it goes into a trouble state. Both alarm and
trouble are off-normal states.
off-normal See normal.
open schedule A type of access control schedule, defined with the ACDB, that
specifies times when a door is unlocked. For example, access
to a building lobby may be determined with an open schedule.
When the open schedule is active, the lobby door is unlocked.
operators Users of the ACDB software. Operators are controlled by
privileges that allow them enter and edit certain areas of the
ACDB.
outbound port An outbound port specifies the computer and port you are
transmitting from.
output circuit The CRC includes common, NO, and NC outputs from a Form
C relay. These can be used to control auxiliary devices such as
fans and dampers, as well as devices that support handicap
functions.
partition A physical area that a security system protects with a group of
related devices. A site may consist of a single partition or of
multiple partitions. Partitions can be armed and disarmed
independently.
people People are users of the security system. This is analogous to
cardholders in the ACDB. People are also referred to as users.
PIN schedule A type of access control schedule that defines when a PIN must
be entered to verify the badging-in operation and grant access
proximity card A type of access card containing a microcircuit. When placed in
close proximity to a card reader, the card activates the reader's
circuitry and registers a unique code.
Relay open timer The relay open timer is the number of seconds that the auxiliary
relay timer stays active, when a user who is designated as
handicapped badges in.
Resource Profile RP. A file that defines the system security and access control
devices for the ACDB program.
Resource Profile Manager tool RPM. Part of the SDU that uses the project database to create
a separate resource profile for each company that uses the
access control system.
REX Request to exit button.
route Routes define how the ACDB connects to the hardware of your
data from the database, retrieve access history for reports, and
automate the running of reports.
timeline Used in a schedule to define the time when access is granted
and when access is denied.
two-person rule An access control application that ensures that no staff member
can be in the controlled area alone. A CRC operating under
two-person rule prevents the entrance of a single person into
the controlled area. When two people are present in the area,
one cannot exit without the other.
user By users we mean the end-users of a security or access control
system. In the KDC users are called people, while in the ACDB
users are called cardholders.
unlock schedule Define times when a door is unlocked to allow free access.
visitor and escort An access control application where a visitor is issued a
temporary access card. Access to specific doors is granted only
when an employee (escort) with a permanent access card
badges in with the visitor. This application may make use of
multiple card readers to handle different types of visitor and
employee access card.
Wiegand pin card A type of access card embedded with encoded ferromagnetic
wires.
zone A physical area that a fire alarm system protects with a group of
related devices. A site usually consists of two or more zones.
buttons commands
Toggle Selection of Eligible Tree Nodes • 2.24 Resync with Server • 2.21
toolbar • 2.22 Save • 2.20
Undo • 2.23 Select All Records • 2.21, 3.9
Bypass privilege • 8.10 Select Current Record • 2.21, 3.9
Set Access Level Privilege • 2.21
Toggle All Selections • 2.21
C Troubles Display • 2.22
canceling data entry mistakes • See Undo command Undo • 2.20
captions, startup screen • 3.2 communication
Card ID filter • 9.10 errors • See yellow X symbols
CardHolder Import dialog box • 10.9 routes • 4.10
cardholder re-initialization • 6.4 Company Information tab • 3.4
cardholder reports • 11.3, 11.5 company view icons • 4.3
categorizing specific data • See reports under filtering Company View tab • 4.2, 4.3, 7.10
caution, reduced security • 8.10 conducting a filtered query • See user information under
changing filtering
installer passwords • 2.5 configuring
multiple items simultaneously • 3.9 alternative routes • 7.9
operator information • 5.14 default routes • 7.8
operators • 5.10 hardware • See Hardware View tab
passwords • 5.11. See also Operator tab site information • See Company View tab
(Preferences for Operator ADMIN1 and system hardware • See new routes under
Options) assigning
checking operator status • See operators under system sites • See new routes under assigning
activating Confirmations tab • 3.4
City filter • 9.11 Contents, Index command • 2.22
CMS (Central Monitoring Station) user IDs • 10.2, 10.3 controlling access privileges • See Set Access Level
Collapse Branch button • 2.23 Privilege command
Collapse Branch command • 2.21 Copy button • 2.23
Collapse Tree button • 2.23 Copy command • 2.20
Collapse Tree command • 2.21 CPU (Central Processor Unit) • 4.8
collapsing access levels • 8.7. See also Collapse creating
Branch command; Collapse Tree command access levels • 8.6. See also Access Levels tab
column widths, report • 11.15 connection strings • 10.5
commands import definitions • 10.4
About • 2.22 new files • See New command
Access Levels • 2.21 new operator records • 5.3
Action Send Changes • 2.21 outbound ports • 7.6
Administration • 2.21 report groups • 11.12
Collapse Branch • 2.21 report headings • 11.11
Collapse Tree • 2.21 reports • 11.5
Contents, Index • 2.22 routes • 7.7. See also Hardware View tab
Copy • 2.20 tasks • 6.4
Cut • 2.20 user records • 9.3
Database • 2.22 customizing
Delete • 2.20 default reports • 11.3
Deselect All Records • 3.9 KDC features • See Administration tab;
Deselect All TreeView Nodes • 2.21 Preferences tab
Deselect Current Record • 2.21, 3.9 Cut button • 2.23
Deselect Current Record • 2.21 Cut command • 2.20
Discard All Changes • 2.20
Exit • 2.20 D
Expand Branch • 2.21
Expand Tree • 2.21 Daily AC Events task • 6.3
Import • 2.20 Daily Updates task • 6.3
Login • 2.21 Data Link Properties dialog box • 10.5, 10.6
New • 2.20 database
Options • 2.22 maintenance • 6.2, 6.4
Paste • 2.20 reports • See also running reports
People • 2.21 Database command • 2.22
Print • 2.20 Database Import Utility • 10.8
Print Preview • 2.20 Database Maintenance task • 6.3
Printer Setup • 2.20 date displays • See General tab (Preferences)
Redo • 2.20 Deactivate Operator button • 5.8
Reports • 2.21
Reset Access Level Privilege • 2.21
Resource Usage • 2.22
deactivating E
operators • 5.8
task schedules • 6.9 Edit menu • 2.20
user records • 9.8. See also expiration dates editing
defaults company information • 4.3
3-CPU • 7.4 databases without RP files • See sample RP files
activation date • 9.4 under importing
administrator operator ID • 5.2 operator records • 5.13
MODCOM route • 7.4 outbound ports • 7.12
operator ID • 2.6 reports • 11.19
operator privilege • 5.5 routes • 7.13
password • 5.4 tasks • 6.12
report • 11.3 user records • 9.12
route • 7.4, 7.9 ending KDC sessions • See exiting the KDC
sorting • 11.15 entering startup screen captions • 3.2
task • 6.3 Exit command • 2.20
defining data for import • See import definitions under Exit option • 2.3
creating exiting the KDC • 3.15
Delete button • 2.23 Expand Branch button • 2.23
Delete command • 2.20 Expand Branch command • 2.21
deleted state • 8.5 Expand Tree button • 2.23
deleting Expand Tree command • 2.21
access levels • 8.13 expanding access levels • 8.7. See also Expand Branch
actions by series • See Discard All Changes command; Expand Tree command
command expiration dates • 9.4
CMS accounts • 10.3 Extension field • See Information tab
companies • 2.18
operator records • 5.13 F
outbound ports • 7.12
previously requested reports • 11.17 Fields tab • 11.3, 11.14
reports • 11.19 File menu • 2.20
routes • 7.13 filtering
RP files • 2.17, 2.18 conditions • 11.7
sample RP files • 2.12 reports • 11.7
SDU project • 2.17 user information • 9.10
SDU projects • 2.11 finding
tasks • 6.12 current status • See Status bar
user records • 9.12 installer contact information • 2.8
denying operator access • See operators under fire alarm privileges, KPDISP • 1.5, 1.6, 4.9, 8.11
deactivating fonts, configurable report • 11.12
Deselect all records button • 2.23 frequencies, task • See scheduling tasks
Deselect All Records command • 2.21 functions, task • 6.2
Deselect All Tree View Nodes button • 2.24
Deselect All TreeView Nodes command • 2.21
Deselect current record button • 2.23 G
Deselect Current Record command • 2.21 General tab (Company Information) • 3.4
Destination DB Init task • 6.3 General tab (Preferences) • 3.4
determining operator logon status • See Status bar generating reports • See Reports tab
Diagnostic tab • 3.4 getting
dialog boxes more information from the status bar • 2.25
CardHolder Import • 10.9 online help • 2.3. See also Contents, Index
Data Link Properties • 10.5, 10.6 command
Import Resource Profile Manager (RPM) file • 2.7 Grant All button • 5.5
Import Source Properties • 10.5, 10.7 grouping similar report items • See report groups under
Modify Password • 5.11 creating
Preferences for Operator ADMIN1 and Options •
3.3, 5.14
Disable privilege, Fire Alarm • 8.11 H
disabling fire alarms • See fire alarm privileges, KPDISP
hardware
Disarm privilege • 8.10
initialization • 6.2, 6.4
Discard All Changes button • 2.23
reports • See running reports
Discard All Changes command • 2.20
view icons • 4.7
displaying current data • See Resync with Server
hardware configuration initialization • 6.4
command
Hardware View tab • 4.2, 4.7, 7.10
downloading information • 3.11
heading styles • 11.11
Help Contents button • 2.24
Help menu • 2.22
Help option • 2.3
I keyboard shortcuts
selecting records • 3.10
icons KPDISP (Keypad Display)
access level tree • 8.2 applications • 4.9
company view • 4.3 fire alarm privileges • 1.5, 1.6, 4.9, 8.11
hardware view • 4.7 functions • 1.5
identifying the KDC software version • See About option new route assignments • 7.10
Import command • 2.20 password • 9.3
import problems • 10.9 PINs (personal ID numbers) • 9.3
Import Resource Profile Manager (RPM) file dialog box security privileges • 1.5, 1.6, 4.9, 8.9
• 2.7 task assignments • 6.8
Import Source Properties dialog box • 10.5, 10.7
importing
new SDU projects • 2.15 L
real RP files into sample RP files • 2.10 landscape orientation • 11.13
RP files • 2.6 Language field • See Information tab
sample RP files • 2.9 Last Login and Last Logout display • 5.4
SDU project modifications • See modifications, Last Name filter • 9.10
SDU project left pane description • 2.25
updated RP files into existing companies • 2.14 letter tabs • 3.7, 9.10
user data • 10.8 Level Name field (access level groups) • 9.4
user records from external databases • 10.4 levels, access • 1.6
improving KDC performance • See setting up your Location field • See Information tab
system Log In option • 2.3
In Process tab • 6.10 logging on after RP file imports • 2.13
inactive state • 8.4 logging on as a new operator • 5.10
Information tab • 5.3 logging on as an installer • 2.4
initial installer passwords • 2.4 Login command • 2.21
initializing system hardware • 6.4
installer contact information • 2.8
interface overview • 2.19 M
main headings • 11.11
J maintenance, database • 6.4. See also properties for
DB maintenance tasks under setting
Job Title field • See Information tab Maximum Message Length field • 7.4
Maximum Retries field • 7.4
K Menu bar • 2.20
menus
KDC (Keypad Display Configuration) Action • 2.21
building blocks • 1.6 Edit • 2.20
description • 1.5 File • 2.20
features • 1.4 Help • 2.22
field assignments • 10.7 Reports • 2.22
interface overview • 2.19 Tools • 2.22
interface tabs • 2.24 View • 2.21
interface window • 2.19 middle pane description • 2.25
Login dialog box • 2.13, 5.2 minimum system requirements • 1.3
start screen • 2.2 MODCOM
keyboard shortcuts default routes • 7.4
collapsing trees and branches • 8.7 route assignments • 7.10
creating new access levels • 8.6 user ID translation reports • 11.3, 11.5
creating new operators • 5.4 modem routes • 7.3
creating new outbound ports • 7.6 modifications, SDU project • 2.14
creating new reports • 11.6 Modify Password dialog box • 5.11
creating new routes • 7.7 modifying
creating new tasks • 6.5 CMS user IDs • 10.3
deleting access levels • 8.13 default routes • 7.9
deleting operators • 5.13 Monthly AC Events task • 6.3
deleting reports • 11.19 moving
deleting tasks • 6.12 databases to new PCs • 3.14
expanding trees and branches • 8.7 text to and from the clipboard • See Edit menu
finding • 2.20 multiple
launching the Options dialog box • 2.5, 5.14 record selections • 3.9, 3.10
launching the RPM Import dialog box • 2.10 sites and RP files • 4.5
logging off • 5.10
saving information • 3.8
selecting multiple outbound ports • 7.12 N
selecting multiple routes • 7.13 Name field • 5.3
procedures procedures
changing passwords • 5.11, 5.12 setting properties for DB maintenance tasks • 6.7
collapsing access levels • 8.7 setting up your system • 1.7
configuring default routes • 7.8 starting external database imports • 10.4
creating access levels • 8.6 starting the KDC program • 2.2
creating connection strings • 10.6 viewing 3-SAC information • 4.8
creating import definitions • 10.5 viewing CPU information • 4.8
creating new operators • 5.4 viewing KPDISP summary information • 4.10
creating new reports • 11.5 viewing partition information • 4.6
creating new users • 9.4 viewing reports • 11.17
creating outbound ports • 7.6 viewing SDU information • 4.8
creating report headings • 11.12 viewing site information • 4.5
creating routes • 7.7 viewing task status • 6.11
creating tasks • 6.5 project sites • 4.4
customizing default reports • 11.4 prompts, save information (*) • 3.8
deactivating operators • 5.9 properties, access level • 8.2, 9.4
deactivating task schedules • 6.9 purging old data • See maintenance, database
deactivating user records • 9.9
deleting access levels • 8.13
deleting CMS user IDs • 10.3
Q
deleting companies • 2.18 queries, alphabetical • See user information under
deleting operator records • 5.13 filtering
deleting outbound ports • 7.12 Quick Defaults group • 5.5
deleting reports • 11.19
deleting routes • 7.13
deleting sample RP files • 2.12 R
deleting SDU project • 2.17 records, new operator • 5.3
deleting tasks • 6.12 Redo button • 2.23
deleting user records • 9.12 Redo command • 2.20
downloading changes • 3.11 Regular tab • 5.5
editing company information • 4.4 removing
editing outbound ports • 7.12 KPDISP privileges • 8.12
editing reports • 11.19 sample RP files • 2.12
editing routes • 7.13 repeating the last action • See Redo command
editing startup screen captions • 3.2 report
editing tasks • 6.12 customized default • 11.3
entering personal information • 9.7 database-assembled • See running reports
exiting the KDC • 3.15 default • 11.3
expanding access levels • 8.7 hardware-based • See running reports
filtering conditions for reports • 11.7 previously requested • 11.17
finding installer contact information • 2.8 reports
grouping reports • 11.12 adding fields to custom • 11.14
importing data • 10.9 defined • 11.2
importing new RP files into existing companies • filtering • 11.7
2.15 printing • See running reports
importing real RP files • 2.11 running • 11.16
importing RP files • 2.7 styling • 11.11
importing sample RP files • 2.10 viewing • See running reports
logging in as an installer • 2.4 Reports command • 2.21
logging on after RP file imports • 2.13 Reports menu • 2.22
manually starting tasks • 6.6 Reports tab • 2.24, 11.2
modifying CMS user IDs • 10.3 requirements, minimum system • 1.3
modifying default routes • 7.9 Reset Access Level Privilege button • 8.4
modifying SDU projects • 2.14 Reset Access Level Privilege command • 2.21
moving databases to new PCs • 3.14 Reset privilege, Fire Alarm • 8.11
orienting reports • 11.13 resetting
printing reports • 11.17 fire alarms • See fire alarm privileges, KPDISP
removing KPDISP privileges • 8.12 operator passwords • 5.12
removing sample RP files • 2.12 Resource Usage command • 2.22
resetting operator passwords • 5.12 resource usage reports • 11.3, 11.5
reviewing building information • 4.5 restoration settings • See General tab (Preferences)
reviewing company information • 4.4 restoring system hardware • See initialization under
running reports • 11.16 hardware
saving changes • 3.8 Resync with Server command • 2.21
scheduling tasks • 6.7 Re-synchronize with Server button • 2.24
selecting database tables for import • 10.7 retrieving information about logged-on operators • See
selecting report fonts • 11.13 Operator tab (Preferences for Operator ADMIN1 and
setting KPDISP privileges • 8.11 Options)
task U
Database Maintenance • 6.3
Destination DB Init • 6.3 Undo button • 2.23
functions • 6.2 Undo command • 2.20
Monthly AC Events • 6.3 unsaved information reminder • 3.8
Update • 6.3 Update task • 6.3
Weekly AC Events • 6.3 updates, system • 6.4
Task Event Log tab • 6.10 user IDs, CMS (Central Monitoring Station) • 10.2
tasks user records
activating scheduled • 6.9 activating • 9.8
creating • 6.4 creating • 9.3
deactivating scheduled • 6.9 deactivating • 9.8
default • 6.3 defined • 9.2
deleting • 6.12 deleting • 9.12
editing • 6.12 editing • 9.12
scheduling • 6.6 filtering • 9.10
starting manually • 6.6 sorting and searching • See user information
tracking • See task status under viewing under filtering
Tasks tab • 6.2
telephone communications • See modem routes V
time displays • See General tab (Preferences)
Timeout field • 7.4 verifying imported information • 2.8
tips View All button • 8.4
case sensitivity • 2.4 view buttons, access levels • 8.3. See also Action menu
creating new access levels • 8.6 View menu • 2.21
creating new operators • 5.4 View Only Denied button • 8.4
creating new outbound ports • 7.6 View Only Granted button • 8.4
creating new reports • 11.6 viewing
creating new routes • 7.7 3-SAC information • 4.8
creating new tasks • 6.5 CPU information • 4.8
default communication parameters • 7.7, 7.8 hardware connections • See Hardware View tab
deleting access levels • 8.13 import status • 10.9
deleting operators • 5.13 imported information • 2.7, 2.10
deleting outbound ports • 7.12 KDC software version information • See About
deleting reports • 11.19 command
deleting routes • 7.13 KDC troubles • See Troubles Display command
deleting tasks • 6.12 KPDISP information • 4.9
finding keyboard shortcuts • 2.20 MODCOM information • 4.8
information for scheduling tasks • 6.7 partition information • 4.6
launching the Options dialog box • 2.5, 5.12 project site information • 4.4
launching the RPM Import dialog box • 2.7, 2.10, reports • 11.17. See also Database command;
2.16 Resource Usage command; running reports
logging off • 5.10 SDU information • 4.8
multiple selection • 3.10 selection tables • 3.6
quickening field navigation • 9.5 site information • See Company View tab
save information prompts (*) • 3.8 system organization • See Company View tab
saving information • 3.8 task status • 6.10
selecting multiple outbound ports • 7.12
selecting multiple routes • 7.13
selecting multiple users • 9.8, 9.12 W
Title bar • 2.19 Weekly AC Events task • 6.3
Toggle All Selections command • 2.21
Toggle Selection of Eligible Tree Nodes button • 2.24
toolbar buttons • 2.22 Y
toolbar, Access Level • 8.3
yellow X symbols • 3.11
Tools menu • 2.22
Tracing checkbox • 7.4
tracking Z
modified records • See Title bar
progress on a task • See task status under viewing Zip/Postal Code filter • 9.11
Transactions Not Sent tab • 6.10
tree view • 2.25
Troubles Display command • 2.22