WSE • 3/21/97 16720 — 15 SE 6000 Security Management System
2) Assigning passback zones: The system shall be able to assign a passback zone and a
direction (in or out) to each card reader. A data log shall be generated, and passage
denied, when there is failure to alternate entry and exit. The system shall be able to
assign a zone number for an adjacent zone number; for example, the system can define a
single card reader entering zone 1 and exiting zone 2.
3) Passback forgiveness: Ability to forgive passback status shall be available via operator
overrides. Passback forgiveness shall be provided to a single cardholder or for all
cardholders. In the event of system failure, the system must automatically forgive all
passback status upon return to an operational state.
4) Concentric security areas: must also be definable by the system administrator.
e. Trace:
1) The system shall provide the capability to trace activity for specific cardholders at specific
doors.
2) The system shall issue a report whenever a cardholder marked for “Trace” is presented
at any door.
3) For a cardholder the system shall report activities throughout the system. The system
shall display trace activities with the alarm functions to alert the operator.
4) Whether access is being traced or not, the system shall store the last 20 (twenty) access
attempts, even after archiving of logs to tape.
f. [Two Man Rule/ Escort Required Access: (optional module)
1) This application shall provide the capability for the system to require an access request by
more than one person before access is granted into a controlled area.
2) Access shall not be granted unless two individuals with valid access privileges present
their keys within a predetermined period of time. The system shall be able to assign this
capability to any door.
3) Additional individuals may enter the area after the first two have entered. However, at no
time may fewer than two people remain in the room. Thus, if two people are in the room,
and one decides to exit, the system shall NOT grant access to exit unless the second
person also presents a card for exit access.]
3. Distributed Processing:
a. Distributed processing decision making is supported by all WSE Controllers. These
intelligent controllers make access decisions at the peripheral device, or door level,
independent of Host computer unless the card number is not in the memory of the
Controller, or has been modified as a Host controlled card via the Smart Failsafe feature. In
that case, Host shall check access privileges and, if access is permitted, shall command the
Controller to open the door within 1 second or less when interfaced with a Westinghouse
Security Electronics' front end security system.
b. Automated Download of Data to Distributed Controllers:
1) SE 6000 maintains a central database on all access control equipment. The database
includes cardholders, access levels, automatic events (such as auto unlock), etc.
2) Database sorts this information and sends it to the appropriate intelligent Controller,
allowing the local Controller to make all necessary decisions without the SE 6000 Host
support.
G. Alarm Monitoring Operation:
1. General:
a. The system shall provide full Alarm Monitoring and Acknowledgment functionality on both
Host computer and the Local Controller (LC) for ease in maintaining data integrity and in the
event that communications between Host and the LC is lost.
b. The system shall also provide automatic uploading of alarm acknowledgment data from the
LC to Host.
Kommentare zu diesen Handbüchern