Adding a New User Fields Category 1 In the User Field Management of Segment dialog box, click the Add Category Link at the bottom of the dialog box. Figure 71 Add Category Add Category 2 The Add and Remove System User Categories window opens.
Figure 72 Adding and Remove System User Categories 3 Click the Add button. “Category 1” appears in the text box. 4 Double-click on “Category 1” to rename it. 5 Click Finish. In the Configure Segment Users Fields dialog box, the new category is now available for selection from the Category drop-down list. Now you can select this category when defining a new User Field.
Removing User Fields and Categories You can also remove added User Fields and Categories from the system. The system will not allow you to do this, however, if the field or category is in use. Before you remove the field or category, ensure there are no records assigned to them, then perform the following steps. To remove User Fields from the system 1 In the User Fields Management dialog box, click the Select Fields button at the bottom of the dialog box.
Figure 73 User Groups Setup 2 The groups you create display on the left. The group’s ID, Name, Associations and Timezone appear on the right. 3 Select Add. A new Group (Group1) is created and displays on the left. 4 In the Group Name box, replace the name Group1 with a name for the new group (for example, Administrative). 5 Select OK. Note Once you have added users to the system via the Users Tab, you can assign them to these User Groups.
with users. 4 In the Associations category, click in the Users field and select the ellipsis button. The Users of Group dialog box opens. 5 All users in the segment not already assigned to the group are displayed under Segment Users list on the right. Figure 74 Note Users of Group Users will not appear in the Segment Users list until they have been added to the system.
Removing Users from User Group 1 In the User Groups Setup dialog box, select the group in which the user currently resides. 2 In the Associations category, click on the Users field, and select the ellipsis button. The Users of Group dialog box opens. 3 From the Users in Group list on the left, select the checkbox next to the user you wish to remove from the group. 4 Select Remove. The user name will be removed from Users in Group list on the left and moved back to the Segment Users list on the right.
Figure 75 Creating a Timezone User Group 3 Select Add. Group1 is created. 4 In the Name Category, Description, enter a description for the group, for example: Housekeeping Timezone. 5 In the Group Name, replace Group1 with the name of your new user group, for example, Residential. 6 Under Timezone, change the Is Timezone Group default setting from False to True. Select Update to continue creating groups. 7 Select OK to save the new Timezone group.
Credential Settings Keypad credentials, magnetic card settings, and proximity card settings are all set in this category. Detailed steps are presented in the following sections. Keypad Credential Length If your access system will have or currently has cards encoded with keypad credentials, you may set the number of digits required here. Note Keypad credential length must be set before you add users to the system. Perform the following steps to set the Keypad Credential Length.
Figure 77 Magnetic Stripe Credential Configurations If you must make changes to the default settings, click Add to create a new Magnetic Stripe card configuration, and give a name to your configuration in the Configuration name field.
Credential Settings Wi-Q AMS can be configured to accept coding from existing Track 1(210 BPI), Track 2 (75 BPI) or Track 3 (210 BPI) cards as long as the code does not exceed the maximum number of characters for that track and/or controller. Magnetic cards are configured as Track 2 by default.
Character codes and counts The software recognizes data on a magnetic card stripe using ANSI standard codes formatted to either a field separator or character count. Following is a brief description of each type. Field Separator — Field Separator (FS) character, generally represented as an equal sign (=) to separate two independent data fields. A card using this method might have the owner’s individual ID encoded at the beginning of the stripe followed by the FS character then the global segment ID.
Character Count — You can set up a character count from the beginning of each ID. For example, the Segment ID could start at the beginning of the data stripe, digit count of 1. If the Segment ID has eight digits, the User ID would be set to start at digit count of 9. This method requires all data groups with exception of the last one, to have a fixed number of digits. Following is an example of encoded data using character counts on Track 2.
Expiration Date Settings Perform the following steps to define a card expiration date. 1 In the Magnetic Stripe Credential Configurations window, under the Expiration Date Settings category, click in the Expiration Date Position Type field. 2 Select either Character or Field from the drop-down list. The Expiration Date Format, Position and Valid list boxes activate. 3 In the field next to Expiration Date Format, select the date format you need from the drop down list (MMDDYY, etc.).
Issue Number Settings You can issue a replacement card to a user in lieu of issuing a new User ID. The Card Issue ID consists of one or two digits from 0 through 99. After using the card with an incremented (higher number) Card Issue ID in a reader, that lock will no longer accept cards with the same User ID that have a lower Card Issue ID. Perform the following steps to define an issue number position. 1 In the Issue Number Settings category, click in the Issue Number Position Type field.
Proximity Credential Configurations If you are using proximity cards in your system, you can add card configurations by clicking on the Proximity Credential Configurations field and selecting the ellipsis button at the far right. Figure 80 shows the Proximity Credential Configurations window. Figure 80 Proximity Credential Configurations To add a card configuration, perform the following steps. 1 Click Add. Give your new configuration a name in the Configuration Name field.
ID Settings. 4 Under the User ID Settings category, change the User ID Length to the number of bits used for User IDs on your card. Set the User ID Position. 5 When finished, click OK. Daylight Saving Settings You can set Wi-Q AMS to automatically respond to Daylight Saving Time settings. When you select North American as the Daylight Saving Type, the system defaults to standard Daylight Saving Time settings.
Figure 81 I/O References Setup Here, you define an event and type for the reference. The system creates an I/O reference point in the left column of the dialog box and assigns it a reference ID number. 2 Click Add. 3 Under Description, replace the default description “Reference1’ with a description that will have meaning for your segment, such as Alarm Annunciator. 4 Under Name, replace the default name “Reference1” with a name that will have meaning for your segment, such as Parking Garage A Alarm.
Figure 82 I/O Events Setup From here you can create an event, check the device’s current state of operation, define an access level, associate it with a reader in the system, define a trigger state (high or low), and define the type of event to be triggered. Note: The system recognizes the WAC as any other “reader” in the system. It will appear in the referenced dialog boxes as a reader; however, you will recognize it by its MAC address. 6 Click the Add button.
Figure 83 Associating an I/O event with a Reader 11 Click OK to save the association and return to the Setup dialog. 12 In the Reader Access level field, select either Unlock or Lockout from the dropdown list. 13 In the Reference Trigger State field, select either Active High or Active Low from the drop-down list (this reference will act as a toggle from one state to the other). 14 Under Type, select the event type from the drop-down list.
Misc This category contains three fields (Contact 1, Contact 2, and Reference) that you can use to store any miscellaneous information you that will be helpful to you and your system. For example, you may decide to enter the phone number or email address for Stanley Technical Support in case you experience technical difficulties. PIN Settings If your system will require user PINs, you may set the PIN length here. Perform the following steps.
Adding Users to the Segment The system is now ready for you to add users. Follow the steps in this section the first time you enter users, and each time you add a new user to the system. To get started, navigate to the Users tab within the Configurator module. Before You Begin Before you begin adding users to the system for the first time, be prepared to address the following items: Note If... Then...
Users Tab Overview Figure 85 Users Tab In the Users Tab, all users currently in the system display in the list on the left. If you have a large number of users, you can use the alphabet buttons on the far left to quickly sort through the list. Users Categories display on the right. By default, these categories display as shown; however you can click the A-Z sort button to display categories alphabetically.
The following sections describe each category in the Users Tab, and present steps for adding and configuring users in the system. ID — When you add a user, the system automatically assigns them a unique ID and displays the number in the User ID field. Name — Provides entry fields for Users’ first and last name and middle initial. Adding a User Name 1 In the Users Tab, select the Add User button. In the ID category, the system will display a new unique User ID.
3 Select the reader(s) from Readers in Segment. 4 Select Add <<. The selected readers are moved from the Readers in Segment list to the Readers Associated with User list on the left. You can associate a user with any number of readers. Figure 87 Selecting a reader to associate with a user 5 Select OK to save your settings and return to the Users Tab. User Groups If User Groups have been created for your segment, these will already be associated with readers.
Perform the following steps to add a user to a User Group. To add a user to a User Group 1 When adding or editing a User, in the Associations Category, click in the User Groups field and click the ellipsis button. The User Groups of User dialog box opens. Figure 88 User Groups of User 2 Select the group(s) to associate with this user and click the Add << button. The groups are added to the User of Groups list. 3 Select OK to save your selections and return to the Users Tab.
will register the credential. Keypad Type — The default credential type in AMS is Keypad. When you add a user to the system, the software assigns them a unique keypad credential number, then automatically registers it with the system. If your segment uses only keypads, once you add the new user name, you can skip to Adding PINs and Expirations Dates.
2 Select the type of credential the reader will use, for example, Keypad. The credential options in the categories on the right will change, depending on the type selected. Passage Mode Authority — User credential has the authority to activate passage mode with 2 entries. 1st Card Unlock Authority — User credential has the authority to leave the door unlocked when in an ‘unlock with ID’ access mode. 3 Under the credential category, click the Number field and click the ellipsis button.
tials Deactivation Date field. If the credential cannot be de-activated, select False from the drop-down list. The default deactivation date is 26 years to ensure a user’s credential is not inadvertently deactivated. Registering the Credential When you click on the Number field below the Credential category and select the ellipsis button, the Specify the Credential Number dialog box opens.
3 Enter a Credential Number manually (must be less than 16 characters, zeros will be appended) or select a scan device. Using a scanning device to register a credential You can use a scanning device connected to your computer to register a credential. 1 Select Card Reader. When you are ready to scan the card, select the Scan button. You will have 30 seconds to scan the card. Figure 92 Scan Credentials 2 When recognized, the number will display in the Credential Number text box.
Note You may need to expand the drop-down list to view all available readers. Use the highlighted area in the lower right corner. Registering a Prox card credential In the Proximity Card category, review the Prox Card Type. If the default entry is not the one you will use, select the field and use the down-arrow to select the correct type from the list. To register a Prox Card Credential 1 Select Prox Card from the list on the left. Click the ellipsis in the Number field, under the Credential category.
2 Select Finish and return to the Credential Setup dialog box. Serial Card Reader If you have a Serial Card Reader connected to your computer, select Serial Card Reader and then select the appropriate com port from the drop-down list. 1 When you are ready to scan the card, select the Scan button. You will have 30 seconds to scan the card. When recognized, the number will display in the Credential Number text box. 2 Select Finish and return to the Credential Setup dialog box.
scanning device. PIN You can add a level of security by requiring PIN numbers in addition to credentials for all users, or for specific Timezone Intervals. The default displays the PIN number as asterisks in the fields; however you can choose to show the actual PIN numbers. To add a PIN Number for a User 1 Under Credential Settings, click the ellipsis button in the field next to PIN. The Set Personal Identification Number dialog box opens.
user. To modify User Operate Time In the Reader Control category, click the ellipsis button next to the User Operate Time and select the amount of time you wish to leave the reader in the unlocked position. To modify User Shunt Time In the Reader Control category, click the ellipsis button next to User Shunt Time and select the amount of time you wish to allow for passage before an alarm will be triggered.
To assign User Type 1 Under the User Tab, in the Settings category, select the field next to User Type. 2 Select a User Type from the drop-down list. Portal and Reader Control and Messaging Wi-Q AMS provides a number of features to reset and restore normal operations, override locks and access levels, and temporarily remove reader association with a Portal. These right-click functions send real-time instant messages to the hardware from within the software.
Figure 96 Note Right-click Portal messaging options Momentary unlocks and overrides must be recognized and executed by the Portal within five minutes of the command or they become obsolete. This feature ensures that commands executed during period when the hardware cannot respond are not executed when the hardware is back online. Reader Controls You can delete, reset and restore a reader to normal operation without going to the physical location of the reader.
become obsolete after five minutes. Figure 97 Right-click reader messaging options Momentary Unlock — A user with appropriate permissions can override the standard Timezone conditions to temporarily unlock the door controlled by a reader. The reader goes through a normal unlock-lock cycle where the default shunt and operate times apply. As soon as the command is executed, the standard Timezone conditions are restored.
Reset and Deep Reset — These options allow you to perform a reset and a deep reset on a reader from within the software. The function is the same as performing a manual reset or deep reset at the reader hardware. Remove Association with Portal — This command is useful when the reader has associated with a different Portal or is being removed from the segment. When you remove the reader’s association with the assigned Portal, it will search for another Portal and resume communication.
Note Readers can be assigned to only one Timezone. To create a Timezone Interval Collection 1 Select the Interval Collections Tab under the Timezones Tab. The Interval Collection window opens. 2 Click the Add button to create a new Timezone Interval Collection. 3 Click the New button to create a new interval. Figure 98 Interval Collection Click New to create a new interval. Click Add to create an Interval Collection. 4 The Interval Configuration window opens.
5 Enter a brief name for the Interval. 6 Select the Start and End Time of the Interval. 7 Click the Recurrence checkbox. Figure 99 Interval Configuration Name the Interval. Tip: usually good practice to name Intervals by time ranges. Click Recurrence if the interval repeats. 8 Select the Recurrence Pattern of the Interval. 9 Select the Range of Recurrence for the Interval. 10 Click Finish to save your new Interval. This Interval is now listed as one of the intervals for the Interval Collection.
Timezone Interval Template Feature At the top of the Interval Configuration window, there is a “Template” checkbox. Selecting this box will allow the timezone interval you configure to be used as a template for other intervals. For example, if you create a “Lunchtime” interval collection between 12pm and 1pm, and you select the “Template” checkbox (Figure 100), you can add that interval to an existing collection.
Figure 101 Add Interval from Templates To create a Timezone Reader Control 1 Select the Reader Control Tab under the Timezones Tab. The Reader Control Window opens. 2 Click Add to create a new Reader Control. 3 Enter a brief name for the Reader Control. 4 Select the default Access Level that will be operate for the Reader Control. This access level can be overridden for specific Interval Collections. 5 Select the Interval Collections when the Reader Control will operate.
Figure 102 Reader Control Name the Reader Control. Select what access level is required for this Reader Control. Select the Interval Collections when the Reader Control will operate. Click Add to create a new Reader Control. Timezone User Group Collections You can create up to 32 Timezone User Groups to further define access levels for the Master Timezone. You can restrict access of a certain group of employees to a specific time period.
To create the Timezone User Group Collection 1 Select the User Group Collection Tab under the Timezones Tab. The User Group Collection window opens. 2 Click Add to create a new User Group Collection. 3 Enter a brief name for the User Group Collection. 4 Select the User Groups that will be a part of the User Group Collection. You must have set up User Group for the selections to be available. 5 Select the Interval Collections when the User Group Collection will operate.
6 Using and Managing the System Wi-Q AMS and Omnilock provides powerful tools to manage your system: Configurator, Transactions, Statistics Monitor and Reports. If you are the Program Administrator responsible for setting up communications between the software and system Portals and Controllers; you will spend most of your time using Configurator. If you are in personnel or security, you may be the person who adds users to the system and gives them access privileges and IDs.
Wi-Q AMS and Omnilock Configurator The following sections describe the essential functions you can perform using Configurator. Launching Wi-Q AMS Configurator When the software is loaded onto your computer, it places a shortcut to AMS on your desktop. 1 Double-click the Configurator icon to start the application. The splash screen appears briefly, then the Login dialog box opens.
To Login to the Wi-Q AMS Configurator: 1 Enter your case-sensitive Login Name and Password. 2 Select Login. Configurator opens at the Segment tab. 3 If the System Administrator has created only one segment, you are ready to begin. If more than one segment has been created, select the segment from the drop-down list. Any elements you access in Configurator will be directed to that segment.
To Manage Applications Users: 1 From the Configurator main screen, select File>Manage Application Users. The AMS Users dialog box opens. Figure 105 AMS Users From here you can add or remove an AMS User, associate them with applications and specific facilities, and configure their lock control privileges, password change interval and assign a User Type. You can select whether require authentication for reader control or require dual authority for this user.
will have access to and supply contact information as needed. 7 Under the Configuration category, in the Allow Lock Control field, select either True or False from the drop-down list. 8 In the Password Change Interval field, select a change interval from the dropdown list. 9 In the User Type field, select a User Type from the drop-down list. (User Types are defined in the following paragraphs.
Linking AMS Users’ Windows Accounts to Configurator You can change the Configurator login settings so that your Windows account is linked to Configurator. This way, when you are logged into your Windows account, you won’t need a login ID or password when signing in to Configurator. To link your Windows account to Configurator, perform the following steps. 1 From the Configurator File menu, select Manage Directories. Figure 106 Manage Directories 2 The Configure Directories dialog box opens.
Figure 107 Configure Directories 3 The Select a Directory Type window opens. From the Directory Types dropdown list, choose Microsoft Windows Workstation. Then, click Finish.
the default name. In the Host Name field, under the General category, type in the computer name of the host. Then, click Finish.
5 From the Configurator File menu, select Manage Application Users. Figure 110 Manage Application Users 6 The AMS Users dialog box opens. Click in the Directories field, under the Associations column, and select the ellipsis button.
7 The Select User Directories window opens. Select the directory you created previously. Figure 112 Select User Directories 8 This will open the Select User Directory Account dialog box. Select Search, and a list of users will be generated below. Select the desired Windows user and then click Finish.
Figure 113 Select User Directory Account 9 Back in the Select User Directories window, the directory will now have a checkmark. Click Finish. As long as you are logged into Windows using the account you linked to in the previous procedure, you will not be prompted to input a login ID and password the next time you log into Configurator.
Configurator Overview The following sections provide a brief overview of the Configurator module’s Display and Tab options. Display Options All tasks in Wi-Q AMS and Omnilock start from the Configurator, which has six tabs: Segment, Portals, Readers, Timezones, Users, and Firmware. AMS operates in the Windows environment using its standard Windows conventions. You can use Configurator full screen or resize the window using the min/max buttons in the top right corner of the window.
betically. This is useful when displaying the Configurator in full-screen view. A number of global operations are also available from the program File menu. Segment Tab Most Segment set up tasks are performed in the Segment Tab, Figure 114. Here, the Program Administrator will create User Groups and configure the software to work with the type of segment access cards or keypad credentials you will use.
Portals and Readers Tabs The Portals and Readers tabs displays the Segment Tree, which is a visual representation of all Portal Gateways, Controllers, and I/O devices connected to the software. Once the devices are organized in the Segment Tree, the various paths to associate Controllers and Portals are available when you add new users to the system.
Timezones Tab The software automatically assigns all Controllers to a Master Timezone. Your Program Administrator can create any number of Timezone Intervals Collections and Timezone User Group Collections to modify user access within the Master Timezone. The Timezones tab displays the default Master Timezone, a calendar that operates similar to Microsoft Outlook, and any Timezone User Groups that have been created.
Users Tab If you have been assigned responsibility to add or maintain general cardholder users of the system, your tasks will be performed in the Users Tab. All users currently in the system are displayed in the column at the left. To display a User profile, simply select their name from the list. Figure 118 Users Tab More information about adding users to the system is presented in Chapter 5, “Configure AMS Software (Task 11)” on page 96.
System Overrides Manager Override at Keypad Controller When an AMS User is assigned the Manager Type, that user can change the current access level at a Controller with a keypad. Once their credential has been presented to a Controller and it has cycled, the following keys can be used to change the Controller’s access level: Note 160 MC refers to Manager Credential. Item WDC WAC Omnilock Function Manager Code MC# MC MC Momentary Unlock.
Programmer Override at Keypad Reader When an AMS User is assigned a Programmer Type, that user can present their credential and perform the following. Note PC refers to Programmer Credential. WAC Omnilock Function Programmer PC# Code PC PC Momentary Unlock. Soft Reset PC# + 1# PC + 1111 PC + 1 Soft resets device. Motor Reset PC# + 2# PC + 2222 PC + 2 Resets the motor drive. Comm. Processor Reset PC# + 7# PC + 7777 PC + 7 Resets the communication processor.
Segment Item Upgrades As you continue to add users and readers to your system it may become necessary to expand your Portal and reader capacities. This is performed via the File menu in Configurator. When you near maximum capacity in one or all of the system segment items, it’s time to use one of the upgrade licenses you purchased with your system, or call Stanley Security Solutions for additional Upgrades.
Figure 119 Upgrading your system capacity AMS Upgrades With the Wi-Q AMS Upgrades radio button selected on the left, the property sheet displays the current reader capacity for the segment and how many of those readers are currently in use. Wi-Q AMS now offers free upgrades. All capacities can be set to unlimited without a new interlock code.
Select the upgrade all link if additional user capacity is needed. Select force all readers to max capacity and click finish. Portal Licenses in Use — With the Portal Upgrades radio button selected on the left, the property sheet displays the number of Licensed Upgrades in each reader capacity value, and how many of those Licensed Upgrades are currently in use.
Select the upgrade all link if additional reader capacity is needed. Select force all portals to max capacity and click finish.
System Administrator System Administrator is an application accessed inside Configurator or from the Windows Start menu. With System Administrator, you can archive and restore Portal statistics, reader statistics, and reader transactions. From here you can also import data from an existing database or comma-delimited file. You must be an AMS User with Administrator privileges to use this feature. It is a good idea to archive records on a regular basis.
Using System Administrator Figure 120 System Administrator From here you can archive and restore statistics in the AMS database, import data to AMS from the OFM Database, or import data from standard comma-delimited files such as .txt and .csv. Archiving Statistics in the AMS Database It is important to maintain your database in optimum condition. On the basis of the statistics volume in your segment, you should establish a protocol to regularly archive data that are not likely to be used again.
statistics to archive; for example, all statistics, only those statistics greater than a specific ID, or specify a range of statistics older than a specific date. To Archive Statistics 1 In the System Administrator application, select the segment for which you wish to archive statistics. 2 In the main window, under Archive and Restore, select a Statistics type, such as Portal Statistics.
4 In the Statistics Selection box, select one of the following: Archive All Statistics — All statistics in the database will be archived. Archive Statistics with IDs less than — Define an ID number. Only statistics with IDs less than the defined number will be affected. Archive Statistics older than — Select a date. Only data older than the date selected will be archived.
Importing Data from a Legacy OFM Database You can import an entirely new segment into the software from a legacy OFM database, or you can import all or some elements of data into an existing segment and overwrite any data with the latest data in the OFM. When you import an entire segment from an OFM database, AMS creates a segment with the segment name of the old database. To Import Data to AMS 1 From the Applications menu on the Configurator menu bar, select System Administrator.
3 In the Segment Selection box, select one of the two options: Import OFM Segment — This option imports a new segment in its entirety and automatically gives it the name of the existing Segment in the OFM Database. Use Segment — This option activates the drop-down list. Select the Segment into which you wish to import data. It will import any new data and update any existing records with the same ID based on the import type.
or other text-based program and save it as a .txt or .csv format. Prepare the Wi-Q AMS Import Utility to accept the file. Import the data. Send the Data to the database. In the Import Utility, you can view the data as it imports into the window and make any corrections to the file or column headers until you are satisfied with the import before you actually send it to the database. Detailed instructions are presented in the next few sections.
4 If you wish to import additional data into user fields associated with the segment, click Show Additional Fields to display the Field Chooser and double-click or drag to add them to the header. 5 Enter the appropriate Field Delimiter for the import file, the default is a comma. 6 If you have field headings in the first line of your data file, click the Field Heading in First Line check box. To import the data 1 Once all column headers are in the order you wish, click Import Data.
4 Review the data import. Scroll the window to ensure the data has imported in the appropriate column headers. If not, you can rearrange the column headers and import the file again. You can do this as many times as you need to ensure you will get a good import. 5 Once you are satisfied that the data has imported as intended, click Send to Database. The data will now appear in the appropriate fields throughout AMS.
4 The program opens at the default database location. Figure 125 Default database display in SQL Server 5 Double-click on databases, then right-click on the folder and select tasks>Backup. The backup database dialog box opens.
Figure 126 Backup Database 6 Define a Backup Type (full or differential) and add a description of the backup (optional). 7 The default destination displays. You can change the destination, if needed, for example if you wish to move the database to a new location on a different computer. 8 Click OK. The backup progresses and the system reports when the backup is complete. To Restore the database 1 Exit AMS. 2 From the Windows Start menu, select Programs>Microsoft SQL Server Management Studio Express.
4 The program opens at the database location. 5 Double-click on databases, then right-click on the folder and select tasks>Restore>database. The restore database dialog box opens. Figure 127 Restore Database 6 The location defaults to the original location. You can specify a different location, for example, if you wish to more the database to a different computer. 7 Specify the source from which to restore and select a backup set to restore.
Firmware Updates Firmware updates will be sent to you periodically by Stanley Technical Support. You can upload these firmware files to your database by using the System Administrator Application, and then you can send the updates to your hardware from the Configurator’s Firmware Tab. This section will guide you through the firmware update process.
Figure 128 Manage Firmware Files 2 Click on the ellipsis button next to the File to upload field. Browse to your Portal gateway or Controller file(s). Once you’ve located your file, click Open. 3 Provide a unique name and description of the firmware file. If you are uploading a Controller firmware file, it is recommended that you build either “Boot” or “Application” into your description name, depending on the file type. 4 Click Upload.
Firmware Reprogram Perform the following steps to send firmware updates to your hardware. 1 If not already open, launch the Configurator application and click on the Firmware tab. Figure 129 Configurator Firmware Tab 2 Choose your device type from the dropdown menu, and choose the appropriate firmware file. Note If you are reprogramming both the Bootloader and Application files on a Controller, you must update the Bootloader file first. 3 Check the boxes next to the devices that need updating.
Transactions Monitor Each time a user accesses the system, the software collects a transaction from the Controller/Portal Gateway network. Once the system is signed on and users begin accessing the system, transactions begin including any alarm activity. You can monitor all this activity in Transactions. Access Transactions via the Windows Start menu. To Launch Transactions 1 Select Start>All Programs> Stanley Security Solutions >Stanley Wi-Q AMS> Transactions. 2 Enter your Login and Password.
Transactions Tab You can view all transactions as they occur in the Transactions Tab. Alarm transactions such as Forced Entry or Anti Tamper display in red. Access requests “attempted but not allowed” displays in yellow. Successful access requests display in black on a white background. Figure 130 Transactions System transactions such as changing an access level or clearing an alarm display in blue on a white background. To review and respond to alarms, select the Alarms Tab.
Reader and Portal Controls You can access reader and Portal controls from inside the Transactions tab. From here you can override access levels of readers to unlock or lockout one or a whole related group of readers. To use this feature, simply right click on the Portal or reader and select an option.
Alarms Tab When an alarm is triggered, such as a door is blocked open or forced entry, the system creates an alarm record. When you select the Alarms tab, unanswered alarms display in red and activate an alarm sound .wav file on your computers sound system. When you “silence” an alarm in Transactions, you are simply telling the system that you have recognized the alarm condition. The alarm sound .wav file will stop on your computer system for that alarm and the display color changes from red to yellow.
Create an Alarm Response Protocol Remember, when you “Silence” an alarm in Wi-Q AMS Transactions, you are only silencing a .wav file; you are not resolving the problem. It is important to establish Alarm Response protocols within your segment and follow up with action. See “Responding to Alarms” on page 188. Figure 133 Alarms Tab Transaction Types The database records transactions by category. Under normal operating conditions, the most common transaction types will be Entry and Request to Exit.
By default, Transactions displays all transactions in the order they occur. If you are monitoring all transactions, you may want to simply watch them as they occur. However, in large systems, your effort may best be served by limiting transactions to only those that have occurred in the previous ten minutes, or previous hour. The software gives you a number of options from All to year to date. To set the display timespan In the Transactions Tab, select the Segment you wish to monitor.
Sort by Column Header You can sort Transactions by column header in ascending or descending order. This is helpful, depending on what you are looking for. If you simply want to watch transactions in the order they occur, the default setting—sorted by ID, descending—will display the most recent transaction on the top line of the list. However, if you have an interest in viewing all the activity of a particular user, you can sort alphabetically by User credential.
reader name, etc.), click on Define Additional Filter at the top of the Transactions module. The Transaction Filter dialog box will open. Figure 136 Transaction Filters A list of fields is located on the left side of the dialog box. Clicking on a field will bring up checkbox or dropdown options specific to the selected field. In Figure 141, the Access Level field is selected. Here, you can check multiple options. Once you’ve selected your options, click Apply.
When an alarm occurs, the system immediately displays it in red in the Transactions Tab. The alarm will be categorized as either an Anti-Tamper or a Forced Entry type. At this point, you will take action according to your segment’s security plan. In a small segment, you may simply dispatch a person to physically investigate the source of the alarm. In larger facilities with I/O devices in the system, the alarm may trigger a video recorder, a lighting plan, or other I/O device.
Figure 137 Log Entry Recorded 8 Select Close. In the Alarms Tab, the alarm line changes from red to yellow and the alarm sound stops. 9 You can continue to add comments in the alarm’s log until the condition is resolved.
Statistics Monitor The Statistics Monitor is a powerful tool that displays a real-time, color coded overview of system performance. When you set up your new system, and want to monitor ongoing system performance, you will use the Statistics Monitor. This tool appears similar to the Configurator, displaying the Segment Tree for the segment you select on the left of the screen, and the hardware categories on the right. To check the performance of the entire system, select the segment at the top of the tree.
Figure 139 Display reader detail Here, you can see the reader’s MAC Address, ID, Reader Name, and the Portal associated with it. You can also view the reader’s power performance. Automatic Updates The Updating button can be used to pause automatic updating to view a snap shot of data. This is especially useful when viewing the top level, where the values may be changing rapidly.
Power To view individual reader performance: 1 Under the Power Category, place the cursor in the field next to Supply Voltage, and select the ellipsis button. 2 The Reader Statistics chart opens at the Voltage Tab. From here you can also check the Signal, Packet Ratio, and User Capacity. Voltage Tab The Voltage Tab displays battery and external power supply to ensure battery integrity and longevity. If you see a downward trend, you should consider replacing the battery for preventive maintenance.
Signal Tab The Signal Tab displays the signal strength at the reader and at the reader’s Portal.
Packet Ratio Tab The Packet Transfer Ratio at Reader is the number of valid packets received versus the total number of packets sent to the reader. The Packet Transfer Ratio at Portal is the number of valid packets sent from the reader versus the total number of packets received at the Portal. If the Packet Ratio is high (near 1, or 100%) your readers are performing well, even though signal strength might be low.
Figure 143 196 Reader Statistics User Capacity Tab
Portal Statistics Portal Statistics display at the bottom of the Statistics Monitor. Select the top level in the Segment Tree to display all Portals in the system. See Figure 143. Clicking on a Portal within the Segment Tree in the Statistics Monitor will display the Portal’s properties on the right. Figure 144 Statistics Monitor Portal Properties The Portal ID, Name, Specifications such as Firmware Version, Model Number, PAN ID, and Serial Number display on the right.
Portal Diagnostics You can check the reader counts associated with a Portal over time for a detailed look at Portal capacity. This is useful to determine if some readers are operating intermittently or dropping out of range at intervals. To review associated readers at Portals 1 In the Portal detail display, Statistics Category, place the cursor in the Maximum number of Readers field and select the ellipsis button. The Portal statistics chart opens for the Portal selected.
In the Configuration/Test category, the Statistic Update Interval is visible. You can modify this value in the Configurator application’s Portals Tab. Reports You can view a wide variety of reports based on data collected in Configurator and Transactions. You can access Reports from the Applications menu at the top of the Configurator Main Screen or launch it as a separate application. To Launch Wi-Q AMS Reports 1 Select Start>All Programs> Stanley Security Solutions >Stanley Wi-Q AMS> Wi-Q Reports.
Reader Alarms — Generates a report by reader for all alarms in all timespans, or specify which readers, timespans, or Begin and End dates. Transactions — Generate a report for all transactions at all readers for all users during all timespans, or specify which transactions you wish to list. Creating Reports The first step in creating reports in the software is to configure report settings.