GE v6 Intrusion Overview, About Intrusion Options, Arm/Disarm Intrusion Point Digital Input Form

Models: v6

1 269
Download 269 pages 54.7 Kb
Page 188
Image 188

Intrusion Overview

Reference Topics:

Arm/Disarm an Intrusion Zone

Intrusion Zone Form

Activity Monitor Form

About Intrusion Options

Intrusion functionality provides the ability to define local intrusion zones per micro that consist of:

Readers

Alarms

Arm/disarm input point Intrusion DI

Arm/disarm output point DO

The defined intrusion zones have the ability to be armed and disarmed through access control by using a card and keypad reader, DI, or manual control.

The intended application is suited for arming and disarming intrusion zones from outside of the monitored and secured areas. Based on Secure Perfect system architecture, it is not our intent to fully emulate traditional Burg/Intrusion panel functions but to provide similar functionality for less stringent Burg/intrusion requirements that can be taken on natively within the access control system. Additionally, the system provides increased value by allowing cross-system functionality between the Secure Perfect micro and vendor-independent Burg/Intrusion panels.

Arm/Disarm Intrusion Point - Digital Input Form

An Intrusion DI Type has been added to the drop-down list on the Digital Input Form, Digital Input tab.

When the Arm/Disarm Intrusion point is set/active (Armed), the associated zone is armed by placing all readers offline, all alarm points monitored on, and the arm/disarm DO goes active.

When the Arm/Disarm Intrusion DI is reset/not active (Disarmed), the associated zone is disarmed by placing all readers online, all alarm points monitored off (unless on a schedule), and the arm/disarm DO goes inactive.

Intrusion Zone – Intrusion Zone Form

The Intrusion Zone Form is required for creating a relation between readers, alarm inputs, the Arm/Disarm Intrusion point, and the arm/disarm DO.

1.An Intrusion Zone is defined with a description and facility assignment.

2.A micro selection is required to establish the zone source and its intrusion points.

3.The Intrusion Zone tab provides for the assignment of the following intrusion zone components: arm/disarm DO, arm/disarm Intrusion DI, readers, and alarms.

Arm/Disarm Intrusion DI: This is a single record selection from a drop-down list filtered by active facility that consists of all available Arm/Disarm Intrusion points for the micro. Only the Dis that have not been assigned will be available.

Alarm Points: This is a multi-record selection from an assignment dialog filtered by active facility that consists of available micro alarm points not already assigned to a zone. (24/7 4- State Supervision rules apply regardless of the Armed/Disarmed state of the zone.) Readers: This is a multi-record selection from an assignment dialog filtered by active facility that consists of available readers not already assigned to a zone. (Readers must be active and nonelevator type.)

A zone can be configured to contain the following:

An Arm/Disarm Intrusion Point with Alarm Points only and no Readers.

An Arm/Disarm Intrusion Point with Readers only and no Alarm Points

Alarm Points and Readers only with no Arm/Disarm Intrusion Point.

Readers only.

An arm/disarm DO can be assigned for any of these.

4.A Status tab provides the ability to request status of the zone and each of its associated points, as follows.

Zone: Armed or Disarmed

Secure Perfect 6.1.1 User Manual

186

Page 188
Image 188
GE v6 user manual Intrusion Overview, About Intrusion Options, Arm/Disarm Intrusion Point Digital Input Form