0% found this document useful (0 votes)
691 views249 pages

Configuring GMS 4.07 - Administrator Guide v1.00

Uploaded by

DANILO AYALA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
691 views249 pages

Configuring GMS 4.07 - Administrator Guide v1.00

Uploaded by

DANILO AYALA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 249

GMS 4.

07
Graphical Management System

Configuring GMS - Administrator


Guide

800 030 037 Version 1.0 3/12/2010 © 2010 Pacom Systems


© 2010 Pacom Systems All Rights Reserved
No parts of this work may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form by any means
without the prior written consent of Pacom Systems Pty Ltd.

Software License Notice


Your license agreement with Pacom Systems Pty Ltd, which is included with this product, specifies the permitted and prohibited uses of the product. It is
protected by Australian and international copyright laws and international treaty obligations. Your rights to use the Software are limited by the terms stated
below, and your use of the Software indicates your acceptance of these terms. If you do not agree with them, you must return, delete or destroy all copies
of the Software. Your rights to use the Software terminate immediately if you violate any of the terms stated below.
Any unauthorized duplication or use in whole or in part, in print, or in any other storage and retrieval system is forbidden.
You may not reverse-engineer, disassemble, decompile, or make any attempt to discover the source code of the Software.
You may not modify the Software in any way whatsoever.

Trademarks
All trademarks, brand and product names are property of their respective owners.
Pacom System Pty Ltd makes no warranty of any kind with regard to this product, including, but not limited to, the implied warranties of merchantibility and
fitness for a particular purpose. Pacom Systems Pty Ltd shall not be liable for errors contained herein or for incidental consequential damages in connection
with the furnishing, performance, or use of this product.
This document contains proprietary information and is protected by copyright. The information contained within this document is subject to change without
notice.
Configuring GMS - Administrator Guide

Table of Contents
..............................................................................................................................5
Introduction
Chapter 1: Configuring .........................................................................................................8
the System
Configuring System Parameters
...........................................................................................................................................9
Setting Password Policies
.........................................................................................................................................15
Configuring Custom Display Text
...........................................................................................................................................16
Configuring GMS for Running on Non-English or Mixed Environments
...........................................................................................................................................17
Configuring GMS Data Backups
...........................................................................................................................................18
Configuring GMS Operators
...........................................................................................................................................21
Configuring Administrator Accounts
.........................................................................................................................................31
Operator Privileges Reference
.........................................................................................................................................32
Configuring Alarm/Event Message Priorities
...........................................................................................................................................37
Configuring How Event Priorities Display
...........................................................................................................................................39
Configuring the Event Dispatch Scheme
...........................................................................................................................................42
Configuring Alarm Event Management & Response Procedure Display Settings
...........................................................................................................................................49
Customizing Response Procedure Display Settings
.........................................................................................................................................53
Creating and Managing Operator Response Procedures
.........................................................................................................................................54
Creating and Managing General Response Procedures
.........................................................................................................................................58
Linking Controller Events to DVRs
...........................................................................................................................................61
Configuring System Tasks
...........................................................................................................................................65
Synchronizing GMS with Base Stations and TransITs
...........................................................................................................................................67
Creating and Managing a Global Contacts List
...........................................................................................................................................68
Using the GMS Address Book
...........................................................................................................................................70
About GMS Log On/Log Off
...........................................................................................................................................72
Closing GMS
...........................................................................................................................................74
Configuring Holidays in the Yearly Calendar
...........................................................................................................................................75
Changing and Using the Authorization Password
...........................................................................................................................................77
Managing GMS Workstations
...........................................................................................................................................78
Configuring GMS Text-to-Speech
...........................................................................................................................................80
GMS Geographic Maps
...........................................................................................................................................81
Configuring Controller Message Date-Stamps
...........................................................................................................................................82
Configuring Remote Maintenance Testing
...........................................................................................................................................85
Creating and Managing Multi-Site Guard Tours
...........................................................................................................................................89
Configuring Intercom Operation
...........................................................................................................................................91
The Intercom .INI File
.........................................................................................................................................92
Configuring Intercom Report Options
.........................................................................................................................................96
Configuring Optional GMS Settings
...........................................................................................................................................99
Customizing the Card Access Manager
.........................................................................................................................................100
Using Customization Templates
.........................................................................................................................................105
Customizing the Events Manager
.........................................................................................................................................106
Customizing the Summary Manager
.........................................................................................................................................109
Customizing the Transaction Manager
.........................................................................................................................................113
Customizing the Site Map View
.........................................................................................................................................114
Changing Your Password
.........................................................................................................................................116
Selecting Printers
.........................................................................................................................................117
Editing System Data Files
.........................................................................................................................................118
Displaying Site ID or Account Numbers
.........................................................................................................................................119
Changing GMS Timeout Parameters
.........................................................................................................................................120
Changing GMS Backup Server Drive Mapping
.........................................................................................................................................121
Allowing Multiple GAG Access
.........................................................................................................................................122
Setting Up Delayed Downloads for Offline Controllers
.........................................................................................................................................123
Setting Up Delayed Alarm Notifications
.........................................................................................................................................126
Configuring IVR Operation
...........................................................................................................................................128
The IVR.INI File
.........................................................................................................................................131
The IVRCommon.INI File
.........................................................................................................................................132
The IVREngineer.INI File
.........................................................................................................................................138
The IVREngineerLogged.INI File
.........................................................................................................................................147
Chapter 2: Using
.........................................................................................................152
the GMS Map Editor
Opening and Closing the Map Editor
...........................................................................................................................................153
Understanding the Map Editor Interface
...........................................................................................................................................154
Drawing and Adding Objects to Site Maps
...........................................................................................................................................159

Table of Contents | 3
Configuring GMS - Administrator Guide

Importing Content into Site Maps


.........................................................................................................................................173
Using Site Map Layers
.........................................................................................................................................177
Editing Site Maps
.........................................................................................................................................178
Automating Tasks Using Site Maps
.........................................................................................................................................183
Creating Multi-Site Site Maps
.........................................................................................................................................187
Configuring DVRs and CCTV Cameras
.........................................................................................................................................189
Managing Site Maps
...........................................................................................................................................199
Working with Site Map Data
...........................................................................................................................................203
Creating Guard Tours
...........................................................................................................................................207
Alarm State Icons
...........................................................................................................................................208
Chapter 3: Using
.........................................................................................................212
the Transaction Manager
Understanding the Transaction Manager Interface
...........................................................................................................................................213
Filtering Messages
...........................................................................................................................................215
Managing Message Type Files
.........................................................................................................................................216
Recalling Stored Video from the Transaction Manager
...........................................................................................................................................217
Managing and Viewing Log Files
...........................................................................................................................................218
Creating and Managing Site and Transaction Reports
...........................................................................................................................................221
Creating User-Defined Reports
.........................................................................................................................................229
Chapter 4: Using
.........................................................................................................236
GMS Sub-Servers
Sub-Server Deployment
...........................................................................................................................................237
Sub-Server Event Handling
...........................................................................................................................................239
Database Synchronization
...........................................................................................................................................240
Index
.........................................................................................................................243

4 | Table of Contents
Configuring GMS - Administrator Guide

Introduction
This documentation is designed for GMS system administrators to configure GMS to its full capacity. It includes:
Creating and configuring GMS operators.
Setting up how GMS responds to alarms and response procedures for operators.
Configuring optional GMS settings.
Using the Transaction Manager.
Using the GMS Map Editor.

Supporting Material
The following documentation may provide further assistance for installing and configuring Pacom GMS:
Pacom Hardware Installation Guide.
CCU Configuration Guide.
TransIT Configuration Guide.
Using GMS - Operator Guide.
Configuring Controllers - Technician Guide.

Assumptions
For administrators, it is assumed that you have a working knowledge of IT administration and an understanding of
GMS and its capabilities with respect to site security. Some knowledge of networks and network types is also
required.

GMS Security
Ensure that the USB dongle provided with the GMS installation CD is connected to the computer at all times when
running GMS.

Warning: GMS will not operate without the USB dongle.

Introduction | 5
blank page
Configuring GMS - Administrator Guide

Chapter 1
Configuring the System

7
Configuring GMS - Administrator Guide

Before you use GMS, it must first be configured with initial data and specific parameters for normal operation.

Note: You can configure any part of the system at any time. System configuration settings are normally
available only to administrator type operators.

The following sections detail the procedures necessary to set up GMS:


System Parameters - General information required for operator log on security, workstations, file and drive
details.
Customized Text - Allows standardization of terminology for your organization into the GMS system.
Operators - Details setting up operators and access rights.
Alarm Priorities - All alarms and events in GMS are given a level of priority that presents the level of security
risk it presents to a remote site.
This priority indicates the type of alarm occurring. This priority is displayed in the Events Manager when an
alarm occurs. This allows operators to assess the security risk of the situation at a glance, and action the
situation accordingly.
Event Priority Display - After you have assigned a priority to each type of alarm in your system, you can
change the appearance of these priority types to emphasize the importance of specific priority types. For
example, you may choose to display alarms of a higher priority as a distinctive color (such as red) to highlight
the importance of an alarm of this priority to operators. You may choose to make alarms of some priorities flash
to further emphasize their importance. Configuring Event Priority Data allows you to configure the appearance
of event messages displayed in Events Manager according to their priority. You can also use this command to
configure the action response time required by an operator for specific events.
Event Dispatch Scheme - The event dispatch scheme allows you to configure the order of workstations to
which events are dispatched to be actioned as they occur. This means that as soon as an alarm occurs, it is
displayed on the operator screen that you have indicated in the event dispatch scheme. By indicating the specific
criteria used to dispatch events to operators, you can ensure that events of a higher priority and security risk
are actioned by more experienced operators. Other events of less priority can be sent to any operator to be
actioned.
System Tasks - Some tasks within GMS must be completed on a regular basis. You can configure GMS to
automatically run these tasks, to ensure they are regularly completed. These are known as system tasks, and
include such tasks as isolating points, locking card readers, and backing up system data files.
Additional system configuration on individual operator workstations. This configuration is optional, and is
operator independent (that is, activated when a user logs on to a workstation). Individual operators can choose
to change the appearance of the Events Manager, Summary Manager and operator response dialog boxes.
Changing authorization password.
Changing operator password.
Changing communications baud rate.
Selecting printers.
Editing system data files.
Resizing maps automatically.
Displaying site ID numbers.
Changing GMS time out parameters.

8 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring System Parameters


System parameters include general system information, such as operator, workstation, file and drive details. Use the
Options - System Parameters Configuration dialog box for these settings.
To open the dialog box:
1. In GMS, select Tools > Options. The Options - System Parameter Configuration dialog box opens.
2. Click a tab to access the relevant settings. Tabs are:
General - Fundamental system parameters necessary .
Logon - Operator access requirements.
Access Control - Preferences for how to display cardholder cards in the monitored area.

Note: In most cases, the default configuration for system parameters is appropriate. System parameters
can only be changed by an operator with Edit System Parameters privileges.

Configuring General System Parameters


These settings enable you to individualize GMS to suit your organization.
1. In the Options - System Parameter Configuration dialog box, click the General tab.
2. Accept the default values or enter customized values according to the following sections.

Parameter Description
User Site Access Range The range of sites (Controllers) to be monitored by the system.
(First/Last)
Note: The range is determined by the GMS license.

To Maximum amount of sites allowed with the current license.


No. of Operators The number of users with GMS access/logon authority. Min. = 1, max. = 255.
No. of Workstations The number of licensed workstations that can connect simultaneously to the
Permitted server. Min. = 1, max. = 32.
No. of Alarm Priorities The total number of alarm priorities available for use (see Configuring Alarm/
Event Message Priorities 37 ). Min. = 1, max. = 255.

Chapter 1 - Configuring the System | 9


Configuring GMS - Administrator Guide

Parameter Description

Caution: When changing this setting, the following procedure needs


to be followed in order to maintain normal operation:
1. Shutdown the entire GMS system except for an active GMS
server.
2. Disconnect monitored hardware from the active server.
3. Change the value of the No. of Alarm Priorities setting.
4. Immediately restart the active server.
5. Reconnect the monitored hardware to the active server.
6. Start the rest of the GMS system.

No. of Sites Permitted The number of licensed remote sites/Controllers attached to the server.
Determined by the GMS license.

No. of Days to Keep the The number of days GMS will store the log files generated by the system. The
Log Files (30-365) log files will be deleted after this time. Min. = 30, max. = 365.
Create Site Map Backup When this option is selected, GMS will automatically create a site map backup
File files and store them where you determine in GMS Backup Drive.
GMS Backup Drive The path to the drive path to where you want to store automatically created
GMS backup files.
Local Controller No. Typically the Controller number is the same as the site number.
Low Disk Space Check at When the disk space for GMS reaches this amount of MB, a warning is
(MB) generated.

Enable Point Location When this option is selected, point location location is displayed in the
Display Transaction Manager and Events Manager.
Enable Verification When this option is selected, operators will be prompted to enter their
Codes verification codes when an action is performed from the Events Manager.
This essentially keeps a log of all Events Manager operators for security
purposes.
Enable PNR (Point Not With this option selected, when a point has triggered an alarm, an event (with
Reset) Task specific priority) is created. If that priority has configured PNR time for two
minutes, then the operator has two minutes to reset the point before a PNR
Time Out message is generated (see Configuring How Event Priorities Display
39 ).
Enable Real Time Log When this option is selected, a printout of each event or transaction is created
Printing as soon as they occur. Click Printer Selection to set up printer parameters.
Printer Selection Button Opens the standard Windows Print Setup dialog box to allow you to determine
on which printer the real-time log will be printed.
Disable System Tasks Enable to prevent any system tasks from running.
Disable Auto Card When this flag is not selected and an unknown card is used, GMS searches
Download the cardholder database for the card. If found, GMS downloads the details to
the Controller. The next time the card is used, it will work. If selected, the
Controller will reject any unknown cards.
Don't use Remote Server Select this flag to NOT use the remote server as a monitoring workstation.
as Monitoring w/s This means that at any stated time at least one workstation must be running
GMS.

Manual Switch from When this option is selected, a remote server is activated in the event of a
Backup to Active Mode Pacom Base Station failure. You can choose to manually reset when the Base
Station comes online.
Automatic Switch over In the event of a Controller breakdown, the automatic switch to a remote
Time (Min) server will step in after the selected amount of minutes. Min. = 1, max. =
255.

Number of Site Contacts Enter the number (in multiples of eight) of site contacts will be allowed for
this particular site. Allowed inputs are 8, 16, 24 and 32.

Configuring Logon Parameters


These settings enable you to set access requirements for GMS operators.
1. In the Options - System Parameter Configuration dialog box, click the Logon tab.
2. Accept the default values or enter customized values according to the following table.

10 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Parameter Description
Operator When this option is selected, the operator can customize their own GMS display
Independence options.
Operator PIN Enabled When this option is selected, operators will be prompted to enter their PIN
when a system command is performed (that is, a command going to the
Controller). This is dependent on the operator privileges. For example, to force
Day mode during the normal Night mode operation, the PIN will be requested
to confirm access to make this system command.
Logon Fail Alarm When this option is selected, an alarm is generated if an operator logon fails the
Enable number of times set in Logon Attempts. For example, if Logon Attempts is
set to 1 the alarm is triggered immediately after the first failed logon attempt.
All Types of Prevent GMS from checking if the desired operator password is listed in the
Passwords Allowed password exclusion file. The password exclusion file stores passwords that are
not allowed. That is, liable to be a security risk as they may be easily guessed,
for example, "password".
Excluded passwords are stored in the STDPW.CONFIG file located in the GMS/
Customer/NonOverwrite folder. You can edit the file using a text editor such as
Notepad. Each excluded password takes up a line in the file, with a number and
period (full stop) preceding it. For example:
1.password
2.enter
3.Hello
After editing and saving the file, restart GMS for the changes to take effect.

Note: Passwords in GMS are case-sensitive.

Auto Password GMS automatically generates passwords when configuring GMS operators (see
Generation Configuring GMS Operators 21 ). When this option is enabled and you create an
operator, a dialog box is displayed showing the system generated password
allocated to the operator.
No Reuse of Password Force GMS to reject any password that is currently set for another operator.
That is, every operator in the system must use a unique password. In cases
where GMS log on requires initials only and password, it may be possible for
two or more operators to have the same initials and use the same password. In
which case, GMS logs on the first operator in the list with the entered initials
and password. This could lead to operator actions being recorded for the wrong
operator. To prevent this possibility from happening, enable this option.
GMS also keeps a record of passwords used by individual operators. If this
option is enabled, operators will not be allowed to use a password that they
have used before. The password history list for an operator can be cleared
(allowing re-use of an old password) by clicking Reset in the Operator Setup
dialog box (see Configuring GMS Operators 21 ).

Chapter 1 - Configuring the System | 11


Configuring GMS - Administrator Guide

Parameter Description
Must Change An initial password is created when the system administrator creates the user.
Password at First This password can only be used once and the user must change their password
Logon when they log on the first time.
Allow Last Operator to If this box is not selected one workstation must always be running. This could
Logoff be the case in a control room where several operators and shifts are monitoring
the alarms. If the last operator that is logged on try to log off an error message
is generated - You can't logoff because system requires at least one
'Alarm monitoring' operator logged on! When this box is selected it allows
the last operator to log off. Example: when the night alarms are overseen by an
outsourced monitoring centre.
Auto Logoff Time Enter the time in minutes that the user can remain logged on without any
activity before being logged off automatically. Min. = 0, max. = 30 min.

Note: This option does not work on a standalone system.

Logon Attempts Enter the number of attempts allowed for logging on. When this number is
exceeded, the Logon Fail Actions 12 that are selected will be activated.
Min Password/PIN The minimum number of characters or digits acceptable for use in an operator
Digits password or PIN. Min. = 1, max. = 8 numerical characters.
Authorization Auto The amount of time in minutes before the authorization password and its
Logoff Time authority will time out.

Note: This option does not work on a stand alone system.

Enter System Enter a password for operators to use for logging on to GMS. The password can
Password contain a maximum of eight characters/digits.
Logon Using
Logon Using Select an option for what operator details to use when logging on to GMS.
Available options are:
Initials - Operator initials required only. For example, "CB" (for Charles
Brown).
Full Name - Operator full name required only. For example, "C Brown" (for
Charles Brown).
Display Name - Operator GMS display name required only. For example,
"Night Operator".
Windows Login - Operator uses their Windows account login (see
Authentication Mode 12 ). This option is disabled until an operator is created
from a Windows user.

Note: User names in GMS are not case-sensitive.

Logon Fail Actions


Generate Warning A dialog box with the message Attempt to logon failed!! is displayed if the
Message operator enters invalid login credentials.
Restart Logon Process After the configured number of allowed attempts to logon have failed, the
Operator-1 Logon dialog box closes. Select File > Operator-1 Logon for
further attempts.
Lockup the System When an operator log on fails, GMS prevents any users from logging on for 10
minutes.
Lockup the Operator Prevents any further log on attempts from the denied operator for the time
entered in the Operator Lockup Time 12 setting.
Operator Lockup Time The time that an operator will be unable to log on for after failing to log on
within the Logon Attempts 12 setting.
Authentication Mode
Authentication Mode Select an option to determine the authentication mode for operators. Available
options are:
GMS - Operators credentials are configured in GMS, including login names
and passwords. Click Password to set a "strong password" policy (see
Setting Strong Password Policies 15 ).
Windows by using Authenticating domain - Operator credentials are
configured in Windows Active Directory, including login names and
passwords (see Configuring GMS Operators 21 ). Select the Windows
domain to authenticate users from. Windows authentication mode will not
take effect until at least one operator is associated with a Windows

12 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Parameter Description
account.

Note: Ensure all Windows accounts that will use GMS are members of
the GMS_USERS (case-sensitive) Security Group in the Active
Directory.

Configuring Access Control Preferences and Display Settings


These settings enable you to set access card preferences and how GMS identifies access cards in the physically
monitored areas.
1. In the Options - System Parameter Configuration dialog box, click the Access Control tab.
2. Accept the default values or enter customized values according to the following section.

Parameter Description
Display Card Using
Display Card Using Select a method for displaying access card numbers in GMS. Options are:
Card Number - Use the electronically encoded card number.
Printed Number - Use the number physically printed on the card (can be
different to encoded card number).
Card Transaction Display Options
Card Transaction Choose a preference for displaying card transactions, by card details (Option
Display Options 1), and/or cardholder details (Option 2) and/or by department (Option 3).

Enable Operator Select this box to enable operators to view only assigned sites with their
Partition related cards and cardholders. The sites the operator is allowed to view are
set in Configuring GMS Operators 21 .
Disable Auto Creation of Removes a prompt that appears when an operator saves a GRG, asking if you
GAG from GRG wish to save a GAG with the same name as the GRG you just created.
Same Access Level For Enable so if a card is re-issued, all Access Levels are copied from the old card
ReIssued Cards to the re-issued one.
GMS - Controller Card Enable to allow card status and validity details comparison between the GMS
Status Auto-Fixed database and the Controller, and perform the following actions if there is a
discrepancy:
If the card is valid in GMS and is not locally blocked in the Controller, the
Controller is updated with the card being valid.
If the card is blocked in GMS and is valid in the Controller, the Controller is
updated and a blocked card command is broadcast to all Controllers.

Chapter 1 - Configuring the System | 13


Configuring GMS - Administrator Guide

Parameter Description
If the card is expired in GMS and is valid in the Controller, the Controller is
updated and an expired card command is broadcast to all Controllers.
If the card is valid, blocked or expired in the Controller, however, the GMS
database is unavailable, a delete card command is broadcast to all
Controllers. To exclude certain Controllers from receiving this command,
enter them in the Exclude the following Controllers from Auto-Delete
Command field.

Note: The Options - System Parameter Configuration dialog box,


General tab, Disable Auto Card Download option must be disabled
for GMS to be able to update Controllers.

Exclude the following Enter any Controllers that you want to exclude from receiving a delete card
Controllers from Auto- command that is the result of a GMS - Controller Card Status Auto-Fixed
Delete Command delete card command broadcast. Enter individual Controller numbers
separated by commas (,), or ranges of Controller numbers. For example,
"1,3,6-12,14".

Note: The GMS - Controller Card Status Auto-Fixed option must


be enabled for this field to be active.

When finished, click OK to save changes and close the dialog box, or Cancel to ignore changes and exit.

14 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Setting Password Policies


"Strong passwords" enable you to set up specific password rules to help reduce the possibility of intruder access.
GMS version 3.84 onwards supports strong passwords.

Setting Strong Password Policies


You create password policies using the Password Policy Settings dialog box. To open the dialog box:
1. In GMS, select Tools > Options. The Options - System Parameter Configuration dialog box opens.
2. Click the Logon tab.
3. Click Password. The Password Policy Settings dialog box opens. Set the password rules according to the
following table.

Note: Strong passwords apply only when using GMS authentication mode (see Configuring Logon
Parameters 10 ).

Parameter Description
Minimum password Set the minimum number of characters/digits required for operator
length passwords. All passwords must comply with the rule in order to be accepted.
Renewed passwords will Set the number of consecutive days that operator passwords are active for.
expire in After the number of days has expired, the password will no longer be
recognized and the operator will need to create a new password.
Passwords must contain
any character Select so that the password can contain any combination of the characters (0-
9, a-z, A-Z, !@#$ etc).
strong password options Select so that rules apply to passwords to make them more secure. All
passwords must comply with the rules in order to be accepted. You can enable
multiple rule (options):
at least one digit - The password must contain at least one numerical digit
(0-9).
at least one upper case - The password must contain at least one upper-
case alphabetic character (A-Z).
at least one lower case - The password must contain at least one lower-
case alphabetic character (a-z).
at least one special character - The password must contain at least one
"special" character (!@#$%^& etc).

4. Click OK to save and apply the password policy, or Cancel to ignore changes and exit.

Chapter 1 - Configuring the System | 15


Configuring GMS - Administrator Guide

Configuring Custom Display Text


Your organization may use specific terms or abbreviations to describe elements and occurrences in your system such
as actions, alarms, events, modes etc. These can sometimes differ to the default terms used by GMS. You can define
custom words, terms and abbreviations in GMS to suit your organization.
For example, some organizations may refer to an unsealed site as being in "Day Mode"; others may refer to this
mode as "Premises Unset" etc.

Customizing GMS Display Text


To define the text that is displayed by GMS, proceed as follows:
1. In GMS, select Tools > Customize Text. The Customize Text - User Defined Words dialog box opens.

2. Select the word you want to re-define in the Default Words list. This list contains all default words, terms and
abbreviations for the various modes of operation in GMS. Each word is shown in both the full and shortened
versions (separated by a comma). Full words can be up to 32 characters in length. Short words can be up to 16
characters in length.
3. In the New Words field, enter your organization’s terminology for the selected word. Enter both full and
shortened versions, separated by comma (,). The new words and terms you define are displayed in the User
Defined Words list. The words, terms and abbreviations displayed in this list are the words that will be used in
GMS.
4. To view the original (default) term for a User Defined Words, select the word in the User Defined Words list,
and the default term will be highlighted in the Default Words list.
5. Repeat steps 3 - 4 for each word you want to re-define.
6. Click OK to save the changes and close the dialog box, or Cancel to exit without saving.

16 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring GMS for Running on Non-English or


Mixed Environments
The following information applies if the GMS database collation order is set to LATIN1_GENERAL_ (which is a default
value for most English-language countries), and you are using a non-English language to input data in GMS. That is,
there is a difference in characters expected by the database for input data than is being provided through GMS due to
different language settings between the two.
The language collation order in SQL must correspond to the locale that GMS is running in to ensure that input and
output from the database is consistent. This "conversion" is controlled by database codepage files. For example, if the
database collation order is set to LATIN1_GENERAL_CI_AS, and GMS text was entered in Swedish, the å, ä and ö
characters may be replaced with incorrect characters in the user interface and in reports etc.
Also, it may cause issues with GMS export/import operations in a situation when the default non-Unicode language is
set to a non-English language (Windows Control Panel, Regional and Language Options). If this is the case, you
should add a parameter to the GMS32.INI file (see Editing System Data Files 118 ) to specify the codepage to use:
[System Parameters]
BCP_CP=1250

Note: The 1250 codepage is for Central European and Eastern European languages, and should be
suitable for most cases. If your locale language is not encapsulated by codepage 1250, then you should
set it to some other value (see MS SQL and Windows documentation).

Selecting the Correct Codepage


To test which code page should be used, proceed as follows:
1. In the Card Access Manager, create a department name with aäöAÄÖ (or any other language-specific
characters).
2. Open the command line and enter:
bcp "select * from GMS32DBASE.dbo.DEPARTMENT" queryout testoutput -t. -c -T
3. Run the command, then check the content of the resulting testoutput file in a text editor (such as Notepad). If
the default codepage is not suitable, the department name in the file will contain incorrect characters.
4. Enter the following in the command line:
bcp "select * from GMS32DBASE.dbo.DEPARTMENT" queryout testoutput -t. -c -T -C 1250
5. Run the command, then check the content of the resulting testoutput file. The name of the department should
be correct. If not, try different codepages until both input and output characters are correct.

Chapter 1 - Configuring the System | 17


Configuring GMS - Administrator Guide

Configuring GMS Data Backups


As with all computerized data systems, regular backing up of critical files is an important safeguard against data loss.
The following section explains what to back up and how to set up system tasks to automate the process.

Backup Location
The following recommendations do not cover all possible combinations or requirements. IT staff should have a full
understanding of backup operations and also how to restore data from a backup.

Note: It is not recommended to backup to the C:\ on the GMS server.

For standalone systems (single machine as server and workstation), backup to the D:\ drive.
For server-client systems with a main server only and workstations, on a workstation that is always turned on,
create a shared folder for the backup storage location and point the backup task to it.
For server-client systems with a multiple servers and workstations, create a folder for the backup storage
location in the GMS folder of a server and point the backup task of another server to it. For example, for a
system using Main and Remote servers, in the GMS folder of the Remote server, create a folder called "Main
Backup" and in the GMS folder of the Main server, create a folder called "Remote Backup". Then, when setting
up the backup tasks, point the Main server backup to the backup folder on the Remote server and the Remote
server backup to the backup folder on the Main server.
Backups can be made to USB or other removable storage media.

System Tasks
The following recommendations provide guidelines for tasks to set up and backups to make. Create the following
tasks (see Configuring System Tasks 65 ).

Note: Never run system tasks between 1:00 and 3:00 AM as it may interfere with automated GMS
routines that are designed to run in the first hours of each day.
Do not perform more the one SQL backup task at the same time.

CPU card time send including Controller's - This task should run twice a day, including holidays. Once at
00:55 and again at 3:05 (this is to allow for daylight saving).
Backup system data files - This task should be performed on a monthly basis, or after a GMS upgrade.
Backup SQL database (limited support) - These tasks should be performed according to the following:
For systems using card access, backup the SQL tables on Tuesday, Thursday and Saturday.

Note: SQL table backups should not be performed daily as it is possible to backup a bad table and it is
better to lose one day of data than potentially everything.

Backup GMS operator SQL tables weekly.


If the GMS Address Book is being used, backup its SQL tables three times a week.
If the GMS Message Board is being used, backup its SQL tables three times a week.
Backup config files - This task makes copies of GMS configuration data and should be performed according to
the SQL backup schedule.

Note: All SQL backups need to be completed before performing a Backup config files task.
Other files, such as Site maps and logs, can be recovered using the "flat" files that are created when the
Backup config files task runs.

Backup log files - This task makes copies of daily GMS transaction log files.

Note: Due to the size of log files, backups should be performed only with small systems that have very
few transactions per day and preferably want to store 90 days or less worth of backup log files.

Backing Up Data
GMS database tables can be manually backed up for use in cases where the hard drive (with GMS) has failed or some
other problem has caused GMS to crash. To backup GMS data, proceed as follows:

18 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Note: Database backup files are placed in the GMS\Customer\Data\Database folder by default. To backup
database files to a different location, specify the folder in the Options - System Parameters Configuration
dialog box, General tab, GMS Backup Drive field and create a task to automatically backup the data.

1. In GMS, select Tools > Database > Backup Database Tables. The Backup Database Tables dialog box opens.

2. To back up data, select them from the Tables list and add them to the Selected Tables list. To select all data
tables in one process, click Select All. Alternately, select individual tables and click Add, or enable the Modules
option and select a GMS module from the adjacent list to view its tables in the Tables list.

Note: Click an item to select it. Click a selected item to deselect it.

3. Click Backup (during the back up process, which may take several minutes, Backup is inactive).
4. Once Backup is active, click Close to close the dialog box.

Restoring From Backed Up Data


In cases where the hard drive (with GMS) has failed or some other problem has caused GMS to crash, database
backup files become useful. To restore GMS using previously backed up data, proceed as follows:
1. Install GMS. Ensure that the GMS version being installed is the same as that of the original GMS.

Note: To view the GMS version used to create the backup, right-click on the GMS backup folder and
select Properties, then click the Version tab.

2. Create a user/operator in GMS.


3. Start and then close GMS.
4. Rename the GMS folder (of the new installation).
5. Manually copy the GMS folder from the backup, into its original location.

Note: Ensure all GMS folders/files have read-write permission. This becomes important if copying GMS
from CD backup.

6. Start GMS and login as the user created in step 2.


7. Check to see if the original site maps have been restored.
8. Click Tools > Database > Restore Database Tables. The Restore Database Tables dialog box opens.

Chapter 1 - Configuring the System | 19


Configuring GMS - Administrator Guide

9. In the Source Directory region, click ... to open a Windows Browse for Folder dialog box, where you can
navigate to and select the backup source folder.

Note: The default GMS backup location is the GMS\Customer\Data\Database folder.

10. To restore data, select them from the Tables list and add them to the Selected Tables list. To select all data
tables in one process, click Select All. Alternately, select individual tables and click Add, or enable the Modules
option and select a GMS module from the adjacent list to view its tables in the Tables list.

Note: Click an item to select it. Click a selected item to deselect it.

11. Click Restore (during the restore process, which may take several minutes, Restore is inactive).
12. Once Restore is active, click Close to close the dialog box.
13. Perform these verifications:
Verify the restored database integrity by creating some reports (for example, alarm reports for few sites to
check log data table).
Check if all cardholders are restored. Also ensure the cardholder photos and signatures match up.

Note: If restoring the first time after a fresh installation, the restore table command should be executed
from the server, with connected GMS workstations not be running.

20 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring GMS Operators


You must set up a user account for each GMS operator. User accounts, or privilege profiles, determine the authority a
user has within GMS and the actions they have access to perform.
Privilege profiles dictate whether or not a user can send commands to network elements, edit files and parameters
and view site maps.
Only the commands and actions included in a user privilege profile are available while they are logged on to GMS.
Other commands will be unavailable (greyed out), or not displayed. This protects the security of the system.
A user account includes the information categories:
Details - Contains the personal details of the operator such as contact details, operator PIN, password, and
expiry dates of their account. This is also where the operator partitioning is set, i.e. what sites this particular
operator will be able to view and action.
Privileges - The functions and editing privileges for each function this operator is granted.
Customize - This is where the operator can customize their view of GMS.
Partitioning - This is where you configure the partition the operator should be able to access.

Note: This tab is visible only if the Enable Operator Partition system parameter is enabled (see
Configuring Access Control Preferences and Display Settings 13 ).

Logon Site Display - This is where you configure the site map to automatically display when the operator logs
on.
Rapid Access - Represents readers that the operator can grant single access to directly from the Card Access
Manager. The state of the reader is also represented by different icons.
You must have Edit authorization set by the top level user to configure operator details.

Note: The default initials and password ("a" and "1" respectively) identify the top level user. The top level
user has access to all levels of GMS. You MUST change the default Operator-1 (default) initials and
password as soon as possible. This will protect the security of your system and security network.

When configuring operator details, you can include different areas of security for GMS, such as:
A PIN can be assigned to each user to control access to system commands. This is an additional security option
that is set for specific commands by the supervisor at their discretion.
Menus can be customized, and access to certain commands can be restricted.
A site range can also be defined for each user. The site range is the number of Controllers a user will monitor or
be responsible for. Typically, the site range defines a state, province or region.
As an additional security feature any GMS command can be configured to request another user password and
initials before the command can be executed. This is known as "dual-password access", with the second user
referred to as "Operator-2". Operator-2 can be any user ID with command authorization. Operator-2 can only
log on once an initial user (Operator-1) has logged on.
Dual-password access is usually required for a few critical commands, however, the system has options for
controlling behavior once Operator-2 has logged on. This is set in the GMS32.INI file, under [System
Parameters] (see Editing System Data Files 118 ), as follows:

Note: Changes to the GMS32.INI file for dual-password access must be carried out on the GMS server
only.

Dual Password Auto Logoff=Every Command - Requires Operator-2 to log on for each and every dual-
password access command. Once the command has been run, Operator-2 is logged off.
Dual Password Auto Logoff=0 - Once Operator-2 has logged on, they will remain logged on, allowing
multiple dual-password access commands, until they specifically log off.
Dual Password Auto Logoff=NN - Where NN is 1 to 65534 minutes. Once Operator-2 has logged on, they
will remain logged on for the timer setting (NN), allowing multiple dual-password access commands, until the
timer expires or they specifically log off. This setting ignores any GMS operator inactivity timeouts.

Note: If no parameter is specified, Operator-2 is automatically logged off after five minutes.
Operator-2 can log on at any time using File > Operator-2 Logon, as well as when the log on dialog box
for dual-password access privilege appears.
Access to the Operator command should be restricted to the top level user only. This is achieved by using
the Operator command to set User-1 as the only password with access to this command. After this has
been done, when other users log on, they will find this command inactive (grayed out), making it
unavailable for selection.

Chapter 1 - Configuring the System | 21


Configuring GMS - Administrator Guide

Managing GMS Operators


Manage operators as follows:

1. In GMS, click or select File > Operator Setup. The Operator Setup dialog box opens. Manage operators
according to the following section.

Parameter Description
Add Click to create a new operator using the [second] Operator Setup dialog box.
Click the arrow and select As New Web Operator to create a GMS Web
Client-only operator.
Edit Click Edit to edit the selected operator using the [second] Operator Setup
dialog box. Click the arrow and select As New Web Operator to create a GMS
Web Client-only operator.
Delete Click to delete the selected operator from the system. A confirmation dialog
box appears before deleting.
Copy Click to open the [second] Operator Setup dialog box using the selected
operator details as a template. It will copy the operator privileges and
customized options and is useful when creating the same type of operator as
may already exist. It also reduces the risk for missing a privilege or giving too
much access to a new operator.
Close Click to close the Operator Setup dialog box.

Creating and Editing Operators


To configure operator details proceed as follows:
1. In the Operator Setup dialog box click Add to create a new operator.
-or-
In the Operator Setup dialog box, select an operator and click Copy to begin creating a new operator using the
same properties. The [second] Operator Setup dialog box opens.

Creating GMS Web Client-Only Operators


You can create operators specifically for using the GMS Web Client. These operators will not be able to log on to the
main GMS system, however, can use the GMS Web Client application.
To create a Web Client-only operator, proceed as follows:
1. In the Operator Setup dialog box click the arrow next to Add or Copy and select As New Web Operator.
2. Set up the operator as normal.

Note: Web Client-only operator ID numbers start at 256. There is no limit to the number of Web Client-
only operators you can have.

Configuring Operator Details


1. Click the Details tab and configure the operator details according to the following table.

22 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Note: The dialog box controls change slightly depending on the GMS authentication setting (GMS or
Windows). Differences are noted in the table.
Telephone number entry fields can also be automatically filled from Address Book contacts, see
Automatically Applying/Dialling Address Book Telephone Numbers in GMS 71 .

Parameter Description
Logon Name This field applies for GMS using Windows authentication.
Select the Windows user to enable access to GMS.

Note: Ensure all Windows users that will use GMS are a member of
the GMS_USERS (case-sensitive) Security Group in Active Directory.

Operator No Automatically displays the number assigned to the operator for identification
purposes. This number is automatically generated by the system.
Last Name This field is mandatory.
Enter the operator surname. These will automatically display as capital letters.
Min. = 1, max. = 20.

Note: For Windows authentication, enter the last name as configured


in Windows.

Initials This field is mandatory.


Enter the operator initials. These will automatically display as capital letters.
These are the initials that an operator will use to log on to GMS. Min. = 1, max.
= 2.

Note: For Windows authentication, enter the initials as configured in


Windows.

Address Enter the operator personal address. Enter the full address, including the street
number, street name, suburb and post code. Min. = 0, max. = 50.
Telephone Enter the operator contact phone number. This may be a home number or
work number, this is up to the discretion of your individual organization. Min. =
1, max. = 20 alphanumeric characters. Use the list to select previously entered
numbers.

Note: For Windows authentication, enter the telephone number as


configured in Windows.

Password This field is mandatory.


Enter a password for the operator. Passwords are case sensitive and will
display as a series of asterisks. This is the password that an operator will use
to log on to GMS. Ideally it should be different than the value in Initials.

Chapter 1 - Configuring the System | 23


Configuring GMS - Administrator Guide

Parameter Description
When leaving this tab, a dialog box opens where you will need to re-enter the
password and click OK to confirm the password. Min. = 1, max. = 16
alphanumeric characters.
Reset Click to clear the current user's password history from the database. Resetting
an operator's password history will allow them to re-use an old password even
if the No Reuse of Password option is enabled in the Options - System
Parameter Configuration dialog box, Logon tab (see Configuring Logon
Parameters 10 )
PIN This field is mandatory.
Enter a PIN for the operator to use to access the system. When enabled, if an
operator wishes to perform remote actions on a site on the System Summary
screen (for example, using the system keypad from a site map) then the
operator will be prompted to enter this PIN. Min. = 1, max. = 8 positive
integers.

Note: The PIN is used if the Operator PIN Enabled option in the
Options - System Parameters Configuration dialog box Logon 10 tab
is enabled.

Password Expiry The date the operator password will expire. A default date is entered for a new
operator that is valid one year from the creation date. If you wish to edit the
existing date enter a new one in format dd/mm/yyyy.
Account Expiry The date the operator GMS usage will expire. A default date is entered for a
new operator that is valid one year from the creation date. To edit the existing
date enter a new one in format dd/mm/yyyy.
Display Name Enter the name that will appear in the title bar when the operator is logged on
to GMS. It can be the full name or a role title such as Night Operator 1. Min.
= 0, max. = 31 alphanumeric characters.

Note: For Windows authentication, enter the display name as


configured in Windows.

Verification Code Enter a verification code for the operator. Operators will be prompted to enter
a verification code when they perform an action using the Events Manager.
This essentially keeps a log of all Events Manager operators for security
purposes. Min. = 0, max. = 8 alphanumeric characters.
Mobile Phone Enter the operator mobile/cell phone number. This may be a personal or work
number, as required. Min. = 1, max. = 20 alphanumeric characters. Use the
list to select from previously entered numbers.

Note: For Windows authentication, enter the telephone number as


configured in Windows.

Email Enter the operator email address. This should ideally be a work email address.
Min. = 1, max. = 50 alphanumeric characters.

Note: For Windows authentication, enter the email address as


configured in Windows.

Logon Hours Enter the hours between which this operator has access to log on to GMS in the
24 hours format hh:mm. Example, 06:00 to 19:00.
Display Site Map at Logon
Site/Area No. Set a site map to display in the site map view whenever the operator logs on to
GMS. Enter the site number in the first field, and the area number in the
second.

Note: Use either this option or Multi-Site Map, not both. Entering
values in these fields overrides any Multi-Site Map field selection.

Multi-Site Map Set a multi-site map to display in the Site Map View whenever the operator
logs on to GMS. Click to view the available multi-site maps. Click a map to
select it.

Note: Use either this option or Site/Area No, not both. Selecting a
value in this field overrides any Site/Area No field values.

24 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Parameter Description
Partition
List of Site Groups Click to view the available site groups. Click a group to select it. The sites in
the group are the Controllers (branches) the operator will monitor or be
responsible for. The operator has no access to sites outside of the specified site
group.
Edit Click to edit an existing site range. The SITE Groups Configuration dialog box
opens.
Create or edit a site group by entering a new site group name or choosing from
existing site groups in the Enter Group Name text field.
Enter the site range in the Enter Range field, e.g. 1-5, or as singular, e.g. 10,
20. Click Apply and choose not to overwrite the current group name.
To delete a site group, ensure the group name is displayed in the Enter Group
Name field, then click Delete. A confirmation message will be displayed.
Rapid Access Click to open the Rapid Access Button Configuration dialog box, where you can
assign readers to the user for "rapid access" from the Card Access Manager
or from the GMS Web Client.
Print Click to print the current operator account. A report is created displaying all
personal details, a list of all privileges and authorizations, the menu options
available to the operator and the configured partition.

Note: It is recommended to enter information for as many other fields as possible to improve security.

Configuring Operator Privileges


1. Click the Privileges tab and configure the operator privileges according to the following table.

Note: For more information on operator privileges, see Operator Privileges Reference 32 .

Parameter Description
Profiles Select an existing profile to assign specific its privileges to the operator from
the list. To create a new profile, refer to Save As.
Save As Click to save the current enabled selections in the Privileges List as a new
privilege profile after entering a name for it in the Profiles field (Min. = 1,
max. = 31 alphanumeric characters). You can also add or delete privileges
from an existing profile, then save it under a new name.
Privileges List A list of all commands and actions that can be performed within GMS and your
security network. Select desired privileges to assign specific privileges to
operators (see Operator Privileges Reference) 32 . This allows you to control
the access the operators have to the commands and actions in GMS.
Modes For each privilege you can assign which access mode the operator should have
for each function. Highlight a privilege and select one or more of the following:

Chapter 1 - Configuring the System | 25


Configuring GMS - Administrator Guide

Parameter Description
View - allows an operator to view the selected privileges and commands,
site maps, files, etc. within GMS.
Edit - allows an operator to edit the selected privileges and commands,
parameters, files, etc. within GMS.
Execute - allows an operator to execute specific commands within GMS,
send commands to network elements, etc.
Dual Password - an operator must have a second operator enter a
password before they can access the selected privilege in GMS.
For example, select the privileges in the Privileges List to which you want the
operator to have View access to. Enable the View option, then click Apply.
Repeat this procedure for each mode until all privileges assigned to the
operator have one or more modes assigned.
Apply Click to apply selected mode to the highlighted privileges in the Privileges List
.
Select All Click to select all privileges in the Privileges List.
Clear All Click to de-select all privileges in the Privileges List.
Print Click to print the current operator account. A report will be created displaying
all personal details, a list of all privileges and authorizations, the menu options
available to the operator and the configured partition.

2. To create a new privilege profile or to edit an existing profile, in the Profiles list enter a new profile name or
select an existing profile.
3. To assign an operator a privilege, in the Privileges List enable the checkbox for each desired privilege.
-or-
To assign an operator all privileges click Select All to highlight all privileges, then enable (or disable) any
checkbox in the list to enable (or disable) them all. Click Clear All to de-select them all. The selected option(s)
will remain.
4. To assign a privilege one or more access modes, in the Privileges List select the required privileges. They are
assigned View and Execute modes by default.
Under Modes select (or deselect) one or more of the modes View, Edit, Execute or Dual Password.
Click Apply to assign the selected privileges the combination of modes you just selected.
Repeat the above steps for privileges that need other mode combinations.
5. Click Save As. The privileges and authorizations you have assigned will be automatically saved as a new profile,
if you entered a new profile name in the Profiles field, or saved to the current profile if you edited an existing
profile. This profile can now be used for other operators.

Note: Click Cancel to exit without assigning the profile to the current operator. If you have created or
edited a profile and clicked Save As those changes are saved.

Configuring Rapid Reader Access


GMS features "rapid access" readers for operators. Rapid access provides a way of granting single access through a
reader from a single click in the Card Access Manager (see Using GMS - Operator Guide, Understanding the Card
Access Manager Interface). GMS Web Client operators can send a range of commands to their rapid access readers
(see GMS Web Client - Operator Guide, Sending Commands to Readers).
1. In the [second] Operator Setup dialog box click Rapid Access. The Rapid Access Button Configuration dialog
box opens.

2. In the Site No field, enter the site number.

26 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Click Search to open the site map for the site, where you can see the reader locations and their ID numbers.
3. In the Reader No field, enter the reader ID number.
4. Click Add. The site and reader information appears in the Configured Buttons list.
5. When you have added the rapid access readers, click Update to update the GMS database with the changes.
6. Click Close to exit the dialog box.
To remove a rapid access reader, select it in the Configured Buttons list, then click Delete.

Customizing GMS Operator Menus


GMS provides users with the means to configure the entire security network (that is, the Base Station and the various
devices attached to it). To further protect the integrity and configuration of your system, you can specify exactly the
menu commands and toolbar icons operators can access in all GMS modules (for example, on a need-to-use basis).
When you customize menus for an operator, only the specified menus and commands are displayed when they are
logged on. All other commands will not be available to the operator.
To configure operators customized GMS menus proceed as follows:
1. Click the Customize tab and configure the operator privileges according to the following table.

Parameter Description
Templates A list of available templates containing different groupings of access to the
module menus. Highlight one template and click (set active template) to give
this operator this menu access.
Click to assign the selected template in the Templates list to this operator.
Click to remove the template displayed in the Active Template field that the
operator is currently assigned. This leaves the operator without access to all
GMS menus. Choose a new template to assign from the Templates list.
Click to copy data from the selected template in the Templates list to the
template displayed in the Active Template field. When you create a new
template you can use an existing template as a foundation for the new one.
Click to copy data from the template displayed in the Active Template field to
the selected template in the Templates list.
New Click to open the Template Name dialog box, where you enter a name for the
template. The template then appears in the Templates list for editing. You can
copy an existing template by clicking and make additional changes, or create
from scratch.
Delete Click to delete the highlighted template in the Templates list. A confirmation
box will be displayed.

Note: If you delete a template that is assigned to other operators they


will be left without access to all GMS menus.

Active Template The template this operator is currently assigned.

Chapter 1 - Configuring the System | 27


Configuring GMS - Administrator Guide

Parameter Description
Available Windows A list of the GMS modules and their settings for the template displayed in the
Active Template field. Each module represents a part of GMS that, when
selected, the operator will be able to interact with.
Customize Click to alter the highlighted module in the Available Windows list. The
settings are made in the Customize Menu dialog box.
Print Click to print the current operator account. A report will be created displaying
all personal details, a list of all privileges and authorizations, the menu options
available to the operator and the configured partition.

2. To create a new template click New and enter an appropriate name in the Template Name dialog box, then
click OK.
3. In the Templates list make sure your new template is highlighted and click to enter the template in the
Active Template field.
4. In the Available Windows list highlight the GMS module you wish to add to this template and click Customize.
The Customize Menu dialog box opens.

Parameter Description
Original Menu Lists the menu options available to choose from in the current module. Click
to expand the menu and to collapse.
Customized Menu List the menu options chosen to be accessible in the current template.
Add >> Click to copy a single highlighted menu item in the Original Menu list to the
Customized Menu list to become part of the template.
Add All >> Click to copy all items in the Original Menu list and their sub-options to the
Customized Menu list to become part of the template.
Remove << Click to remove the highlighted menu item in the Customized Menu list from
the template.
Print Customized Menu Click to print the current template. The Windows Print dialog box opens. This
prints a list of the menu options accessible in this template.

5. Add the desired menu items to the Customized Menu list and click OK.

Note: A recommended minimum is to add the entire &File menu to the new template.

6. Repeat previous steps with the GMS modules you wish to add to the new template. Click OK to accept the
customized menu, or Cancel to exit without making changes.

Note: The Customized Menu list is how the GMS menu will be displayed when the operator is logged on.
Click OK to assign this template to this operator. Click Cancel to save the new template in the Templates
list without assigning it to the operator.

Configuring Operator Partitioning


Partitioning refers to limiting the access an operator has to card readers, time schedules, card types and card groups.
This prevents them from interacting with parts of the system that they do not need to.

Note: This tab is only visible if the Enable Operator Partition check box under System Parameters -
Access Control 13 tab has been selected.

28 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

When you set partitioning for an operator, only the specified items will be available when they are logged on. All other
commands will not be available to the operator.
To configure operators customized GMS menus proceed as follows:
1. Click the Partitioning tab and configure the operator partitions according to the following table.

Parameter Description
Readers Click and select an existing Reader Groups to choose a reader partition for this
operator.
Time Zones Click on the drop-down list of existing time zones to choose a time zones
partition for this operator.
Card Types Click on the drop-down list of existing card types to choose a card partition for
this operator.
Card Group Click on the drop-down list of existing card groups to choose a cardholder
groups partition for this operator.
Click to create a new partition using the Partition dialog box.
Print Click to print the current operator account. The Windows Print dialog box opens.
This will print all personal details, a list of all privileges and authorizations, the
menu options available to the operator and the configured partition.

2. Choose a partition for each group from the appropriate lists. If the required partition has not been created, you
can do so by clicking . For the Readers, Time Zones and Card Types groups the Partition dialog box will
open.

Parameter Description
Name Enter a name of the new group you wish to create, or select an existing one
from it. Min. = 1, max. = 63 alpha numeric characters.
Save Click to save the new group you named in the Name field.

Chapter 1 - Configuring the System | 29


Configuring GMS - Administrator Guide

Parameter Description
Delete Click to delete the group that is currently displayed in the Name field. It will
affect all operators that have been assigned a partition that includes that
group. A confirmation pop-up displays to give you a chance to change your
mind before deleting.
Available Displays all available entities that you can create a new group from.
Selected Displays the entities that you have chosen for this new group.
< Click to add the selected item in the Available list to the Selected list so it
becomes part of the group you are creating.
> Click to remove the selected item in the Available or Selected list so it is no
longer part of the group you are creating.

3. In the Name field, enter a name for the group.


4. In the Available list, select the entities that will constitute the new group. Select an entry and copy it to the
Selected list (or remove it) by clicking < or >.
5. Click Save to save the group.
To add a new partition to the Card Group click to open the Cardholder Group Configuration dialog box.

Parameter Description
Enter Group Name Enter name of the new group you wish to create, or select an existing one from it.
Min. = 1, max. = 63 alpha numeric characters.
Save Click to save the new group you named in the Enter Group Name field.
Enter Range Enter the site range numbers that will be covered by this group. To enter several
ranges, separate them with a comma (,). For example, for site ranges of 1 to 25 and
31 to 50 enter "1-25,31-50".
Delete Click to delete the group that is currently displayed in the Enter Group Name field. It
will affect all operators that have been assigned a partition that includes that group.
A confirmation pop-up will be displayed to give you a chance to change your mind
before deleting.
Apply Click to update the group that is currently displayed in the Enter Group Name field
with the current settings.

1. Choose an existing cardholder group from the Enter Group Name list. Alternatively to create a new cardholder
group, enter a name in Enter Group Name field.
2. Enter the range of sites in the Enter Range field. Click Apply and OK to exit to the dialog box.

Note: In the Operator Setup dialog box, click Cancel to exit without assigning any groups to the current
operator. If you have created or edited a group and clicked Save, those changes will still remain.

When finished, click OK to assign the operator properties and exit the [second] Operator Setup dialog box. Then,
click Close to exit the Operator Setup dialog box. The changes you have made to the operator are saved.

30 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring Administrator Accounts


To create and configure a GMS administrator account, proceed as follows:
1. Click the Privileges tab. Privileges determine how users can interact with GMS. You can use privileges to
restrict users from parts of the system that they do not need to access, or should be able to change (see
Operator Privileges Reference 32 ).

2. To create the administrator profile, in the Profiles field, enter a new profile name. For example, "Master" or "
Administrator".
3. To assign the profile all privileges click Select All.
4. To assign the privileges full access modes, under Modes enable the View, Edit and Execute options.
5. Click Apply to assign the privileges the combination modes you selected.
6. Click Save As. The privileges and authorizations you have assigned will be automatically saved as a new profile
under the profile name you entered in the Profiles field.
7. Click OK to assign the current operator the profile and close the dialog box.
8. Click Close to exit the Operator Setup dialog box.
The master/administrator operator can now create all other operators and assign them restricted privileges and
access.

Chapter 1 - Configuring the System | 31


Configuring GMS - Administrator Guide

Operator Privileges Reference


GMS uses a scheme, known as privileges, to determine how users interact with GMS. You can use privileges to
restrict users from parts of the system that they do not need to access, or should be able to change (see Configuring
GMS Operators 21 ).
The following table outlines each privilege and its function.

Privilege Function
ADDRESS BOOK [Main Privilege] Edit information in the Address Book
CARD ACC MANAGER [Main Privilege] Access Card Access Manager
CD ACC Mgr: Cards: Access Level Templates Create Access Level templates
CD ACC Mgr : Cards : Access Levels Edit Edit card access levels, assign GRGs, GAGs and
FALs etc
CD ACC Mgr : Cards : Add Button Create new and temporary cards, also copy and
replace cards
CD ACC Mgr : Cards : BADGE [Main Privilege] Print cards (badges) and upload images to into the
cardholders details
CD ACC Mgr : Cards : Badge: Badge Layout Change and create badge formats
CD ACC Mgr : Cards : Badge: Capture Photo View images captured in cardholders details, and
upload picture into a cardholder details tab
CD ACC Mgr : Cards : Badge: Capture Signature Capture a signature of a cardholder
CD ACC Mgr : Cards : Badge: Encode Layout
CD ACC Mgr : Cards : Card Status Edit Change the status of a card. For example, Blocked,
Valid etc
CD ACC Mgr : Cards : Delete Button Delete a card and cardholder information, also
return a temporary card that has been assigned to
a cardholder
CD ACC Mgr : Cards : Download Card Button Download cards to Controllers and access to the
Card Access Manager Parameters menu
CD ACC Mgr : Cards : Edit Details TAB Edit the card number, issue number and facility
code of new cards and printed number, PIN, duress
PIN and user type of existing cards
CD ACC Mgr : Cards : Edit Expiry Date Edit the expiry date of a card
CD ACC Mgr : Cards : Edit Personal TAB Edit data in the Card Access Manager, Personal tab.
For example, name, address etc
CD ACC Mgr : Cards : Flags : Exec Operation Ability to assign the Executive Operation Selection
user flag, to be assigned to a cardholder
CD ACC Mgr : Cards : Flags : User Flags Modify user flags, so the cardholder has more
limitation or extra privileges assigned to the card
CD ACC Mgr : Cards : User-defined TABs Edit Edit the user-defined fields of cardholders
CD ACC Mgr : Cards : GAG Delete Delete GAGs
CD ACC Mgr : GRG/GAG/FAL (TAB Displayed) Edit the GRG, GAG and FAL configurations and add
single readers to a cardholders access levels
CD ACC Mgr : Parameters : Download To All Sites Download a card to all the sites
CD ACC Mgr : Reports : Create Card Reports Create reports on card access
CD ACC Mgr : Reports : Print Database Print cardholder and card reports
CD ACC Mgr : SEARCH (TAB Displayed) Search for a card or range of cards that match the
specified operator criteria
CD ACC Mgr : Search : Bulk Update Cards Update the details and card information of a group
of cardholders found in a search
CD ACC Mgr : Setup : Card Type Templates Change the card type associated with cards
CD ACC Mgr : Setup : Customize Card Access Modify Card Access Manager layout, menus, field
names and add custom fields etc.
CD ACC Mgr : TIME ZONE (TAB Displayed) Edit time zone (time schedule) information, for
assignment to FALs and GRGs
CD TRANSACTION MANAGER [Main Privilege] Access Card Transaction Manager to view
transactions that have occurred to or from
cardholders
CPU CARD PARAM [Main Privilege] Access CPU card parameters menus
CPU Card Param : Commands Send commands to the CPU card
CPU Card Param : Config : Diagnostics Modify diagnostic functions for CPU, Cascaded CPU,
Remote CPU, Line card and Bkup card

32 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Privilege Function
CPU Card Param : Config Parameters Modify parameters such as database type, test
report time, etc
CPU Card Param : Dial-in Params Edit the min, max and extra time for dial in
parameters
CPU Card Param : Error Statistics View and reset CPU card error statistics
CPU Card Param : Keypad IDs Modify keypad parameters such as inactivity
timeout and maximum log on attempts
CPU Card Param : Misc Parameters Edit the protocols used on the ports on the CPU
card
CPU Card Param : Port Parameters Edit port parameters, such as the protocol and
baud rate used
CPU Card Param : Port Protocols View the protocols that have been set on each port
of the CPU
CPU Card Param : Trend BMS Params Modify idle timeout, add LF to CR and incoming call
to ASCII x28 ports enabled options
Customize Menu On All Screens Customize menus within GMS
Desktop : Edit System Files Edit GMS system files
Desktop : File : Authorization Code Edit the authorization username and password
Desktop : Help : Run Fixed Demo Run a fixed demo
Desktop : Help : Run Random Demo Run a random demo
Desktop : Options : Backup System Files Backup system files to a location
Desktop : Options : Restore System Files Restore previously backed up system files
Desktop : Setup : Config Holidays Configure the holidays settings
Desktop : Setup : PCP times Edit the PCP time parameters
Desktop : Setup : PSP times Edit the PSP time parameters
Desktop : Setup : Site Map Database Table Update the site map database table
Desktop : Setup : System Parameters Configure settings in the Options - System
Parameter Configuration dialog box
Desktop : Setup : User-defined Words Edit custom text
Desktop : System Shutdown Close GMS
Desktop : Task Switching Allow Microsoft Windows ALT + TAB to switch
between programs running on the system
DIAL CARD : COMMANDS [Main Privilege] Send commands to Controllers though dial cards
DIAL CARD PARAM [Main Privilege] Access dial card configuration menus
Dial Card Param : Error Statistics View error statistics
Dial Card Param : Heartbeat Times Edit heartbeat parameters
Dial Card Param : Line Error Statistics View line error statistics
Dial Card Param : Line Parameters Edit line parameters
Dial Card Param : Modem Parameters Edit line protocols, modem type, dial type and
telephone number
EVENT MANAGER [Main Privilege] Access Events Manager
Event Mgr : Action Alarms Button Action an event to complete it
Event Mgr : COMMANDS : Group Commands Send a group command to Controllers
Event Mgr : CONFG : Verification Code Has the option to use verification code
Event Mgr : CONFG : Event Dispatch Scheme
Event Mgr : Config : Message Priorities Configure alarm priorities for the Events Manager
Event Mgr : Config : Priority Data Configure the alarm priority. For example, colors
and the number that indicates severity of the event
Event Mgr : Configure : Config Text-To-Speech Configure the Text-to-Speech for the Events
Manager
Event Mgr : Configure : Customize Keyboard Customize the keyboard keys to perform actions in
the Events Manager
Event Mgr : Configure : General Instructions Create a general instruction
Event Mgr : Configure : Informational Priority Configure the Informational Priority field in Events
Manager
Event Mgr : Event Action : Canned Responses Complete the event with a log of the operators
actions (canned response). For example, "Called
police".
Event Mgr : Event Action : Clear All Events Clear all events that occur on a site

Chapter 1 - Configuring the System | 33


Configuring GMS - Administrator Guide

Privilege Function
Event Mgr : Event Action : Event Cause Etc Sel Use the drop down boxes (lists) in Event
Completion reports
Event Mgr : Event Action : Save To Template Copy text inserted into certain dialog boxes into
templates
Event Mgr : Group Action Button Complete a group of events that match the criteria
the operator inserts into a query
Event Mgr : Move Button Move events to specific operators or workstations
Event Mgr : No-Action Button Complete a event with no action performed
Event Mgr : Suspend Button Suspend a event to be completed at a later date
Event Mgr : View : Server Logon Info View a list of workstations connected to the server
Event Mgr : View : Workstation Events View workstation events
Hardware Param : Program Controller Address Change Controller physical address
Hardware Param : EXE SYS CMD : Broadcast Cmds Send a broadcast command to all Controllers
connected to GMS
Hardware Param : EXE SYS CMD : User Def Cmds Execute a user-defined command
Import Database (Maps, Card Access etc) Import card access databases and site map files
LINE CARD/BKUP CARD [Main Privilege] Access line card menu
Line Card/Bkup Card : Accounts Add, delete and edit Controllers connected to line
cards
Line Card/Bkup Card : All Accounts Download Download software from line cards
Line Card/Bkup Card : All Accounts Upload Upload Software to line cards
Line Card/Bkup Card : Commands Perform commands on line cards
Line Card/Bkup Card : Error Stats View and reset line card port errors
Line Card/Bkup Card : L/C Controllers Status View line card Controller status and edit Controller
account details
Line Card/Bkup Card : Line Card Status View protocols used on line card ports
Line Card/Bkup Card : Line Commands Perform software commands on line cards
Line Card/Bkup Card : Parameters Edit line card database, dialup, dialup hardware,
Controller sessions, PSP/Controller/Lines and
modem parameters
MESSAGE BOARD [Main Privilege] Access Message Board to send, receive and
acknowledge messages
Misc Field Status Change
NETWORK STATUS MGR [Main Privilege] Access Network Status menu
OPERATOR CONFIG [Main Privilege] Edit the details tab in Operator Configuration menu
Operator Config : Customize Desktop (TAB Disp) Ability to customize the desktop in Operator
Configuration menu. Controls operators ability to
use docking and customize the appearance of
dockable panes
Operator Config : User Privileges (TAB Disp) Configure privileges for GMS, to be assigned to
operators
Operator Config : Edit Site Group(s)
Controller EXE SYS CMD [Main Privilege] Access Controller System Command menu and
execute commands
Controller Exe Sys Cmd : Info Request Commands Request information from the Controller. For
example, the serial number
Controller Exe Sys Cmd : Other Commands Execute the user-defined commands
Controller Exe Sys Cmd : Reset Commands Perform multiple reset commands on Controllers.
For example, Reset Comm errors
Controller Exe Sys Cmd : Restart Commands Perform restart commands also configure which
software chip to make active
Controller Exe Sys Cmd : Time Zone Commands Set Controller timezone
Controller PARAM [Main Privilege] Access Controller Parameters menu
Controller Param : Advance Button Edit PSP process timeout parameters
Controller Param : Alarm Parameters Access to the RAP configuration for Controller menu
Controller Param : BMS Config Configure Controller BMS parameters
Controller Param : Card Access Config Configure card readers connected to Controllers
Controller Param : Comms Parameters Access to the setup wizard (not available) for the
Controller

34 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Privilege Function
Controller Param : Get Diagnostic Stats View Controller diagnostic statistics
Controller Param : Get Controller Status View the Controller configured parameters
Controller Param : Get Software Ver No. View the software versions in the Controller chips
and which one is operational
Controller Param : Literals
Controller Param : Port Parameters Modify Controller port parameters
Controller Param : RAP Config : Hours Configure standard week working hours
Controller Param : RAP Config : Hours : Temp Hours Configure weekly temporary schedules and the
modes assigned to the schedule
Controller Param : RAP Config : Temp Schedule/IDs Access to the Comms Parameters menu in
Controller parameters
Controller Param : RAP Config : User IDs Configure area access and entry access
permissions for ID types/groups
Controller Param : RAP Config : Yearly Calendar Configure days in the year to have a mode applied
to it, and the areas it will apply to
Controller Param : RAP Type Change the RAP type configuration
Controller Param : Controller Templates Edit, download and upload Controller configuration
templates
Controller SOFTWARE COMMANDS [Main Privilege] Access Controller System Command menu and
execute commands
Controller Software Commands : Download Software Download software to Controllers
Controller Software Commands : Load Software Files Load software from Controllers
Controller Software Commands : Upload Software Upload software to Controllers
SITE MAP [Main Privilege] Edit site maps
Site Map : Alarm Point Statistics View error statistics for alarm points and print
statistics
Site Map : Card Reader Commands Perform commands on card readers. For example,
acknowledge, unlock, isolate etc
Site Map : Day Mode Change Command Change sites to Day mode
Site Map : Delete Site Maps Delete site maps
Site Map : Edit : Edit Guard Tour Edit guard tours
Site Map : Edit Alarm Point Data Create new alarm points and edit existing point
data
Site Map : Edit Operator Instructions Add operator configured callout lists
Site Map : Edit Point Group(s) Edit alarm point groups for performing group
commands on them
Site Map : Night/RA Mode Change Commands Change sites to Restricted Access and Night mode
Site Map : Other Mode Change Commands Change sites to Test, ATM, Cleaner, Maint,
Engineering, Sub Area and Patrol modes
Site Map : Point Isolate Commands Isolate and de-isolate input points
Site Map : Point On/Off Commands Turn on and off output points
Site Map : Point Soak/Unsoak Soak/unsoak alarm points
Site Map : Point View Selection in Site Map
Site Map : Site Contacts Edit site contact data
Site Map : Site Data Edit site data
Site Map : Video Camera Selection Access DVR menu, and connect to sites with DVRs
connected to it
Spare
Spare
Summary Manager [Main Privilege] Access Summary Manager
Summary Mgr : Acknowledge Alarms Acknowledge events
Summary Mgr : Edit Summary Colors Change Summary Manager colors
Summary Mgr : Edit Summary Layout Edit Summary Manager screen layout
Summary Mgr Access : Options : Sys Time Set Broadcast GMS system time to all connected
Controllers
SYSTEM TASKS [Main Privilege] Create, modify, and view system tasks
TRANSACTION MANAGER [Main Privilege] View logs created in GMS and access the
Transaction Manager
Transaction Mgr : Log : Print Log Files Print log files

Chapter 1 - Configuring the System | 35


Configuring GMS - Administrator Guide

Privilege Function
Transaction Mgr : Log : Print Report Files Print report files
Transaction Mgr : Log : Delete Log Files Delete saved log files
Transaction Mgr : Report : Create Net Elem Rpt Create Network Element reports
Transaction Mgr : Report : Create Opr Actn Rpt Create Operator Action reports
Transaction Mgr : Report : Create Site Report Create Site reports
Transaction Mgr : Report : Delete Report Files Delete report files
Transaction Mgr : Report : Restore Log Files Restore previously backed up log files
Transaction Mgr : Setup : Cfg Msg View Filters Configure Transaction Manager message filters to
display only selected message types
Transaction Mgr : Setup : Cfg Msg Log Filters Configure Transaction Manager message filters to
log only selected message types
Transaction Mgr : Setup : Edit Message Files Edit Transaction Manager message files to display
custom messages
View Alarm/Card PIN codes Can view actual user PIN codes instead of seeing
asterisks (*)
VISITOR MANAGER [Main Privilege] Access Visitor Manager
Visitor Manager : Add Visitor Badge Create new cards, input personal data and save
cards
Visitor Manager : Delete Visitor Badge Delete visitor cards and information
Visitor Manager : Edit Visitor Badge Edit previously created visitor cards and
information
Visitor Manager : Print Visitor Badge Print visitor cards

36 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring Alarm/Event Message Priorities


All alarms and event messages in GMS are assigned a level of priority, which is number based from 1-32. The priority
is generally used to indicate the level of security risk an event represents, with the higher the priority number, the
more urgent the event is. Priority numbers can also be used to categorize various types of alarm messages.
Priority is displayed in the Events Manager and Transaction Manager when the system generates a message, for
example, when a switch has been tripped. This helps operators to assess the security risk of the situation at a glance,
and action the situation accordingly. In the Events Manager, messages with higher priority appear at the top of the
list.

Note: GMS recognizes only alarms or events for the purposes of response and/or other action if they have
a priority greater than 0.
Priority order for UL installations needs to be:
1. Industrial supervision where there is a risk of injury to persons, damage or destruction of property.
2. Hold-up or panic alarm.
3. Burglar alarm.
4. Watchman tour.
5. Burglar-alarm supervision.
6. Industrial supervision where a risk of injury to persons, damage or destruction of property will not be
involved. See UL 1076 for further details.

GMS allows you to assign a level of priority to different types of GMS alarm messages. The overall number of
available priority numbers (1 - 255) is set in the Options - System Parameters Configuration dialog box (see
Configuring System Parameters 9 ).

Caution: You must restart GMS after changing the number of priorities setting to apply the settings and
maintain normal operation.

Alarm message priority is also used with the delayed alarm notifications feature. For this feature to function, the
priority of messages from delayed alarm points must be set to use priority "0" in order for the message to be
recognized as an alarm to delay (see Setting Up Delayed Alarm Notifications 126 ).

Configuring Message Priorities


To configure message priorities, proceed as follows:

1. In GMS, click to open the Events Manager. Click Configure, then select Message Handling. The
Message Handling Configuration dialog box opens.

2. Click the Message Category list to display the available alarm message categories. These categories indicate a
group of alarms and can be used to determine the alarm priority. For example, the external alarm category
would be given, say, a higher priority than the status message category. By grouping messages together and
giving the group a set of priorities, you make the task of setting priorities at a later stage easier. Select a
category from the list.
3. In the Message list, select a description of the event/alarm type you want to add to the category. This
description will appear in the Events Manager, and indicates the type of alarm to the operator, who can then
perform the appropriate action required.
4. In the Message Group list (if available for the category), select an option. Messages are grouped together with
alarms of similar types.

Chapter 1 - Configuring the System | 37


Configuring GMS - Administrator Guide

Note: For most message group categories you can also set or create operator response procedures to
associate them with (see Creating and Managing Operator Response Procedures 54 ).
You can create custom message groups - the system supports up to 1024. To create a message group,
enter its name in the Message Group list. When you click another control in the dialog box, the custom
message group is added to the Message Group list.
There is a limitation to the number of message groups and user-defined reports, in that you cannot create
user-defined reports that reference any message group beyond the first 255 in the list (you can view the
list from the Transaction Manager by selecting Options > Edit Message Files to open the Edit System
Files dialog box, then selecting External Alarm Groups from the File Selection list and clicking OK).

5. In the Priorities section, enter the relevant mode/status priorities for the message/alarm group. The mode/
status options applicable to different objects (messages, devices etc) are listed above the entry fields, so you
can see which options apply to each object type. To use the same priorities as those displayed by another
Message Category entry, select the Message Group from which you want to copy alarm priorities, then click
Copy. Select the new Message Category entry to which you want to copy the priorities, then click Paste. The
priorities will be displayed in the Priorities section.
6. To print a copy of the priorities configured for each alarm, click Print.
7. To set alarm/message priorities for another Message Category entry, follow previous steps.
8. Click OK to save these changes and exit, or Cancel to exit without saving.

38 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring How Event Priorities Display


When a priority have been assigned to a message type (see Configuring Alarm/Event Message Priorities 37 ), you can
customize their Events Manager display appearance. This can assist operators by further emphasizing priority and
making certain message types visually recognizable by color. For example, displaying high priority messages in red.
You can also make some message types flash.
You can also use this command to configure the action response time required by an operator for specific events
before GMS displays a reminder.

Configuring the Display Colors and Sounds for Event Priorities


To edit the appearance of event priority data, proceed as follows:

1. In GMS, click to open the Events Manager. Click Configure, then select Event Priority Configuration.
The Priority Configuration dialog box opens.

Available priorities are displayed in the Priority No. column. To scroll through priority numbers click << or >>.
The total number of priorities available is shown under the list. The default setting is 32. You can increase this to
up to 255 (see Configuring System Parameters 9 ).
2. To change the color of an input point symbol on the Site Map, click the color box of the corresponding priority
in the Input Point Alarm Color column and select the new color from the color picker that appears.
3. To change the color of an event message as it will be displayed in Events Manager, click the color box of the
corresponding priority in the Alarm Message Color column and select the new color from the color picker that
appears.
4. To make an event message of a specific priority flash (this may indicate a high priority), enable the Alarm
Message Flash option for the corresponding priority number.
5. To display more options for the appearance of alarm/event messages, click Options. The Event Summary
Options dialog box is displayed.

Chapter 1 - Configuring the System | 39


Configuring GMS - Administrator Guide

Parameter Description
Event Sorting Select for descending order. Un-select for ascending order.
Higher the No., Higher Event priorities are numbered between 1 and 256. Select to set the highest
the Priority event priority to 256 and the lowest to 1. Do not select to set the highest
event priority to 1 and the lowest to 256.
Highlight Last Event Select to highlight the last occurred event in the Events Manager. If the site
has many events occurring at a rapid pace then the highlight will move across
the screen accordingly.
Put Operator Select to add displayed operator instructions for that specific event in the
Instructions in the Log event log. Useful to cross check what an operator did and what they are
suppose to do.
Do Not Create Separate A Controller can be separated into multiple areas. If this option is selected,
Event for Areas GMS would create one event for all alarms from all areas of every site or else
separate event for alarms from different areas of each site. Also, when
selected, site contact and site data are not editable for area maps.
Display Cardholder Name When selected, the events created from card messages would display the
cardholder name, rather than card number.
Min Chars in Event Minimum amount of characters required in the event report. Min.= 0, max.=
Report / Message Text 255.
Move Cursor to Point Enable to automatically snap the operator mouse cursor to the point in alarm
When Actioning Alarm in the Site Map View when they action an alarm.

Note: The Site Map View displays automatically on actioning an


alarm event.

Deadman Timeout If enabled by a workstation operator at login, it will at pre-set time intervals
sound a signal and require the operator to respond with a keyboard or mouse
action within the pre-set time period or GMS will log that workstation off. Min.
= 0, max. = 255.
Show New Event Alert A New Event Alert dialog box pops up on screen for events with a priority
box for event priority greater than or equal to the inserted value.
greater than
Informational Priority This setting is provided for testing purposes only and will causes any alarms
with this priority to not create events. Test engineers can create alarms for
operators to monitor to test correct priority allocation without events being
logged. Min. = 0, max. = 255.

Caution: Only qualified system administrators should set this value


as it may affect overall alarm operation. A separate user privilege is
required to edit this field.

Priority for Unconfigured If an event occurs from a point that has not been positioned on a map it
Points receives the priority stated here. Min. = 0, max. = 255.
Unsuspend Event with A suspended event gets unsuspended (and added to the unactioned event
Alarm Priority >= list) either when an alarm with higher priority than the current event is
received or when the new alarm priority is higher than or equal to this
programmed value. Min. = 0, max. = 255.
Event Escalation Amount If this value is not zero, then every time an event times out, its priority will
be increased by the entered amount until it reaches the maximum value. Min.
= 0, max. = 255.

6. Enable the options you want to use, then click OK to save these changes, or Cancel to exit without saving.
7. You can place a limit on the operator response time required to action an event of a specific priority. To do this,
in the Times tab, enter the time in the appropriate Time To Action field. If an operator fails to action an alarm
within the specified time, a warning will remind them to do so. A value of 0 means that the operator is not
required to acknowledge the alarm. The time limit can be set from 0 to 255 minutes.
8. When a time is indicated in the PNR (Point Not Reset) Time field, an event is generated if the alarm is not reset
within the allotted time.
9. To play a sound for alarm situations of specific priorities, click the Sound tab and:

For a voice message, in the Voice Text field next to the corresponding priority number, enter the text that
you want played. This requires the Microsoft Text to Speech engine to be installed.

40 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

For a beep, enter the Beep Frequency and the Play Count in the relevant fields next to the corresponding
priority number.

Note: The Play Count field indicates the number of times a beep or an allocated sound (WAV file) will
play when an event is displayed in Events Manager. If the Play Count is set to 0 or 1, the WAV file will
be played once. If the Play Count is set to 255, the WAV file will play continuously until the event is
actioned or the operator manually stops the sound.

For a WAV file, in the Change WAV column click ... for the corresponding priority number. The Windows
Open dialog box opens, where you can browse to and select the file. Click Open to apply the setting and
close the dialog box. The file name displays in the WAV File Name column. Click to listen to the file.

Note: WAV files are copied from their original location to the GMS/Customer/Sounds folder.

10. To print a record of the priority event display settings in your system, click Print.
When finished, click OK to save the changes and exit, or Cancel to exit without saving.

Chapter 1 - Configuring the System | 41


Configuring GMS - Administrator Guide

Configuring the Event Dispatch Scheme


The event dispatch scheme represents the order of GMS workstations to which events are directed to be actioned, as
they occur. This means that as soon as an alarm occurs, it is displayed on the operator screen that is indicated by
the scheme.
By specifying the criteria used to dispatch events to operators, you can ensure that events of a higher priority and
security risk are actioned by selected personnel. Events of lesser priority can be sent to any operator to be actioned.

Configuring an Event Dispatch Scheme


To configure the event dispatch scheme, proceed as follows:

1. In GMS, click to open the Events Manager. Click Configure, then select Event Dispatch Scheme. The
Event Dispatch Scheme Configuration dialog box opens.

2. In the Event Dispatch Criteria region, select the method to use for dispatching events to operators according
to the following sections.

Parameter Description
Event Priority GMS dispatches events according to their priority number.
Last Done GMS dispatches events to the last operator to action an event.
Round Robin GMS dispatches events evenly among the operators one at a time.
Alarm Type GMS dispatches events according to the type of alarm.
Site Time Zone GMS dispatches events according to the time zone of the site sounding the
alarm.
Site Security Level GMS dispatches events according to the security level of the site sounding the
alarm.
Workstation Type GMS dispatches events according to the type of GMS workstation being used,
such as Supervisor and Alarm Monitoring (see Managing GMS Workstations
78 ).

Site Group GMS dispatches events according to the site group of the site sounding the
alarm.
Default Workstation No. Enter the number of the default workstation to which events will be dispatched,
if the first or next preferred workstations are unavailable or not set.
Test Site Workstation When a site is set to test, all events from that test go to the workstation that is
No. selected here.
Trace Site Workstation Enter the workstation number that will receive all events from any sites set to
No. Trace mode (see Using GMS - Operator Guide, Understanding the Site Map
View Interface).

42 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Using Event Priority


Parameter Description
Event Priority The events are processed on the criteria of their event priority.
First Preferred The workstation group preferred to process the event from that event priority.
Workstation
Next Preferred The workstation group that is the second choice to process the event from that event
Workstation priority.

To configure the Event Priority criteria, proceed as follows:


1. Select a workstation group in First Preferred Workstation field that will process the event. The event will be
dispatched to this group first.
2. In Next Preferred Workstation field, select the workstation group that will process the event if the First
Preferred Workstation is unavailable.
3. To modify the workstation groups click Edit. The Workstation Groups Configuration dialog box opens.

4. Workstation groups are divided into groups of two or more consoles. Enter a new group name in the Enter
Group Name field and then enter a range in the Enter Range field. To enter several ranges, separate them
with a comma (,). For example, for workstation ranges of 1 to 25 and 31 to 50 enter "1-25,31-50".
-or-
Select an existing group from the Enter Group Name list to populate the Enter Range field and then rename
the group.
5. Click View All to see all available groups in the CONSOLE Groups dialog box.

6. Select the desired group and click Select. The dialog box closes and the selected console group is now entered
in the Workstation Groups Configuration dialog box Enter Group Name field. Click OK to save.
7. To remove a group select one in the Enter Group Name list and click Delete.

Chapter 1 - Configuring the System | 43


Configuring GMS - Administrator Guide

Using Last Done

1. Select Last Done.


2. Click OK.

Using Round Robin

1. Select Round Robin.


2. Enter the workstations to be included in the Consoles field. To enter several ranges, separate them with a
comma (,). For example, for site ranges of 1 to 25 and 31 to 50 enter "1-25,31-50".
3. Click OK.

44 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Using Alarm Type

1. Repeat the steps in Using Event Priority 42 .

Using Site Time Zone

1. Repeat the steps in Using Event Priority 42 .

Chapter 1 - Configuring the System | 45


Configuring GMS - Administrator Guide

Using Site Security Level

1. Repeat the steps in Using Event Priority 42 .

Using Workstation Type

1. Repeat the steps in Using Event Priority 42 .

46 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Using Site Group

1. Repeat the steps in Using Event Priority 42 .


2. To edit site groups click Edit Site Groups. The Alarm Monitoring Site Groups dialog box opens.

3. To modify the site groups click Select. The SITE Groups Configuration dialog box opens.

4. Site groups are divided into groups of two or more sites. Enter a new group name in the Enter Group Name
field and then enter a range in the Enter Range field. To enter several ranges, separate them with a comma (,).
For example, for site ranges of 1 to 25 and 31 to 50 enter "1-25,31-50".
-or-
Select an existing group from the Enter Group Name list to populate the Enter Range field and then rename
the group.
5. Click View All to see all available groups in the SITE Groups dialog box.

6. Select the desired group and click Select. The dialog box closes and the selected site group is now entered in
the SITE Groups Configuration dialog box Enter Group Name field. Click OK to save.
7. To remove a group select one in the Enter Group Name list and click Delete.

Chapter 1 - Configuring the System | 47


Configuring GMS - Administrator Guide

When finished, click OK to save the changes and exit, or Cancel to exit without saving.

48 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring Alarm Event Management & Response


Procedure Display Settings
GMS offers several ways of handling how GMS groups alarm messages into events and how operators action events
in the system. The methods involve how the alarm is accessed by the operator and how any response procedures are
actioned.

Note: Legacy mode alarm management applies by default when installing or upgrading to GMS.

Legacy Alarm Management Operation


Alarm event management rules are:
An "event" is classified as one or more alarm messages with a priority > 0 generated at the same site or site/
area.
A new event occurs when the first alarm message for a particular site or site/area is generated.
All alarms generated by GMS itself (that is, not coming from hardware or external sources) are grouped into the
same event.
All individual alarms that comprise an event are grouped into one or more alarm groups.
Messages are assigned priority based on the alarm group they belong to.
Event priority is classified by the highest priority assigned to any message contained in the event.
The following image shows Legacy alarm management, where events are based on site.

Campus Alarm Management Operation


Campus operation refers to a single, large site with several Controllers in it. Examples of this type of installation could
be a university, government building or prison facility.
Alarm event management rules are:
An "event" is classified as one or more alarm messages with a priority > 0 generated by the same source and
having the same function code and alarm type data.
An event source is the actual device generating the event, not the site or site/area. This means that unlike
Legacy mode, more than one event may exist for the same site/area.
A new event occurs when the first alarm from a source, with a particular function code and alarm type is
generated.
GMS internal alarms are not combined into one event.
Two or more alarms are combined into the one event only if their messages (as shown in the Transaction
Manager) are identical. For example:
Two point isolate alarms generated by the same point become part of the same event (point isolate and point
de-isolate alarms from the same point are different events).
Two point isolate alarms generated by different points become two events.
GMS task started and task completed events are different, even if they are associated with the same task.
All card blocked events generated by the same card at the same site are treated as one event. The same
blocked card used at another site will be a separate event.
CPU card online and CPU card offline events are different, even if they are associated with the same CPU card.
All alarms in one event belong to the same alarm group.
Messages are assigned priority based on the alarm group they belong to and that becomes the event priority.

Chapter 1 - Configuring the System | 49


Configuring GMS - Administrator Guide

The following image shows Campus alarm management, where events are based on the event itself and not the site.

Response Procedure Display Options


Along with alarm event management operation, the interface provided by the system to operators for actioning
alarms is also selectable. The following image shows the various regions of the Operator Instructions dialog box that
changes according to the selected display options.

There are several options for alarm event presentation/action, as follows:

Legacy Mode Options


Classic1 and Classic2 - Allows operators to action alarms from the Event Manager and provides the pre-GMS
4.00 dialog boxes for actioning the event and filling out event completion reports. "Classic" operation can be
customized, see Customizing Response Procedure Display Settings 53 .
Simple - Allows operators to action alarms from the Events Manager and provides an Operator Instructions
dialog box that is suitable for faster and less detailed alarm event resolution. This version of the dialog box
includes regions A and B. Operators access the event completion report for a complete and detailed record of
event resolution in a separate dialog box by clicking the Complete button. In this mode, default values are
applied to call status.
Advanced - Allows operators to action alarms from the Events Manager or Site Map View and provides a
more complete Operator Instructions dialog box. This version of the dialog box includes regions A, B and C.
Operators access the event completion report for a complete and detailed record of event resolution in a
separate dialog box by clicking the Complete button.

50 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Campus Mode Options


Simple - Allows operators to action alarms from the Events Manager and provides an Operator Instructions
dialog box that is suitable for faster and less detailed alarm event resolution. This version of the dialog box
includes regions A, B and E. Operators access the event completion report (text only) for a record of event
resolution within the same dialog box. In this mode, default values are applied to call status and event
completion details.
Advanced - Allows operators to action alarms from the Events Manager or Site Map View and provides a
complete Operator Instructions dialog box. This version of the dialog box includes regions A, B, C, D and E.
Operators access the event completion report (text and details) for a record of event resolution within the same
dialog box.

Note: When GMS records the event completion for Simple template response procedures, it automatically
applies the first entry found in the following files to the event completion report information (visible and
selectable using the Advanced template):
For Event Type - Language\xxx\Actions.str (in [Event Types] section).
For Event Code - Language\xxx\EventCodes.str
For Event Cause - Language\xxx\Rescode.str
For Abort Code - Customer\NonOverwrite\AbortCodes.str
You can further customize the default layout of the Operator Instructions dialog box using the Site Map
View, Customize Default Layout dialog box (Tools > Customize Default Layout).

For information on how operators action alarm events, see Using GMS - Operator Guide, Following Response
Procedures.

Selecting a Response Procedure Display Option


To select a response procedure display setting, proceed as follows:
1. In the Events Manager click Configure, then select Response Procedure Settings. The Operator Instruction
Settings dialog box opens.

2. In the Templates list, select a template style, as required.


3. Click OK to save all changes and close the dialog box, or Cancel to exit without saving.

Note: You can rename the templates as required. To do so, double-click the template name. The Edit
Template Name dialog box opens, where you can type in a new name, then click OK to apply it.

Setting Campus Mode Alarm Management


You can set the system to use "Campus" mode alarm management through the GMS32.INI file.

Caution: To prevent any possible loss of alarm event data, it is recommended that all current events are
actioned and completed or cleared before switching to Campus mode.

Note: This setting must be set on the server to apply to all workstations.
It is recommended to set the alarm management mode once only.

To set the system to Campus mode, proceed as follows:


1. On the GMS main server and each workstation, open the GMS32.INI file for editing (see Editing System Data
Files 118 ).
2. In the [System Parameters] section, change the following line as required:

Chapter 1 - Configuring the System | 51


Configuring GMS - Administrator Guide

Campus Alarm Management=yes

3. In the [Instructions] section, change the following lines as required:


0=Classic1
1=Classic2
2=Simple
3=Advanced
Templates=3,2,1,0

4. Save the file.


5. Restart GMS.

Setting Response Procedure Behavior on Alarms


You can set whether or not response procedures pop-up on screen automatically, in the event of an alarm.

Note: This setting must be set on the server to apply to all workstations.

To set response procedure pop-up behavior, proceed as follows:


1. On the server, in the Events Manager, select Configure > Response Procedure Settings. The Response
Procedure Settings dialog box opens.
2. Enable (or disable) the Show Site Map Only (on Alarm Action) option, then click OK.
Enabling this option disables the Response Procedure option in the Site Map View (Tools > Customize
Default Layout) on all workstations.

You can still access the response procedures despite their pop-up feature being disabled. However, this can only be
done through an event. Proceed as follows:
1. In the Events Manager, when an event occurs click Action. The Site Map View opens for the alarm.
2. In the Site Map View, select View > Response Procedures to display the instructions for the point.

52 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Customizing Response Procedure Display Settings


You can alter the font and colors used in response procedures displayed in the Events Manager to make them stand
out, or help identifying contact, etc. You can save changes to the standard templates.

Note: Customization is available in Legacy mode alarm management operation only.

Rather than creating custom operator instructions, a range of response procedures templates are built into GMS that
support GMS 4.00+ and previous versions (which are different).
The system is backwards compatible - you can opt to use the pre-GMS 4.00 Operator Instructions dialog box, or
the GMS 4.00+ Operator Instructions dialog box.
The pre-GMS 4.00 Operator Instructions dialog box supports font and color settings.
Any changes to the settings are based on the operator and is not global to the system. That is, if a template is
changed it does not become the default for everyone.

Note: You cannot create templates. Pacom will provide new templates.

Customizing Fonts and Colors ("Classic" Templates Only)


To change response procedure display settings when using Legacy mode alarm management, proceed as follows:

Note: The "Classic" template options refers to the pre-GMS 4.00 Operator Instructions dialog box, which
supports font and color settings. The Dockable with Reading Pane and Dockable options refer to the
GMs 4.00+ Operator Instructions dialog box, which does not support font and color settings.

1. In the Events Manager, click Configure, then select Response Procedure Settings. The Response Procedure
Settings dialog box opens.

2. Select a Classic Style template to alter from the Templates list, then modify settings for the following, as
required:
Font settings. Click ... to open the Font dialog box, where you can select font, style and size. This applies to
all response procedure types.
Colors for different types of response procedures. Double-click a color indicator for a response procedure
type (for example, Guard) to open the Color Selection dialog box for it, where you can select a new color.
3. Click OK to save all changes and close the dialog box, or Cancel to exit without saving.

Editing Template Names


To edit a response procedure template name, proceed as follows:
1. In the Events Manager, click Configure, then select Response Procedure Settings. The Response Procedure
Settings dialog box opens.
2. Double-clicking the template name. The Edit Template Name dialog box opens.

3. Rename the template.


4. Click OK to save changes and close the dialog box, or Cancel to exit without saving.

Chapter 1 - Configuring the System | 53


Configuring GMS - Administrator Guide

Creating and Managing Operator Response Procedures


You can setup specific instructions for operators to take when different alarm messages appear on their monitoring
computers. Response procedures are also knows as "callout lists". By specifying response procedures, you help
eliminate operator indecision during security events, which speeds up response time and correctness of responses to
the situation.
You can set up response procedures from the Events Manager or from the Map Editor.

Note: there are options for how response procedures are displayed to operators, see Customizing
Response Procedure Display Settings 53 .

Creating Response Procedures


To create response procedures, proceed as follows:
1. In the Events Manager, click Configure, then select Response Procedures for GMS Messages or
Response Procedures for Network Messages.

Note: To create response procedure for alarm message groups (that is, not specifically GMS or network
messages only) from the Events Manager, click Configure, then select Message Handling. The
Message Handling Configuration dialog box opens, where you can select a message group. After selection,
click Response to open the Response Procedure Configuration for Message Groups dialog box, then click
New to open the Response Procedure Configuration dialog box.

-or-
In the Map Editor, select Edit > Response Procedures. The Response Procedure Configuration dialog box
opens.

Parameter Description
Configurable Messages Lists alarm message types for which operator instructions can be added,
modified or deleted.
Global List Instructions common to all sites.
Local List Instructions specific to the site.
Add Click to add the selected global or local instruction to the alarm message.
Edit Click to edit the selected global or local instruction.
Delete Click to delete the selected global or local instruction.
New Click to create a new global or local instruction.
Edit Click to edit the instruction associated to the alarm message.
Delete Click to delete the instruction associated to the alarm message.
Use to sequence multiple instructions associated with an alarm message.

54 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

2. Under Available Instructions select the type of operator instruction to add. A Global List instruction is
available to all sites, while a Local List is available specific to the site.
3. Click New. The Response Procedure Configuration dialog box opens.

4. Select the type of response team the operator should contact in the event of this emergency. Key Holders are
the people entered in Site Contacts.
5. Select a tab and enter relevant instructions.

Tab Description
Telephone Information for calling the response team.
Information Information of specific details to the response team.
Radio Information to radio the response team.
Pager Information for paging the response team.
Note Additional information. Only available when creating a new instruction.

Note: URLs are supported in the following response procedure text fields - Conversation (Telephone,
Radio and Pager tabs), Information (Information tab) and User's Note (Note tab). Operators, when
viewing response procedure can click the URL to perform an action, such as open a web page of document
or run a batch file or application (see Automating Tasks Using Site Maps 183 ).

6. The Telephone, Radio and Pager tabs contain the same type of information. These tabs are mutually
exclusive. Create a separate instruction to add information to more than one of these tabs for an alarm.

Note: Telephone number entry fields can also be automatically filled from Address Book contacts, see
Automatically Applying/Dialling Address Book Telephone Numbers in GMS 71 .

Parameter Description
Phone No./Radio No./ Enter the contact number for the response team. This is the number that the
Pager No. operator must call during the emergency.
Conversation Template Use the Conversation Template as an example of details to include in the
emergency call. Create a template by entering new information in
Conversation and then click Save to Template.
Conversation Enter details the operator must give to the response team during the
emergency call. Can be copied from Conversation Template.
Copy Highlight Conversation Template text, then click Copy. Selected text will
populate Conversation to show what details should be given at time of call.
Save to Template Saves the details in Conversation as a new Conversation Template.
Time to Arrive Enter the time it will take for the response team to arrive to the site.
Action Validity Time If an event occurs outside these times, action is not required by the operator
and the event can be ignored.

Chapter 1 - Configuring the System | 55


Configuring GMS - Administrator Guide

Parameter Description
Place cursor in any of the Start Time text fields. Select the time you want
the Action Validity Time to begin from Time Templates. Click Select.
The selected time is displayed in Start Time.
Place cursor in any End Time fields. Select the time you want the Action
Validity Time to end from Time Templates. Click Select. The selected
time will be displayed in End Time.
Alternatively, you can specify time in the Start Time and End Time text
boxes different from the ones available in Time Templates.

7. Open the Information tab to enter information that can be associated with a response team. For example,
instead of calling the police, the information could be that the guards should go and check a troublesome door
that often does not close properly.
8. To save these details as a new template, click Save to Template.
9. Use the Information Template as an example of details to include in the Information text field. Highlight any
template text, then click Copy. The text will be automatically copied to Information.
10. Open the Note tab to enter general information that is not directly associated with anyone.

11. Existing notes are displayed in Note Templates. Select a note and click Copy to populate the User's Note area
to either create a new note or edit an existing one.
12. When changes have been made to an existing note, click OK.
13. Click Yes to save as a new note, or No to change the existing one.
14. Click OK to save and exit. The new instruction will be displayed under Available Instructions in either the
Global List or Local List, depending on which was selected. This response procedure is now available for
association to a alarm message.

Associating Response Procedures to Alarm Messages


To associate operator instructions to alarm messages, proceed as follows:
1. Open the Response Procedure Configuration dialog box (see Creating Response Procedures 54 ).
2. In the Configurable Messages list, select the alarm message that you want to add operator instructions to.
3. Use the Available Instructions region to add, edit or delete operator instructions for the alarm message.
To associate with an existing local instruction, select Local List, then select an option from the list.
To associate with an existing global instruction, select Global List, then select an option from the list.
4. Click Add to associate the instruction to the selected alarm message. The instruction is displayed in Selected
Instructions for the point. Multiple instructions can be associated to one alarm message.
5. Multiple instructions associated with an alarm message can be sequenced. In Selected Instructions for the
Point select an instruction and use the arrows to shift it within the list. This is to ensure that a set sequence is
followed in response to the alarm.
6. Click OK.

Deleting Response Procedures


To delete a response procedure, proceed as follows:

56 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

1. Open the Response Procedure Configuration dialog box (see Creating Response Procedures 54 ).
2. In the Available Instructions region, select Global List or Local List, then select the instruction from it.
3. Click Delete.
4. Click Yes to delete the instruction record, or No to cancel the action.

Note: Alarms associated with the deleted instruction will lose the information.
If the response procedure you are deleting was associated from the local list with a specific point that has
also been deleted, a dialog box may appear stating "Cannot delete: the action is associated with one or
more points". Hold SHIFT then click Delete to overcome this.

Modifying Response Procedures


To modify an operator instruction, proceed as follows:
1. Open the Response Procedure Configuration dialog box (see Creating Response Procedures 54 ).
2. In the Available Instructions region, select Global List or Local List, then select the instruction from it.
3. Click Edit.
4. Click Yes to continue editing the selected instruction, or No to cancel the action.

Note: Editing instructions will affect all points associated with it.

5. Edit the response procedures as required.

Chapter 1 - Configuring the System | 57


Configuring GMS - Administrator Guide

Creating and Managing General Response Procedures


General operator response procedures represent operator instructions for non-alarm situations, and may include the
appropriate action to take and people to contact, such as telephoning, informing or radioing. Non-alarm situations can
include medical emergencies, bomb threats, natural disasters, etc.
General response procedures are not automatically displayed in the Events Manager when messages occur in the
system. To access general response procedures, operators can view them from the Site Map View by selecting
Actions > General Response Procedures.

Creating and Modifying General Response Procedures


To create or modify general response procedures, proceed as follows:
1. In the Events Manager click Configure, then select General Response Procedures. The General Response
Procedure Configuration dialog box opens.

2. For a new procedure click New.


-or-
To modify an existing procedure, select it from the Response Procedures list, then click Edit. The Response
Procedure Configuration dialog box opens.

3. In the Response Types region, select the appropriate person/agency for the operator to contact in the event of
this emergency (for example, the police).

Tab Description
Telephone Enter telephone details for the selected contact (Response Type selection).
Information Enter any additional information for the selected contact (Response Type
selection).
Radio Enter radio details for the selected contact (Response Type selection).

58 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Tab Description
Pager Enter pager details for the selected contact (Response Type selection).

4. Enter the contact number for the response team in the Phone No./Radio No./Pager No. field (as applicable).
This is the number that the operator must call during the emergency.

Note: Telephone number entry fields can also be automatically filled from Address Book contacts, see
Automatically Applying/Dialling Address Book Telephone Numbers in GMS 71 .

5. Enter the details that the operator must inform the response team of during the emergency call in the
Conversation/Information field (as applicable).
You can use any previously saved template text as a basis for the Conversation/Information field. Select
the required text from the Conversation Template field, then click Copy.
The text will be automatically pasted into the Conversation/Information field. Edit these details as
required. To save these details as a new template, click Save to Template.

Note: URLs are supported in the following response procedure text fields - Conversation (Telephone,
Radio and Pager tabs) and Information (Information tab). Operators, when viewing response
procedure can click the URL to perform an action, such as open a web page of document or run a batch
file or application (see Automating Tasks Using Site Maps 183 ).

6. Enter the time it will take for the response team to arrive in the Time To Arrive field (as applicable).
7. Indicate the times that the operator actions are valid between. If an event occurs outside these times, action is
not required by the operator and the event can be ignored. To indicate these validity times:
Select when you want the Action Validity Time to begin from the Time Templates list. Click Select. The
selected time is displayed in the Start Timefield.
Select when you want the Action Validity Time to end from the Time Templates list. Click Select. The
selected time is displayed in the End Time field.
8. Click OK to save the new settings and close the Response Procedure Configuration dialog box, or click Cancel to
exit without saving changes.
Click Close to exit the General Response Procedure Configuration dialog box.

Deleting General Response Procedures


To delete general response procedures, proceed as follows:
1. In the Events Manager click Configure, then select General Response Procedures. The General Response
Procedure Configuration dialog box opens.
2. Select the instruction you want to delete from the Response Procedures list.
3. Click Delete. A confirmation dialog box opens.
4. Click Yes to delete the instruction, or No to cancel. Click Close to exit the General Response Procedure
Configuration dialog box.
Response Procedures for GMS Messages permits configuration of local operator instructions.

Creating Response Procedures for GMS Messages (Local Alarm


Response)
GMS messages are generated when certain events occur that relate directly to GMS settings. For example, is an
operator fails to log on correctly, or a guard tour has timed out without being completed.
To create general response procedures for GMS messages, proceed as follows:
1. In the Events Manager click Configure, then select General Response Procedures for GMS Messages.
The General Response Procedure Configuration for GMS Messages dialog box opens.

Chapter 1 - Configuring the System | 59


Configuring GMS - Administrator Guide

2. Select a message from the Configurable Messages list.


3. Select Local List.
4. Make any necessary changes.
5. When complete, click OK to save the changes and exit, or Cancel to exit without saving.

Note: When GMS loses communication with the Base Station CPU card it reports an "Off-line GMS Server"
message in the log and creates an event. You can assign a priority to this message (see Configuring
Alarm/Event Message Priorities 37 ).

Creating Response Procedure for Network Messages (Network


Alarm Response)
Network messages are generated when certain events occur that relate to GMS connectivity with hardware devices.
For example, port failure, tamper or battery low.
To create general response procedures for network messages, proceed as follows:
1. In the Events Manager click Configure, then select Response Procedures for Network Messages. The
General Response Procedure Configuration for Network Messages dialog box opens.

2. Select a message from the Configurable Messages list.


3. Select Global List.
4. Make any necessary changes.
5. When complete, click OK to save the changes and exit, or Cancel to exit without saving.

60 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Linking Controller Events to DVRs


You can set particular GMS alarm events, such as a detector sending a signal to a Controller input point, or a forced
entry on a door, to automatically activate a camera(s) and display the video footage through a DVR (digital video
recorder). This way, operators do not have to waste time trying to locate the camera to view video from, when
responding to alarms.

Note: For information on configuring DVRs, see Configuring DVRs and CCTV Cameras 189 .
For some DVRs (for example, Dedicated Micros DS2 series) you may also need to set cameras to activate
on alarm within the DVR application. Refer to the DVR documentation.

Linking Events to DVRs and Setting Record Times


Note: You must perform this procedure for the Transaction Manager to display events from the DVR.

To configure a DVR to link to an alarm event, proceed as follows:

1. In GMS, click . The Summary Manager opens.

2. In the graphical summary screen, right-click the site that you want to change.
3. Select Controller Settings from the context menu. The Controller dialog box for the site opens.
4. In the Controller dialog box, select Alarm > Configure > Hardware. A graphical representation of the
hardware configuration is displayed in the dialog box - this is the "device map", showing the various pieces of
hardware (keypads, I/O devices, etc) attached to the Controller. The Controller alarm parameters for each
device are also uploaded to GMS.

Chapter 1 - Configuring the System | 61


Configuring GMS - Administrator Guide

5. On the device map, click the PCB image for the input device. A graphic of the PCB displays in a new dialog box.
The input points display as a red and white icons ( ).
6. Double-click an input point to configure it. The Configuration for Input dialog box opens.

7. In the Input No. field specify an input number to configure and click Input No.. By default, the selected input
number (step 6) displays in the Input No. field. Alternatively, use Prev and Next to cycle through the available
inputs.
8. Click Outputs to configure the output activations for the input. The Output Activations for Input dialog box
opens.

9. In the Activate During region, select the appropriate modes in which the alarm output is activated.
10. To activate an output, select it from the Select an output or camera list and the click Add Activation. The
output is added to the Activate list and the Activation Duration dialog box for the selected output opens.

Note: The Select an output or camera list will show up to 16 cameras only. To activate a camera that is
logically numbered higher than "16" you will need to use a macro (see Configuring Controllers - Technician
Guide, Creating Event Drivers and Macros).
Ensure that the camera output/device number for the activation represents the correct camera and DVR
you want to use.

11. Select the Time option. Use the following section to set other relevant options.

Control Description
Follow Input Not used in this context.
Latched Not used in this context.

62 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Control Description
Time Select to activate the timer settings.
Hold-On Delay Enabled Not used in this context.
Hold-Off Delay Enabled Not used in this context.
Duration Enter the number of seconds (or minutes if the Activation time in min.
option is enabled) that the camera will be activated for (max. = 6).
Activation time in min. Enable to count the Duration timer setting in minutes instead of
seconds.
Capture Pre And Post Alarm Enable so that the associated DVR stores an amount of video footage
Video immediately before and after the event as part of the event video.

Note: The actual amount of time is set in the DVR application or


INI file, if the DVR supports the feature. Refer to DVR
documentation.

Set Video to Local Playback Enable to activate the DVR local video output when an alarm occurs.
Port
Write video to disk Enable to instruct the DVR to write the event to its hard disk. This option
should always be enabled.

12. Click OK to save settings and close the dialog box.


13. In the Output Activations for Input dialog box, click OK.
14. In the Configuration for Input dialog box, click OK.
15. In the PCB graphic dialog box, click Close.
16. In the Controller dialog box, select File > Download Configuration to save the settings in the Controller.
17. Close the Controller dialog box.

Caution: If the parameters are not downloaded to the Controller before closing the Controller dialog box,
the settings are discarded.

Now, when that particular input is activated, the associated camera will record video and save it according to the
settings.

Linking Inputs to Bosch VIP X Video Encoders for Audio-Visual


Intercom Operation
GMS and Bosch VIP X video encoders can be configured as an audio-visual intercom. In this configuration an input
point activation can be linked to a camera. A reader is also associated with the input to allow GMS operators to
control access. For example, a button at the entry of a premises (the input) is linked to a camera at the entry
(attached to a Bosch VIP X) and a reader to lock/unlock the door. In this example:
1. A person wanting entry to the premises pushes the button. GMS creates an event associated with the button
input point.
2. The operator actions the event in the Events Manager.
3. The DVR dialog box opens showing live video footage of the entry. Audio support allows the operator to talk to
the person.

Chapter 1 - Configuring the System | 63


Configuring GMS - Administrator Guide

4. The Reader Control dialog box is also shown. This dialog box allows the operator to grant or deny access and
close the event in one step (see Using GMS - Operator Guide, Working with DVR Video).

To configure the system for audio-visual intercom operation, proceed as follows:

Note: A Bosch VIP X DVR must be configured and the applicable site map must contain at least one input
point, reader and CCTV camera.
For systems that use a Pacom Witness DVR, audio-visual intercom operation is not available.

1. In the Site Map View or Map Editor, open the Input Point Configuration dialog box for the required point.

2. In the Associated CCTV Camera field, enter the ID number for the camera. The camera must be connected to
the Bosch VIP X video encoder.
3. In the Associated Reader field, enter the ID number for the reader to associate access with.
4. Click OK.

64 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring System Tasks


Some tasks within GMS must be completed on a regular basis. You can configure GMS to automatically run these
tasks, to ensure they are regularly completed. These are known as system tasks, and include such tasks as isolating
points, locking card readers, and backing up system data files.

Viewing and Configuring System Tasks


To configure system tasks, proceed as follows:
1. In GMS, select Tools > System Tasks. The System Task dialog box opens. The dialog box displays a list of
existing system tasks and has tabs to filter tasks due to run today, or already running.

2. To configure a system task, click New Task. The Task Configuration dialog box opens.

3. In the Available Tasks field, enter a name for the new task. You can also select existing tasks from this control
to edit, run or disable them.
4. In the Schedule region, select how often to run the task by selecting an option. You can select from:
Yearly - The task runs once a year. Enter the day and month the task is to be performed each year.
Monthly - The task runs according to the passing of months. Enter the date the task is to be performed.
Select the Recurring every option and enter a value, for example, 3, to repeat the task every three
months.
Weekly - The task runs every week. Select a day the task is to be performed each week.
Daily - The task runs every day. Enable the Include Holidays option to perform the task on holidays as
well.
Holiday - The task runs only on holidays.

Chapter 1 - Configuring the System | 65


Configuring GMS - Administrator Guide

5. In the Schedule Time field, enter the time of day (in 24 hour format) to run the task.
6. In the Unschedule Time field, enter the time of day (in 24 hour format) that task must be finished by.
Leaving this field blank means the task run until completion.
7. In the Task Type field, select the event or task to perform. If you select System Commands, the System
list becomes available.
8. In the Site region, select the site(s) to run the task on (if applicable) as follows:
To run the task at a single site, disable the Group option, then enter a site number in Site No. field.
To run the task over a group of sites, enable the Group option, then select a site group from the Site
Group list. To change a site group name or range, click Select. The SITE Groups Configuration dialog box
opens.
To change a site group name, enter a new name in the Enter Group Name field.
To edit the range of sites in a site group, enter the new range in the Enter Range field.
Click Apply to apply any changes, then OK to exit, or Cancel to exit without saving.
9. Enter the input point(s) to run the task on (if applicable) as follows:
To run the task on a single input point, disable the Group option, then enter the point number in Point No.
field.
To run the task on a group of input points, enable the Group option, then select a point group from the
Point Group list. To change a point group configuration, click Select. The INPUT Groups dialog box opens.
To delete a point group, select the point, then click Delete.
To edit a point group, select the point, then click Edit. The INPUT Groups Configuration dialog box
opens. Edit the point groups accordingly. Click OK to exit.
Click Close to exit the INPUT Groups dialog box.
10. To save the task, enter a name in the Available Tasks list, then click Save. The task is added to the System
Tasks dialog box, along with site and date/time and status details. Its frequency is indicated by a letter (that
is, Y = yearly, M = monthly, W = weekly, D = daily, and H = holiday).
To delete an existing task, select it from the Available Tasks list, then click Delete.
To copy the details of an existing task to a new one, click Copy. Enter the name of the new task and
change any details accordingly, then save it.
11. Click Close to exit the Task Configuration dialog box.
12. When finished task configuration, click Close in the System Tasks dialog box.

66 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Synchronizing GMS with Base Stations and TransITs


In a system that uses Base Station or TransIT hardware there is a possibility that event times reported by Base
Stations can differ to GMS time due to hardware clock drift. Clock drift does not affect the performance of the system,
however, may lead to confusion when referring to time stamps reported in the Transaction Manager.
You can configure GMS to regularly report its time to attached Base Stations and TransITs (including or excluding
Controllers attached to the Base Stations/TransITs) and have them reset their clocks accordingly so that event time
stamping is synchronized. This is carried out using GMS system tasks (see Configuring System Tasks 65 ).

Synchronizing Base Station and TransITs with GMS


To set up GMS reports to synchronize its attached Base Stations and TransITs, proceed as follows:
1. In GMS, select Tools > System Tasks. The System Tasks dialog box opens.
2. Click New Task. The Task Configuration dialog box opens.
3. In the Available Tasks field, enter a name for the task.
4. In the Schedule region, select the Daily option and enable the Include Holidays option.

Note: For best accuracy it is recommended to perform this task daily.

5. In the Schedule Time field, enter the time to perform the task.
6. In the Task Type list, select either:
CPU card time send including RTU's (Controllers) - Synchronizes GMS time with Base Stations/TransITs
and the Controllers attached to them.
CPU card only time send (not to RTU's) (Controllers) - Synchronizes GMS time with Base Stations/
TransITs only.

Caution: If the Base Station or TransIT has attached Controllers in different timezone, selecting CPU card
time send including RTU's will reset the Controller times to GMS time also.

7. Click Save.

Chapter 1 - Configuring the System | 67


Configuring GMS - Administrator Guide

Creating and Managing a Global Contacts List


A global contacts list is a range of contacts that can be applied to anywhere in the system, and are not restricted to
particular sites. For example, a supervisor to contact for certain situations in any site. The global contact list is
available wherever contact information is required, for example, when setting up response procedures.
Global contacts use a verification code, so that they can authenticate themselves to GMS operators.

Setting Up a Global Contacts List Members


To add or update members of a global contacts list, proceed as follows:
1. In the Events Manager, click Configure, then select Global Contacts. The Global Contacts dialog box opens.

2. To create a new entry, click Add. To update an existing record, select the record and click Update. The Global
Contact Details dialog box opens.

3. Type relevant information into the following text boxes:


Name.
Position (select from list).
Verification Code.

Note: The Enable Verification Codes option in the System Parameter Configuration dialog box needs to
be enabled for the system to force users to verify themselves using the verification code.

Business Phone.
Street Address.
Home Phone.
Mobile Phone.

Note: Telephone number entry fields can also be automatically filled from Address Book contacts, see
Automatically Applying/Dialling Address Book Telephone Numbers in GMS 71 .

4. Click OK. Your new or updated entry is displayed in the Global Contacts dialog box. Double-click a name to
display an additional line (containing the address information).

68 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Auto-Importing Global Contacts Details


You can automatically import staff details into the card access system. In this case it is advisable to allocate the
employee ID as a unique ID.
If the import file does not provide card numbers, the system will allocate card numbers automatically. The system
generated card number will start from the number set in the GMS32.INI file:
[System Parameters]
CMS Starting Card Number=2000000

If there is a card number in the existing database that is larger than the CMS Starting Card Number value, then the
first imported card will start from that number instead. For example, the existing database contains a card with
number 2000014 - the imported cards will start from 2000015.

Deleting Global Contacts List Members


To delete members of a global contacts list, proceed as follows:
1. In the Events Manager, click Configure, then select Global Contacts. The Global Contacts dialog box opens.
2. Select the contact to delete, then click Delete.
If the contact is included in any site-specific response procedures as a contact, a confirmation dialog box
displays showing the related sites.

Click Proceed to continue with the deletion, or click Cancel to abort the deletion.
If you have proceeded with the deletion and the contact is included in any non-site specific response
procedures a second confirmation dialog box displays.

Click Proceed to completely remove the contact from the global contacts list as well as any response
procedures, or click Cancel to abort the deletion.

Speeding Up Global Contact Deletions


It is possible to reduce the system time required to delete global contacts by preventing the system from performing
a "where used" check for the global contact as part of the deletion process.

Note: This is recommended only for very large systems, where deleting global contacts may cause
noticeable delays.

A string in the GMS32.INI file can be added to control how the "where used" check is performed:
[System Parameters]
CheckGlobalContactDelete=yes

When the setting is CheckGlobalContactDelete=yes, the system will perform the "where used" check. Operators
can still over-ride the check by holding SHIFT when they click Delete.
When the setting is CheckGlobalContactDelete=no, the system will not perform the "where used" check.

Note: If the GMS32.INI file has no entry for controlling the checking of global contact deletions, the
system will default to performing the "where used" check.

Chapter 1 - Configuring the System | 69


Configuring GMS - Administrator Guide

Using the GMS Address Book


The GMS Address Book allows you to store any number of contacts. The contact information includes name,
telephone numbers, address information, email contact, etc.
Address Book contacts can be used in other parts of the system. For example, when creating response procedures
that require calling people, you can use the surname of an Address Book contact in the telephone number entry field
and GMS will automatically look up the contacts and provide a list of options. Click an option to apply the contact
telephone number (it will remain displayed as the contact name).
You can call any contact directly from the Address Book by bringing up their details, then clicking .
To open the Address Book, proceed as follows:

1. In GMS, click , or select View > Address Book.

Adding Address Book Contacts


To add contact details to the Address Book, proceed as follows:
1. Click one of the alphabetical tabs on the left side of the Address Book.

Note: It does not matter which tab you choose when adding contacts as GMS automatically stores entries
in alphabetical order.

2. Click New.
3. Use the various fields and lists to define the contact as required.
4. To add an image or signature image for the contact, right-click a grey box. The Photo/Signature File Names
dialog box opens.

a. Use Select to browse for a file.


b. Use Capture to obtain an image directly from an attached TWAIN device (digital camera, signature pad,
etc).

Note: Only jpg format files are supported and all images must be located in the
GMS\Customer\CardAcc\PHOTO folder.

5. Click Save.

70 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Searching the Address Book


To search for contacts in the Address Book, proceed as follows:
1. Click the Search tab.

Note: After performing a search click Clear Form before performing another search.

2. Use any contact information field as the search criteria. If you make entries in several fields as filters, only
entries that satisfy all conditions are returned by the search. For example, a Last Name entry of o and a First
Name entry of j and a Mobile Phone entry of 04 will return any contact with the letter "j" in their first name,
"o" in their last name that also has a mobile/cell phone number starting with "04".
3. Search results are listed in the Name List list. Click it to see the results. Click an option to select it and bring
the details up in the Search page.

Editing and Deleting Address Book Contacts


To edit or delete a contact from the Address Book, proceed as follows:
1. Click the alphabetical tab on the left side of the Address Book that corresponds with the contact last name.
2. Click the Name List and select the required contact.

Note: You can delete a contact directly from the Search tab by selecting the entry from the Name List,
then clicking Delete.

To edit the contact, change the fields as required, then click Save.
To remove the contact, click Delete.

Automatically Applying/Dialling Address Book Telephone Numbers


in GMS
In any part of GMS that requires a telephone number entry, you can enter a surname or part of a surname to
automatically fill in the field. When you enter part of a name, GMS looks it up in the Address Book and returns a list
of possibilities. Click the list to see the entries and click one to select it.
For example, the following images show a telephone number entry field. The first image shows an entry of "g". The
second image shows the results (two entries) that were found in the Address Book with last names starting with "g".
Click an entry in the list to apply it (the name is displayed, not the telephone number).

In addition, any telephone number entry field can be used to instigate a call. Right-click the field and a context menu
appears for dialling the contact on either telephone line is configured in GMS (see Configuring Controllers - Technician
Guide, Configuring TAPI (Telephony) Devices). Click an entry in the list to dial the contact using that line.

Chapter 1 - Configuring the System | 71


Configuring GMS - Administrator Guide

About GMS Log On/Log Off


GMS is programmed with the details of each person that is authorized to operate the system (see Configuring GMS
Operators 21 ). Each operator is assigned a set of privileges that determine the GMS functions available to them.
Operators log on to GMS using an Operator Name and Password credentials. The Operator Name can be:
Initials - The character(s) in the Initials field of the operator properties (Operator Setup dialog box).
Full Name - The character(s) in the Initials field, followed by a space, followed by the character(s) in the Last
Name field of the operator properties (Operator Setup dialog box).
Display Name - The character(s) in the Display Name field of the operator properties (Operator Setup dialog
box).

Note: After logging on, the display name appears in the title bar of GMS.

This will depend on the Logon Using setting in the Options - System Parameter Configuration dialog box (see
Configuring System Parameters 9 ). The Logon Using setting is global, meaning that it is required for everyone in
the system. For example, if Full Name is used, then everyone in the system will have to log on using their full name
(even the auto logon on the server).

Logging On to GMS
To logon to GMS proceed as follows:
1. Start GMS. The Operator-1 Logon dialog box is displayed. If another operator is already logged on, the Operator-
1 Logoff dialog box opens only after the other operator has logged off.

2. In the Operator Name field, enter your operator name.


3. In the Password field, enter your password (case-sensitive).
4. Click Options and select a workstation type to log on as. The workstation type determines the initial screens
displayed in GMS after logging on (see Managing GMS Workstations 78 )
5. Click OK.

Logging Off from GMS


To log off from GMS proceed as follows:
1. Select File > Operator-1 Logoff. The Operator-1 Logoff dialog box opens.

2. In the Operator Name field, enter your operator name (case-sensitive).


3. In the Password field, enter your password (case-sensitive).
4. Click OK. If your password is accepted, you are logged off and the Operator-1 Logon dialog box opens, for the
next operator log on.

Setting GMS Auto Log On


The auto log on feature allows GMS to authenticate and apply a particular user's settings automatically when GMS
starts. This means that the Operator-1 Logon dialog box is bypassed and GMS begins operating immediately.

Note: Auto log on can be set for one user only.

72 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

To set auto log on, proceed as follows:


1. Start GMS. The Operator-1 Logon dialog box is displayed.
2. In the Operator Name field, enter your operator name. The default for new installations is "a".
3. In the Password field, enter your password (case-sensitive). The default for new installations is "1".
4. Press the SHIFT key and click OK simultaneously. GMS restarts.

5. Test auto log on by clicking and entering your operator details. Click OK to log off. GMS will now auto log on.
To disable the auto log on, proceed as follows:
1. Select File > Operator-1 Logoff. The Operator-1 Logoff dialog box opens. Enter your operator details.
2. Press the CTRL key and click OK simultaneously.

Auto Log On Using Windows Authentication Mode


Auto log on operation differs between normal GMS and Windows user authentication modes. This is set from the
Authentication Mode setting in the Options - System Parameter Configuration dialog box (see Configuring System
Parameters 9 ). If auto log on is enabled in Windows authentication mode, the next time GMS is started, the system
checks if the auto log on user is the same as the current Windows User. If the users match, GMS will auto log on the
user, otherwise the Operator-1 Logon dialog box is displayed.

Auto Log On for a Different Windows User


You can also set up GMS auto log on for a user that is different to the current Windows user. This can be achieved
using a tool such as the Windows Run As command. For this command, right-click the GMS desktop shortcut, or
executable (GMS32.exe) and click Run As. See your Windows documentation for information on using the
command.
When you have assigned a Windows user to run GMS "as", that user becomes the "process owner" for the GMS
executable. You also need to set GMS up to recognize the same user for auto log on as GMS will check that the user
assigned for auto log on is also the assigned process owner. This enables a different user that is currently logged on
to Windows to start GMS and auto log on will run GMS using the process owner credentials.

Chapter 1 - Configuring the System | 73


Configuring GMS - Administrator Guide

Closing GMS
GMS is designed to run continuously, however, if a situation occurs that requires a shutdown (exit) of GMS, you will
need to use administrator credentials (see Changing and Using the Authorization Password 77 ).
To close GMS proceed as follows:
1. In GMS, select File > Exit. The Authorization Logoff dialog box opens.
2. In the Authorization Name field, type in the authorization name (case-sensitive).
3. In the Password field, type in the authorization password (case-sensitive).
4. Click OK to shutdown GMS.

74 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring Holidays in the Yearly Calendar


Holidays in GMS represent set dates during which the system applies different access control settings to normal. For
example, on a public holiday that occurs on a week day and the premises is shut (access denied), which would
otherwise be a normal business day (access granted).
The concept of holidays is enhanced with access control settings and regional settings. These are know as "holiday
types" and "holiday profiles", respectively.
Holiday Profile - Represent different regions (different Controllers/sites) that may be part of the same security
installation, however, do not share the same holidays (see Configuring Controllers - Technician Guide, Advanced
Configuration Options).
Holiday Type - Represent different access control settings that apply to a particular holiday (see Configuring
Controllers - Technician Guide, Configuring Reader Time Schedules).

Adding, Modifying and Deleting Holidays


To configure holidays in the yearly calendar, proceed as follows:
1. In GMS, select Tools > Yearly Calendar. The Holiday Configuration dialog box opens.
2. The Holiday Configuration dialog box displays a list of holidays currently set. It displays the date and a
description of the holiday, the type and profile and whether or not the holiday recurs annually.

3. To add a new holiday, click New. The Create New Holiday dialog box opens.

4. In the Holiday Description field, enter a name or description for the holiday. If the holiday occurs on the same
date every year, enable the Same date each year option.

Note: Annually recurring holidays must fall on the same date each year. For example, Christmas day and
New Year's day.

5. In the Holiday Types region, select either Type-1, Type-2, or Type-3.

Note: If you had Holiday 4 time schedules configured from a previous version of GMS, these will be
automatically changed to Type-3.

6. In the Holiday Profiles region, enable the checkbox option for each profile you want to apply to the holiday.

Chapter 1 - Configuring the System | 75


Configuring GMS - Administrator Guide

7. Click Save. The dialog box closes and the new holiday settings are broadcast to all Controllers. The new holiday
displays in the Holiday Configuration dialog box.
To delete an existing holiday:
Select it in the Configured Holidays list.
Click Delete.
To manually download holidays of all profiles to Controllers:
Click Download.
To manually download holidays to Controllers that use a particular holiday profile:
Click next to Download and a list of profiles displays.
Click the profile in the list.
8. Click Close to exit the dialog box.

Customizing Holiday Profile Names


You can assign custom names to holiday profiles using the GMS32.INI file. Doing this will allow the system to display
the profile by name, making it easier for operators to recognize the purpose of the profile. For example, setting the
profile name for the country that uses it.
Custom holiday profile names are set in the GMS32.INI file, as follows:

Note: Changes to the GMS32.INI file for custom holiday profile names must be carried out on the GMS
server only.

1. Open the GMS32.INI file on the GMS server (see Editing System Data Files 118 ).
2. Add the following lines to the file:
[Holiday Zones]
1=xx
2=yy
3=zz

And so on, where xx, yy, zz are the profile names (for example, "1=Australia", "2=UK", "3=USA" etc).
3. Save the file.
4. Restart GMS.

76 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Changing and Using the Authorization Password


The GMS authorization password prevents unauthorized shutdown, window minimization, and restricts access to high
security areas of GMS.

Note: By default, the authorization password requirement is disabled.

When using the authorization password, GMS requests it before the program can be shut down (see Closing GMS 74
). You may also be prompted for the authorization password if you attempt to switch between Windows applications
while GMS is running, or minimizing GMS.
The possible authorization options are:
A dialog box requesting the authorization name and password before exiting GMS (this is the default level).
A dialog box asking to confirm exiting of GMS.
Instant shut-down without need of confirmations or passwords.
The authorization password can only be set by the top level user. The default initials and password are "a" and "1"
respectively.

Note: You should change the default initials and password as soon as possible to protect the security of
your network.
Once the authorization password is entered, the additional administrator functions are active for five
minutes only.

Setting the Authorization Password


To set or change the authorization password, proceed as follows:
1. In GMS, select File > Authorization Password. The Enter (or Edit) Authorization Password dialog box opens.
This is to ensure that only users with access to the current authorization password can change the password.

Note: If you do not have Edit privileges for the authorization password, the Authorization Password
setting is unavailable.

2. In the Operator Name field, enter the existing authorization initials (two alphabetic characters max.).
3. In the Password field, enter the existing authorization password (eight alphanumeric characters max.).
4. Click OK to acknowledge. If this is the correct password, the Edit Authorization Password dialog box opens.
5. In the Operator Name field, enter the new authorization initials (two alphabetic characters max.).
6. In the Password field, enter the new authorization password (eight alphanumeric characters max.). Passwords
are case sensitive and are encrypted so they will display as a series of asterisks.
7. Click OK to save and exit, or Cancel to exit without saving.

Note: To disable the authorization dialog box, leave the Edit Authorization Password dialog box fields
blank, then click OK. This disables the need to enter the authorization name and password, so that the
confirmation dialog box requires you to only click OK or Cancel.

Caution: Store the authorization password in a safe place. Exposing it to the wrong people may
compromise the security of GMS. Contact Pacom Systems if you lose or forget your authorization
password.

To disable requiring the authorization password when closing GMS, proceed as follows:
1. Use Windows Notepad to open the GMS32.INI file located in the GMS\Customer\Updatable folder, and add the
line "No Message box for GMS Shutdown = 1" to it.
2. Save and close the GMS32.INI file.
3. Restart GMS.

Chapter 1 - Configuring the System | 77


Configuring GMS - Administrator Guide

Managing GMS Workstations


The active GMS main server application "desktop" provides a graphical representation of connected workstations. You
can use the server desktop to manage workstations (add, remove and edit) and to send certain commands. You may
need to close or minimize other windows to see the full desktop.

Adding Workstations
To add a workstation to the GMS server desktop, proceed as follows:
1. On the GMS server desktop double-click the server image (the larger one at the top). The Server Configuration
dialog box opens.

2. Enter a (non-existing) workstation number in the Workstation No. field.


3. In the Workstation Name field, enter a workstation name.
4. In the Workstation Type list, select a category for the workstation. This setting determines the initial screens
that are displayed in GMS after logging on and the available features. Available types are:
Administration -
Supervisor -
Monitoring - Alarm monitoring screens and features.
Maintenance -
Management -
System Setup -
Card-Access - Card access module screens and features.
Visitor-Badging - Visitor badging module screens and features.
5. Click Add. The workstation is added to the server desktop.
6. You can fill in the remaining fields for adding contact numbers for the workstation, if required.

78 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

7. Click Close to save changes and exit.

Editing Workstation Details


1. On the GMS server desktop double-click the server image (the larger one at the top). The Server Configuration
dialog box opens.

2. Enter an existing workstation number in the Workstation No. field.


3. Add or edit any previously existing details.
4. Click Add. The workstation details are updated.
5. Click Close to save changes and exit.

Deleting Workstations
1. On the GMS server desktop double-click the server image (the larger one at the top). The Server Configuration
dialog box opens.

2. Enter an existing workstation number in the Workstation No. field.


3. Click Delete. The workstation is removed from the server desktop.
4. Click Close to save changes and exit.

Remotely Controlling Workstations


You can perform certain actions on GMS workstations remotely from another GMS workstation. Proceed as follows:
1. On the GMS server desktop double-click the image for the workstation you wish to control. The Workstation
Configuration dialog box opens.

2. In the Status list, select an action. Available actions are:


Connect - Select to connect a disconnected workstation or, if the workstation is already online, re-
establishes the connection.
Disconnect - Select to disconnect the workstation from the server.
Log Off - Select to log off the workstation operator from GMS.
Shut Down - Select to close GMS on the workstation.
3. Click OK to apply the action to the remote workstation and close the dialog box.

Chapter 1 - Configuring the System | 79


Configuring GMS - Administrator Guide

Configuring GMS Text-to-Speech


The GMS Text-to-Speech facility is used to convert text strings into an audible, speaking voice format when alarm
events occur (see Configuring How Event Priorities Display 39 ). This feature can improve operator response through
audible warnings in conjunction with screen. The Text-to-Speech facility requires the Microsoft Speech Synthesis
Engine to be installed.

Configuring the Text-to-Speech Engine


To configure the Text-to-Speech Engine, proceed as follows:
1. In the Events Manager click Configure, then select Select Text-To-Speech Engine. The Select Engine Mode
dialog box opens.

2. Select a virtual speaker from the list. For example, Mary in Hall. The characteristics of the virtual speaker are
detailed on the right-hand side of the dialog box.
3. The Device ID setting will generally be WAVE_MAPPER.
4. Click OK to save the changes and exit, or Cancel to exit without saving.

80 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

GMS Geographic Maps


GMS features inter-operation with Google Maps/Earth, Microsoft Bing Maps and Microsoft MapPoint applications. When
this feature is installed, operators can view the site that they are actioning using the relevant mapping application.
Mapping applications provide a range of maps or satellite/aerial photographs of the site and its surroundings based
on the site data (see Working with Site Map Data 203 ).

Note: GMS mapping features are specifically licensed. See the GMS Installation Guide for information, or
contact Pacom support.
Any GMS server or workstation using the geographic maps feature requires the map application software
to be installed specifically. End users are responsible for installing mapping applications as it is not
installed as part of GMS installation.

GMS geographic maps are accessible in the following ways:


Displayed as a separate panel in the Site Map View.
Displayed in the Operator Instructions dialog box when actioning an event.
Open as a separate application from a hyperlink located in the Site Map View, Site Data panel.

Note: If MapPoint is being used, GMS will allow one instance of it only to reduce required resources. That
is, if the user has both the Site Map View and the Operator Instructions dialog box open, MapPoint will be
shown in one of them - not both. MapPoint may require different installations for covering different regions
of the world (for example, Europe). These are released as separate applications.

Caution: It is not recommended to mix versions of MapPoint together. For example, do not install
MapPoint Europe 2009 in conjunction with MapPoint North America 2010 as it may affect functionality of
the program.
MapPoint may not run properly on Microsoft Windows Vista and Windows 7 operating systems if
"compatibility mode" is enabled for GMS. To turn this mode off, right-click the GMS application shortcut
(desktop, quick launch etc) and select Properties from the context menu. The Properties dialog box for
the shortcut opens. Click the Compatibility tab and ensure that no compatibility options are enabled (on),
then click OK.

Internet Browser Requirements


GMS supports Mozilla Firefox 3+ and Microsoft Internet Explorer 7+ browser applications. Others may also work,
however, are not officially supported.
For mapping to function properly, active scripting or Java script must be enabled in the local Internet browser
application. Refer to the Internet browser documentation for details.

Note: Network privacy and/or Internet security settings or policies may affect the operation of GMS
mapping features. Contact your IT administrator, or Pacom Support for information or assistance.

Chapter 1 - Configuring the System | 81


Configuring GMS - Administrator Guide

Configuring Controller Message Date-Stamps


When Controllers send event messages to GMS they include a time stamp (HH:MM:SS) by default, however, without
the date. This is because it is generally assumed that GMS receives messages on the same day that they are
generated.
In times where a Controller is offline to GMS, it stores messages until it is able to pass them on. If the date of the
message is not confirmed, it is possible for GMS users to receive messages from a previously offline Controller and
assume that the messages were created on the current day.
You can set up Controllers to include the date as part of the message time stamp information to prevent any
possibility of confusing when a message was actually generated. The time/date stamps for messages appear in the
Transaction Manager and in reports.

Note: In order to display dates in the Transaction Manager, it must be set to display them. To do this,
select Options > Toggle Date Display.

The following image shows how Controller date stamps appear in the Transaction Manager.

Note: 1057 and 1058 Controllers require firmware version 5.00 or later for this feature to work.

Applying Message Date Stamping to All Controllers


You can apply this feature to all Controllers connected to GMS in one procedure. To do this, proceed as follows:
1. In GMS, select Hardware > Broadcast Commands. The Broadcast Commands dialog box opens.

2. Select the Enable Day Of Month Reporting option.


3. Click OK.
-or-
1. In GMS, select Hardware > Controller Settings. The Controller dialog box opens.
2. In the Controller ID field, enter the Controller ID number, then click Change.
3. In the Controller dialog box, select General > Network > Port Settings. The Controller Port Parameters dialog
box opens.
4. In the Controller Port Parameters dialog box, click Advanced, then click Controller Settings from the context
menu. The General System Parameters dialog box opens.
5. In the General System Parameters dialog box, enable the Enable Date Stamp for Events option.
6. Click Download, then close all dialog boxes.
To disable Controller date stamps, do the following:
1. In the Broadcast Commands dialog box, select the Disable DayOfMonth Reporting option.
2. Click OK.
-or-
1. In GMS, select Hardware > Controller Settings. The Controller dialog box opens.
2. In the Controller ID field, enter the Controller ID number, then click Change.

82 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

3. In the Controller dialog bo,x select General > Network > Port Settings. The Controller Port Parameters dialog
box opens.
4. In the Controller Port Parameters dialog box, click Advanced, then click Controller Settings from the context
menu. The General System Parameters dialog box opens.
5. In the General System Parameters dialog box, disable the Disable Date Stamp for Events option.
6. Click Download, then close all dialog boxes.

Applying Message Date Stamping to Individual Controllers


You can apply this feature to selected Controllers. To do this, proceed as follows:
1. In GMS, select Hardware > Controller Settings. The Controller dialog box opens.
2. In the Controller ID field, enter the Controller ID number, then click the Change button.
3. Select Commands > User Defined Commands > Define Commands. The Controller User Defined Command
dialog box opens.

4. In the Function Code field, enter 21.


5. In the Command Data field, enter 63,1.
6. Click Send.
To save the command for re-use and add it to the Available Command list, type a name for it in the Available
Commands list, then click Save/Delete.
-or-
1. In GMS, select Hardware > User Defined Commands. The User Defined Commands dialog box opens.

2. In the Function Code field, enter 21.


3. In the Command Data field, enter 63,1.
4. In the Element No field, enter the Controller ID number.
5. Click Send.
To save the command for re-use and add it to the Available Command list, type a name for it in the Available
Commands list, then click Save.
To disable Controller date stamps, do the following:
1. In the Controller User Defined Command dialog box, Function Code field, enter 21.
2. In the Command Data field, enter 63,0.
3. Click Send.
-or-

Chapter 1 - Configuring the System | 83


Configuring GMS - Administrator Guide

1. In the User Defined Commands dialog box, Function Code field, enter 21.
2. In the Command Data field, enter 63,0.
3. In the Element No field, enter the Controller ID number.
4. Click Send.

84 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring Remote Maintenance Testing


For Controllers (sites) that are equipped with Pacom 8303 power supplies, scheduled testing of certain device
parameters can be performed. This is known as "remote maintenance" and is similar to a regular system "health
check". Remote maintenance tests produce reports based on a range of information from device tests and in-built
device diagnostics and certain status conditions for different objects that are stored by Controllers.
The results of remote maintenance testing can be used to identify areas of the system that may require maintenance,
or potential problems that may require further investigation. The GMS transactions log, due to its capacity for
message storage and larger time span than available in Controllers, is a valuable tool to use for more in-depth
analysis. For example, finding out when certain conditions may have started or how often they have occurred etc.

Note: Remote maintenance report data is erased from a Controller once remote maintenance reporting
has been performed using it, so that the same data is not used more than once.
Controller restarts erase remote maintenance data.
GMS 3.84+ supports remote maintenance and requires Controller firmware 4.12+ for 105x series
Controllers. All 8000 series Controller firmware versions (1.x) support remote maintenance.

For configuring the 8301/8303 power supply to perform power related tests used by remote maintenance, see
Configuring Controllers - Technician Guide, Configuring and Using Controller Power Monitoring.
For running remote maintenance reports, see Using GMS - Operator Guide, Remote Maintenance Reporting.

Scheduling Remote Maintenance Testing


Up to four tests can be scheduled per year. To configure a remote maintenance test and reporting schedule, proceed
as follows:

1. In GMS, click . The Summary Manager opens.

2. In the graphical summary screen, right-click the site to edit and select Controller Settings from the context
menu. The Controller dialog box for the site opens.
3. In the Controller dialog box, select General > Remote Maintenance Settings. The Dates for Remote
Maintenance dialog box opens.

4. For each test:


a. In the Date field, enter the date to perform the test (DD/MM/YYY format). Enable the Same Date for Each
Year option to repeat the test on the same date annually.

Chapter 1 - Configuring the System | 85


Configuring GMS - Administrator Guide

b. In the Time field, enter the time of day to beging performing the remote maintenance test routines in 24-
hour time (HH:MM format).
5. Click Download to apply the settings to the Controller and close the dialog box.

Installing the Remote Maintenance Facility

Note: Perform the following procedure on the GMS server only.

The reporting facility for remote maintenance is not included in GMS as a default and must be installed before the
reports can be configured. Proceed as follows:
1. Navigate to the GMS folder and locate the AddRMTrigger.bat file.
2. Double-click the file to run it. A Windows command window opens requesting confirmation for exectuing the file.
To continue, enter y and press ENTER.
3. When the file finishes running. Press any key to close the command window.
4. Navigate to the GMS folder and locate the AddRMHistory.bat file.
5. Double-click the file to run it. A Windows command window opens requesting confirmation for exectuing the file.
To continue, enter y and press ENTER.
6. When the file finishes running. Press any key to close the command window.

Configuring Remote Maintenance Reports

Note: Perform the following procedure on each GMS workstation where the reports will be generated
from.

To add remote maintenance reports to GMS, proceed as follows:


1. In GMS, select Tools > System Files > Edit System Files. The Edit System Files dialog box opens.

2. In the File Selection window, select Report Templates and click OK. The GMS text editor opens with the
"Report Templates" file loaded.
3. Scroll to the [GMS REPORTS] section and add the following lines to it:

Remote Maintenance All Sites Summary Report=RM_AllSitesDetail.rpt


Remote Maintenance Details of all sites Report=RM_SiteDetails.rpt
Remote Maintenance All Sites Exception Report=RM_AllSitesExceptionOnly.rpt
Remote Maintenance Summary Test Report=RM_PeriodSummary.rpt
Remote Maintenance Count Summary Test Report=RM_PeriodTestSummary.rpt

4. Scroll to the GMS Reports Definitions section and add the following entries to it:

Note: The descriptions can be altered if required.

[RM_AllSitesDetail.rpt]
Description=Remote Maintenance Summary Report for a specified range of sites, over a specified
date range
Default=1

[RM_SiteDetails.rpt]
Description=Remote Maintenance Details Report for a specified range of sites, over a specified date
range
Default=1

86 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

[RM_AllSitesExceptionOnly.rpt]
Description=Remote Maintenance Details Report for a specified range of sites that have exception
test result(s), over a specified date range
Default=1

[RM_PeriodSummary.rpt]
Description=Remote Maintenance Summary Report for sites that have been tested over a specified
date range
Default=1

[RM_PeriodTestSummary.rpt]
Description=Remote Maintenance Statistics Report for sites that have been tested over a specified
date range
Default=1

5. When finished editing, save the file and close the dialog box.

Remote Maintenance Reporting as a System Task


Remote maintenance reports can be scheduled to run as a GMS system task Proceed as follows:
1. Navigate to the GMS\Language\xxx\Overwrite folder (xxx represents your selected language) and open the
GmsTaskReport.str file with a text editor, such as Notepad.
2. Scroll to the [PRINT REPORTS] section and add the following lines to it:

Remote Maintenance All Sites Summary Report=RM_AllSitesDetail.rpt


Remote Maintenance Details of All Sites Report=RM_SiteDetails.rpt
Remote Maintenance All Sites Exception Report=RM_AllSitesExceptionOnly.rpt
Remote Maintenance Summary Test Report=RM_PeriodSummary.rpt
Remote Maintenance Count Summary Test Report=RM_PeriodTestSummary.rpt

3. Scroll to the end of the file and add the following entries to it:

Note: The ExportType entry can be set to:


0 - To send the report to a printer.
1 - To save the report as an Microsoft Excel spreadsheet.
2 - To save the report as a PDF document.

[RM_AllSitesDetail.rpt]
Default=1
ExportType=2
Export=RM_AllSitesDetail

[RM_SiteDetails.rpt]
Default=1
ExportType=2
Export=RM_SiteDtails

[RM_AllSitesExceptionOnly.rpt]
Default=1
ExportType=2
Export=RM_AllSitesExceptionOnly

[RM_PeriodSummary.rpt]
Default=1
ExportType=2
Export=RM_PeriodSummary

[RM_PeriodTestSummary.rpt]

Chapter 1 - Configuring the System | 87


Configuring GMS - Administrator Guide

Default=1
ExportType=2
Export=RM_PeriodTestSummary

4. When finished editing, save the file and close the dialog box.

88 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Creating and Managing Multi-Site Guard Tours


GMS allows a site guard tour to be assigned to single or multiple sites. For details on how to configure guard tours,
see Creating Guard Tours 207 .

Note: All guard tour editing must be done on the GMS server.

Creating Multi-Site Guard Tours


To configure a multi-site guard tour, proceed as follows:
1. In the Summary Manager, select Setup > Multi Site Guard Tour. The Multi Site Guard Tour Configuration
dialog box opens.

2. Enter a name for the tour in Guard Tour Name.


3. In Site No, enter the site number.
4. In Point No, enter the point number.
5. If specifying a reader number then enable the Reader ? option.
6. Enter a time (in minutes) in Station Duration that the guard has at their disposal to get to this point or reader.
7. Click Add to add this point to this tour.
8. To add more points to this tour, repeat previous steps until the guard tour is complete.
9. Click Close.

Modifying Existing Multi-Site Guard Tours


To modify an existing guard tour, proceed as follows:
1. In the Summary Manager, select Setup > Multi Site Guard Tour. The Multi Site Guard Tour Configuration
dialog box opens.
2. Select a tour from Guard Tour Name.
3. Select the tour point entry to modify from the list.
4. Modify the Site No., Point No., and/or Station Duration settings as required.
5. Click Update.
To insert another tour point entry between existing entries, select the tour point just before the one you want to
add, then:
Click Add. A copy of the selected tour point is added.
Select the new entry and modify it as required.
Click Update.
6. Click Close.

Deleting Multi-Site Guard Tours


To delete an existing guard tour, proceed as follows:
1. In the Summary Manager, select Setup > Multi Site Guard Tour. The Multi Site Guard Tour Configuration
dialog box opens.
2. Select a tour from Guard Tour Name.

Chapter 1 - Configuring the System | 89


Configuring GMS - Administrator Guide

3. Click Delete.
4. Click Close.

90 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring Intercom Operation


Intercom operation refers to access requests by users from an intercom device, input point or card reader. When the
system receives the intercom "call", it notifies GMS operators of the call and provides a range of options:
Allow Access.
Deny.
Wait.
A special .INI file requires configuration for controlling the general behavior of GMS when an intercom call is received
and when an operator actions an intercom call (see The Intercom .INI File 92 ). Intercom activity reports are also
available through GMS and require some setting up before use (see Configuring Intercom Report Options 96 ).
Intercom response actions can be configured to include additional operations with devices connected to, and
controlled by GMS. For example, opening a door, activating an output to turn lights on, streaming video camera
feeds, operating a CCTV switcher, etc. Configuration of response actions is performed using xml-based scripts (see
Configuring Controllers - Technician Guide, Scripting Intercom Actions).
GMS supports two types of intercom operation:
Internal to GMS - Uses "normal" devices to generate the intercom request. That is, the request is made by
triggering an input point or card reader connected to the Controller (see Configuring Controllers - Technician
Guide, Setting Up Internal Intercom Systems). Voice communications are not supported using input points/card
readers for intercom operation.
External to GMS - Uses third-party intercom device hardware (for example, Jacques intercom system) to
provide intercom requests and voice communications. Operators will have an intercom master station that
connects to slave intercom units for voice communications (see Configuring Controllers - Technician Guide,
Setting Up External Intercom Systems).

Intercom connectivity with GMS - Internal and External. Note: The dashed line colors illustrate
mapping between GMS workstation/master intercom units and slave intercom units

Chapter 1 - Configuring the System | 91


Configuring GMS - Administrator Guide

The Intercom .INI File


The Intercom.INI files controls the general behavior of GMS when an operator actions an intercom "call" and the GMS
workstation dispatch scheme - which workstations receive calls from which intercom units. For example, GMS can be
set up for which workstation to rece.ive intercom calls from which sites and intercom units, to show the associated
site map or not, intercom priority text colors and sounds etc.

Caution: It is highly advisable to test-run any modified INI file before deploying it.

Note: Other automated functions that can be defined for individual intercom point actions are done so
using scripts (see Configuring Controllers - Technician Guide, Scripting Intercom Actions).

INI File Definition


GMS intercom operation must be described as sections within the Intercom.INI file, located in the GMS server,
GMS\Customer\Intercom folder. The files in this folder are automatically synchronized with any other GMS servers
(slave/remote) and are also backed up/restored as required during normal GMS system operations. Basic rules for
Intercom.INI file definitions are:

Caution: You cannot add, remove or change section names.


After editing and saving the file on the GMS server, restart GMS on the server and workstations so that
they synchronize their local copies of the Intercom.INI file with the updated one.

A section begins with [SectionName] followed by one or more lines of data.


A section ends when another sections starts, or at the end of the file.
Data entries are case-insensitive..
Empty lines are ignored. Lines beginning with ";" are interpreted as comments.
Any *.WAV files referenced must exist in the GMS\Customer\Sounds folder.

The [Intercom Gateway] Section


The machine hosting the Intercom Gateway Windows service needs to be identified to the system. The following
example shows the required machine identified as "exchsvr".

[Intercom Gateway]
Host=exchsvr

Usage Notes
The machine name or IP address can be used.

The [ShowSiteMap Behavior] Section


The default site map behavior, and any exceptions to it, needs to be identified to the system. The following example
shows the default behavior to display the associated site map when an operator actions an intercom call, with the
exception of intercom calls from intercom unit 2 in site 3 and any intercom units in site 10.

[ShowSiteMap behavior]
default=YES
exceptions=3/2,10/*

Usage Notes
Site ID and Intercom Device ID values are 1-based.
Site and intercom device identifiers are required as comma-separated pairs. For example, "5/1" represents
intercom unit 1 in site 5.
All intercom units in a site can be selected by using "*" instead of actual identification numbers. For example, "
3/*" represents all intercom units in site 3.
To set the default behavior to show the site map, edit the file to read "default=YES".

92 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

To set the default behavior to not show the site map, edit the file to read "default=NO".
To remove any exceptions to the default site map behavior, comment out the exceptions line or remove the
exception entries - "; exceptions=3/2,10/*".

Chapter 1 - Configuring the System | 93


Configuring GMS - Administrator Guide

The [Priorities] Section


The settings for system display and behavior for intercom calls of different priorities needs to be identified to the
system. In the following example, the system behavior for intercom calls with a priority setting of "1" are to be
shown in RGB color "255.0.0") in the Intercom Manager and to play the HighPriorityAlarmSound.WAV file when the
call is first received at the workstations and to play the sound if the call is responded to with the Wait option. The
settings for priority "4" intercom calls instruct it not to play any WAV file.

Note: The system supports priority numbers of 1 to 4.

[Priorities]
1=HighPriorityAlarmSound.WAV,255.0.0,1
2=MediumPriorityAlarmSound.WAV,60.190.80,1
3=LowPriorityAlarmSound.WAV,160.20.230,0
4=-,30.150.222,0

Usage Notes
To not play a WAV file at all, replace the file name with "-".
For text colors, separate the RGB values with period "." characters. Do not use comma characters.
To play a WAV file when an operators actions the call with the Wait option, edit the file so the last line entry is "
1".
To not play a WAV file when an operators actions the call with the Wait option, edit the file so the last line entry
is "0".

Note: RGB values of "255.0.0" is red, "0.255.0" is green, "0.0.255" is blue, "100.100.100" is gray.
Any color can be expressed as a combination of red, green and blue values. Use Paint or other drawing
application to find RGB values for colors.

The [Dispatch] Section


The settings for which GMS workstation(s) to send intercom calls to from different sites and intercom units needs to
be identified to the system. This is known as the "dispatch scheme". In the following example, GMS workstations 1
and 2 will receive calls from any intercom unit in any site. GMS workstation 3 will receive calls from any intercom unit
in site 5. GMS workstation 4 will receive calls from intercom unit 1 in any site. GMS workstation 5 will receive calls
from any intercom unit in site 3, intercom unit 1 in site 8 and intercom unit 12 in site 9. The active GMS server ("65")
will receive calls from any intercom unit in any site.

[Dispatch]
1=*/*
2=*/*
3=5/*
4=*/1
5=3/*, 8/1, 9/12
65=*/*

Usage Notes
GMS Workstation ID, Site ID and Intercom Device ID values are 1-based.
Site and intercom device identifiers are required as comma-separated pairs. For example, "5/1" represents
intercom unit 1 in site 5.
All intercom units in a site can be selected by using "*" instead of actual identification numbers. For example, "
3/*" represents all intercom units in site 3.
All sites can be selected by using "*" instead of actual identification numbers. For example, "*/1" represents
intercom unit 1 in any site.
For standalone systems (one GMS machine acting as server and workstation), use "1" as the workstation
number.

94 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

To specify the active GMS server as a workstation (to receive intercom calls with), use "65" as the workstation
number.

Chapter 1 - Configuring the System | 95


Configuring GMS - Administrator Guide

Configuring Intercom Report Options


GMS can create intercom activity reports. By default, however, these reports are not included as standard report
options - they must be manually added so that they become a selectable option for GMS operators to use (see Using
GMS - Operator Guide, Printing Intercom Activity Reports).
There are two methods that can be used for presenting intercom reports to operators:
As a Site Report, Report Type option.
As a user-defined report, Report Template option.

Adding Intercom Reports to the Report Types List

Note: The Reports.str file can be edited directly with Notepad or using GMS by selecting Tools > System
Files > Edit System Files to open the Edit System Files dialog box and selecting Standard Site Reports
.

Caution: When editing, ensure that the new sections are added before the [All Messages] section of the
Reports.str file. Failure to do so may result in the inability to produce reports from GMS.

In order to generate reports containing intercom related messages, an entry must be added to the Reports.str file,
located in the GMS\Language\XXX\Overwrite folder, as follows:

[Intercom Messages]
252
0
x
x

In order to generate reports containing operator intercom action messages, an entry must be added to the Reports.
str file, located in the GMS\Language\XXX\Overwrite folder, as follows:

[Operator Intercom Actions]


252
0
1,2,3
X

Values in the last line correspond to the report content options below. For example, to include report content options
13 and 14 to the above example, edit the line to read "1,2,3,13,14".

Report Content
The [Operator Intercom Actions] section can be modified to include any combination of the following report
information:
1 - Operator selects an intercom call for actioning.
2 - Operator actions an intercom call with the Allow Access option.
3 - Operator actions an intercom call with the Deny option.
5 - Operator actions an intercom call with the Wait option.
6 - Operator establishes voice communications with an intercom unit using GMS.
13 - Operator isolates an intercom point.
14 - Operator de-isolates a previously isolated intercom point.
15 - Operator turns on listen-in functionality.
16 - Operator turns off listen-in functionality.
17 - Operator ends voice communications with an intercom unit using GMS.

Note: Listen-in functionality is dependent on the intercom system - some systems support this kind of
operation, some do not.

Once the entries are added and the file saved, the Intercom Messages and Operator Intercom Actions report
options become available in the GMS Site Reports list.

96 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Adding Intercom Reports to the Using Report Templates List

Note: The GMSRept.str file can be edited directly with Notepad or using GMS by selecting Tools >
System Files > Edit System Files to open the Edit System Files dialog box and selecting Report
Templates.
Empty lines are ignored. Lines beginning with ";" are interpreted as comments.

Caution: When editing, ensure that the new sections are added before the end of the GMSRept.str file.
Failure to do so may result in the inability to produce reports from GMS.

In order to generate reports containing intercom related messages, entries must be added to the GMSRept.str file,
located in the GMS\Language\XXX\Overwrite folder, as follows:

[GMS REPORTS]
Events Summary=ALMEVENT1.RPT

INTERCOM EVENTS=IntercomEvents
INTERCOM OPERATOR ACTIONS=IntercomOperatorActions
; --------------------------------------------------------------------------
; GMS Reports Definitions
; --------------------------------------------------------------------------
[IntercomEvents]
Description=Shows intercom events
Default=1
Template=GMSRep.RPT
Query={Logdata.FC} = 252 AND {Logdata.D1} = 0

[IntercomOperatorActions]
Description=Shows intercom operator actions
Default=1
Template=GMSRep.RPT
Query={Logdata.FC} = 252 AND {Logdata.D1} = 0 AND ({Logdata.D2} = 1 OR {Logdata.D2} = 2
OR {Logdata.D2} = 3)

Values in the last line correspond to the report content options below and are all associated with data cell D2. For
example, to include report content options 13 and 14 to the above example, edit the line to read "Query=
{Logdata.FC} = 252 AND {Logdata.D1} = 0 AND ({Logdata.D2} = 1 OR {Logdata.D2} = 2 OR {Logdata.
D2} = 3 OR {Logdata.D2} = 13 OR {Logdata.D2} = 14)".

Report Content
The [IntercomOperatorActions] section can be modified to include any combination of the following report
information:
1 - Operator selects an intercom call for actioning.
2 - Operator actions an intercom call with the Allow Access option.
3 - Operator actions an intercom call with the Deny option.
5 - Operator actions an intercom call with the Wait option.
6 - Operator establishes voice communications with an intercom unit using GMS.
13 - Operator isolates an intercom point.
14 - Operator de-isolates a previously isolated intercom point.
15 - Operator turns on listen-in functionality.
16 - Operator turns off listen-in functionality.
17 - Operator ends voice communications with an intercom unit using GMS.

Chapter 1 - Configuring the System | 97


Configuring GMS - Administrator Guide

Note: Listen-in functionality is dependent on the intercom system - some systems support this kind of
operation, some do not.

98 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuring Optional GMS Settings


GMS offers a range of additional/optional system configurations that you can apply depending on requirements. Some
apply to individual operator workstations or for the overall system. Operator specific customizing applies whenever
that operator logs on to GMS. Operator-based customization is available for:
Events Manager.
Summary Manager.
Operator response screen.
To customize, operators must have the Operator Independence option enabled in the Logon tab of the Options -
System Parameters Configuration dialog box (see Configuring System Parameters 9 )

Chapter 1 - Configuring the System | 99


Configuring GMS - Administrator Guide

Customizing the Card Access Manager


You can fully customize the Personal, Card Details and User Defined 1, 2 and 3 tab displays in the Card Access
Manager, Cardholders screen. This enables you alter the look and behavior to suit your organization. Customization
options include:
Changing tab order.
Changing field names.
Adding text fields.

Note: You cannot change the Access Level display.


Customizing the Cardholders screen is generally an administrator task. After customization, any
operators that the same administrator creates will inherit the customization. You can also create templates
for various custom display configurations (see Using Customization Templates 105 ).
During customization, you can duplicate any display element using standard Copy/Paste functionality.

GMS includes three extra tabs, called User Defined (you can rename them) for additional cardholder information,
specific to your organization:
User Defined 1 - Allows for additional access information.
User Defined 2 - Allows for specific information about the cardholder (for example, parking sticker and eye
color).
User Defined 3 - Allows for any additional comments or information about the cardholder in a free form text
area.

Note: Because these tabs are optional, they are not displayed until you set them to (see Customizing
Cardholder Screen Tabs 103 ).

To access the customization features, in the Card Access Manager select Setup > Customize Card Access. The
Customize Card Access dialog box opens.

Changing the TAB Key (Tabbing) Order


You can change the order order that fields, options and buttons are selected when users press the TAB key. This
could help to mirror procedures or forms used by different companies or other systems.
To change the TAB key order, proceed as follows:
1. In the Customize Card Access dialog box click the tab you want to change.
2. Select Layout > Tab Order. A series of numbered boxes are displayed, which represent the current tabbing
order.

Note: Field labels also have a tabbing order number even though users cannot interact with them. These
should generally be ignored.

100 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

3. Identify the item where the cursor is to start from and click its numbered box. The number in the box will
change to 1.
4. Click on each subsequent numbered box in the tabbing order you want. The boxed numbers will change to
reflect the new order. That is, the second click will make that box 2, the third click 3, and so on.

Note: If you make an error in the order of the fields, you may need to close the dialog box without saving
any changes, then begin again.

5. When you have finished setting the tabbing order click to save the changes in the current tab only, or click
to save all changes in all tabs.

Editing Field Text Labels and Button Captions


You can rename the label text for fields or the caption on buttons. For example, it might be more relevant to have the
"Personal ID" field label as "Staff No".
To edit field text or buttons captions, proceed as follows:
1. In the Customize Card Access dialog box, double-click the existing field label or button. The Edit Properties
dialog box opens.

2. Enter the new label in the Caption field.


3. In the Align list, select the alignment of the new label (not applicable to buttons).
4. Change the background color (not applicable to buttons), if required, by:
Enabling the Back Color option.
Clicking the color square and selecting a new color from the Color Selection dialog box.
5. Click OK to close the dialog box and apply the new label.

Note: For keyboard shortcuts activated by the ALT key, place the "&" (ampersand) symbol before the
shortcut character. For example, "Staf&f No" will show the "f" underlined when the ALT key is pressed, and
is activated by ALT + f.
The standard User Defined tab fields can also be renamed using the Card Access/Visitor User Defined
Text system file. To access the file, in GMS, select Tools > System Files > Edit System Files. The
System Files dialog box opens. Select the Card Access Visitor User Defined Text option, then click OK.
The file opens in the GMS text editor with a list of text strings and their associated ID numbers. Edit the
the text string next to the control identifier. For example, editing the first two entries as follows:
"1.Division
2.Sub-division"
will label the first two fields in the User Defined 1 tab "Division" and "Sub-division", respectively.

Inserting and Editing Additional Text


You can place additional text on any customizable tab display. For example, for data fields copied from other tabs, or
for on-screen tips for users.
To insert text, proceed as follows:
1. In the Customize Card Access dialog box, select Layout > Insert > Static Text. The cursor changes to a four-
pointed arrow.
2. Click where you want to place the text (you can reposition it later). The New Static Text dialog box opens.

3. Enter the text in the Caption field (max. 128 characters).


4. In the Align list, select the alignment of the text.
5. Change the background color, if required, by:

Chapter 1 - Configuring the System | 101


Configuring GMS - Administrator Guide

Enabling the Back Color option.


Clicking the color square and selecting a new color from the Color Selection dialog box.
6. Click OK to close the dialog box. The new text appears. Click to select it, and:
Click and drag the text to reposition it.
Click and drag the handles (squares appearing at the corners and edges of the text bounding box) to wrap
the text.
Double-click it to edit its properties using the Edit Properties dialog box.
Press DEL to delete it.

Inserting and Editing Frames


A frame is a bounding region with a text label in the top left-hand corner. It is commonly used for grouping screen
elements together, such as related fields. You can place frames on any customizable tab display. For example, to
organize existing text and data text boxes into a meaningful groups.
To insert a frame, proceed as follows:
1. In the Customize Card Access dialog box, select Layout > Insert > Frame. The cursor changes to a four-
pointed arrow.
2. Click where you want to place the frame (you can reposition it later). The New Frame dialog box opens.

3. Enter the frame label (optional) in the Caption field (max. 128 characters).
4. In the Align list, select the alignment of the frame label.
5. Click OK to close the dialog box. The new frame appears. Click to select it, and:
Click and drag the text to reposition it.
Click and drag the handles (squares appearing at the corners and edges of the text bounding box) to resize
it.
Double-click it to edit its properties using the Edit Properties dialog box.
Press DEL to delete it.
The following example shows a frame with a left-aligned label. Inside it is some static text.

Inserting Data Fields


You can duplicate existing data text fields on other tab displays. This could help to mirror procedures or forms used
by different companies or to make displays more efficient. For example, it may be more productive to have the
cardholder Valid To field on the Personal tab rather than (or as well as) the Card Details tab.

Note: You cannot create new data fields.

To insert a data field, proceed as follows:


1. In the Customize Card Access dialog box, select Layout > Insert > Standard Field. The cursor changes to a
four-pointed arrow.
2. Click where you want to place the field (you can reposition it later). The New Standard Field dialog box opens.

3. Select the data field from the list.


4. Click OK to close the dialog box. The data field appears. Click to select it, and:
Click and drag the text to reposition it.

102 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Click and drag the handles (squares appearing at the corners and edges of the text bounding box) to resize
it.
Double-click it to edit its properties using the Edit Properties dialog box.
Press DEL to delete it.

Customizing Cardholder Screen Tabs


You can alter the display order of Cardholder screen tabs, display or not display tabs and also change the names of
the User Defined tabs. For example, you may want to remove unnecessary tabs from the display for operators that
only deal with card details.
To change tab settings, proceed as follows:
1. In the Customize Card Access dialog box, select Layout > Settings. The Settings dialog box opens.

Changing the Tab Display Order


To change the display order of tabs, proceed as follows:
1. In the Settings dialog box, select the tab to "move". Use the arrow button as follows:

Button Function
Move the selected tab to the first position (left-most in the Card Access
Manager display).
Move the selected tab up one position (one position to the left in the Card
Access Manager display).
Move the selected tab up down position (one position to the right in the Card
Access Manager display).
Move the selected tab to the last position (right-most in the Card Access
Manager display).

2. Click OK to save the changes, or Cancel to exit.

Displaying/Hiding Tabs
To display or hide a tab, proceed as follows:
1. In the Settings dialog box, enable the Active checkbox to display the corresponding tab. Disable the option to
hide the tab.
2. Click OK to save the changes, or Cancel to exit.

Using Default Display Settings


You can reset any tabs back to their default display configurations.

Note: If you haven't saved the configuration as a template, your changes will be discarded.

To reset to the default settings, proceed as follows:


1. In the Settings dialog box, enable the Use Default checkbox to reset the corresponding tab back to its default
display.
2. Click OK to save the changes, or Cancel to exit.

Chapter 1 - Configuring the System | 103


Configuring GMS - Administrator Guide

Renaming User Defined Tabs


To change the name of a User Defined tab, proceed as follows:
1. In the Settings dialog box, select a User Defined tab entry, then click Rename. The Rename dialog box opens.

2. Type the new name for the tab in the New Name field, then click OK. The new tab name shows in the Settings
dialog box.

The Customization Toolbar


Rather than using menu commands, a quicker way is to use the toolbar buttons on the left-hand side of the
Customize Card Access dialog box. Hover the mouse cursor over each of the buttons to display its function.

Customization Context Menu


A context menu with most of the layout commands is displayed when you right-click in the Customize Card Access
dialog box. From this menu you can perform most of the customizing or editing tasks available.

Aligning Items
You can align multiple items by their left, right, top, or bottom boundaries.
To align several items, proceed as follows:
1. In the Customize Card Access dialog box, hold the SHIFT key and click several items to select them. Selected
items will show their boundaries and sizing handles.
2. Select Layout > Align > [Left] [Right] [Top] [Bottom]. The items will be aligned according to their
boundaries.

Note: Always select the item to align with last.

Making Items the Same Size


You can unify the size (width or height) of several items.
To resize several items, proceed as follows:
1. In the Customize Card Access dialog box, hold the SHIFT key and click several items to select them. Selected
items will show their boundaries and sizing handles.
2. Select Layout > Make Same Size > [Width] [Height]. The items will be resized according to their boundaries.

Note: Always select the item to size to last.


Not all elements can be resized. For example, data fields cannot be height-sized.

104 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Using Customization Templates


GMS supports multiple customized card access data templates, which can be used by individual operators or across all
operators. You can also create templates that apply only to GMS Web Client operators. You might have templates for
operators that perform specific functions, or have different levels of experience. There is no maximum number of
existing templates that can be created and used.
Templates are assigned and connected to individual operator profiles - when they log off, so does their profile.
You need certain privileges enabled in order to customize the Card Access Manager interface. Operator screens
could be customized as required and saved to a template, then remove the privilege to prevent further customization.
The operator will have the customized template, however, not be able to alter it. If a template is modified (on the
server), operators would need to apply the template to get the new changes.

Creating and Applying Customization Templates


You can save any configuration as a template that you can apply to other customizations. Templates can be saved for
a single tab configuration, or for the configuration of all tabs.
To save a configurations as a template, proceed as follows:
1. In the Customize Card Access dialog box:
Click to save the changes in the current tab only.
Click to save all changes in all tabs.
2. Select Templates > Add. The Customized Card Access Template dialog box opens.

3. Enter a template name in the Template Name field, then click OK.

Note: To make a template that applies to GMS Web Client operators only, name it "GMSWebOperator". To
further personalize Web Client templates, you can make them explicitly applicable only to the relevant user
number identified in the template name. For example, a template named "GMSWebOperator17" makes it
available only for Web Client operator #17. You cannot use any padding zeros in the name. For example,
"GMSWebOperator8" is acceptable, whereas "GMSWebOperator008" is not.

To apply a saved template in another configuration, proceed as follows:


1. In the Customize Card Access dialog box, select Layout > [template name].
2. Save the configuration:
Click to save the changes in the current tab only.
Click to save all changes in all tabs.

Chapter 1 - Configuring the System | 105


Configuring GMS - Administrator Guide

Customizing the Events Manager


In the Events Manager, you can customize:
Column headers (these determine the information displayed in the Events Manager).
The appearance of the messages displayed in Events Manager.
The column headers in the Events Manager describe the information displayed in the main window, such as "Event
No." and "Event Description".

You can customize the names of column headers as well as the width of each column. When an operator logs on to
GMS, their individual screen configuration is applied.

Customizing Column Headers


To customize Events Manager column headers, proceed as follows:

1. In GMS, click to open the Events Manager. Click Configure, then select Customize Even Header. The
Customize Event Manager Header dialog box opens.

2. In the Standard Columns list, select the name of the header you want to customize. Available columns are:
Event No - Shows the sequential number of the event as it is received from the site for the given day.
Time - Shows the GMS time that the event was received.
Priority - Shows the priority number of the alarm.
Count - Shows the number of alarm events generated by the point for all current events from the site.
Description - Shows the alarm point type and vocab.
Site ID - Shows the identification number of the site where the event has been generated.
Location - Shows the site address details from the site map data (see Working with Site Map Data 203 ).
State - Shows the alarm system mode at the site when the event was received.
Flags - Shows the event status "code" summary for the event. This facility is designed for technicians.
Point No - Shows the identification number of the input point generating the event.

106 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Status - .
Date & Time - Shows the GMS date and time that the event was received.
3. To change the name of the column, enter the new name in the New Title field.
4. To change the width of the column, enter the new width value (in pixels) in the New Width field.

Note: You can also drag the columns headers directly in Events Manager to change the width. Place your
cursor over the separator line between the column headers and drag when the cursor changes to .

5. Click OK to save and apply the settings, or Cancel to exit without saving changes.
To add or remove columns, proceed as follows:
1. In the Customize Event Manager Header dialog box, in the Standard Columns list, select the name of the
header you want to add.
2. In the Selected Columns list, select the column that will be shown immediately before the additional one, then
click Add. The new column header will be displayed in the Selected Columns list.

Note: Click Add All to display all available columns (add them to the Selected Columns list) in the
Events Manager.

3. To remove a column from the Events Manager display, select it from the Selected Columns list, then click
Remove.
4. Click OK to save and apply the settings, or Cancel to exit without saving changes.

Customizing Messages Font


To customize the Events Manager message font, proceed as follows:

1. In GMS, click to open the Events Manager. Click Configure, then select Customize Font. The Font
dialog box opens.

2. In the Font list, select the font you want to use.


3. In the Font style list, select the type style for the font.
4. In the Size list, select a font size.
5. In the Effects region, select a color and any further effects, if required.
6. Click OK to save and apply the settings, or Cancel to exit without saving changes.

Customizing Keyboard Shortcuts


You can customize keyboard shortcuts, so that combinations of key strokes activate different menu options, instead
of using the mouse. Using keyboard shortcuts can be quicker than using the mouse.
To customize a keyboard, proceed as follows:
1. In the Events Manager, click Configure, then select Customize Keyboard. The Customize Keyboard dialog
box opens. Set up keyboard shortcuts according to the following section.

Chapter 1 - Configuring the System | 107


Configuring GMS - Administrator Guide

Parameter Description
Commands Displays the default menu of the Summary Manager. Select commands from
the list to assign keyboard shortcuts to.
Ctrl Enable to make the CTRL key part of the keyboard shortcut. This is optional.
Alt Enable to make the ALT key part of the keyboard shortcut. This is optional.
Shift Enable to make the SHIFT key part of the keyboard shortcut. This is optional.
Key Shows the keyboard shortcut. Enter a key or use the list below to select a
shortcut key to associate with the selected menu option in Commands.

Note: Ignore the "VK_" prefix to understand the actual key


represented. For example, "VK_F12" stands for the F12 key.

Reset Resets to the default shortcut key associations for all menu options.
Remove Removes the shortcut key association.
Assign Assigns the selected shortcut key association.

2. In Commands, expand a menu and select an option. If your selection already has a keyboard shortcut, it will
show in the Key field.
3. In the Shortcut Key region, select a primary key stroke (this is optional).
4. In the Key field, enter a key or select one from the list beneath.
The key combination will activate the selected menu option. For example:
Enable the Ctrl and Shift option, then select VK_F2 from the Key list for a keyboard shortcut of CTRL +
SHIFT + F2.
Enable the Ctrl option and enter Q in the Key field for a keyboard shortcut of CTRL + Q.
5. Click Assign to allocate the keyboard shortcut to selected menu option.
6. Click Close to exit and save changes, click to exit without saving.
To remove a keyboard shortcut from a menu option, proceed as follows:
1. Select the menu option in Commands.
2. Click Remove.
3. Click Close to exit and save changes, click to exit without saving.
To remove all shortcuts click Reset.

108 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Customizing the Summary Manager


In the Summary Manager, you can customize:
The color representing various site states, for example, mode, in the summary screen.
The menus for Summary Manager.
The layout of the site summary screen

When an operator logs on to GMS, their individual screen configuration is applied.

Customizing Colors
You can set the colors used in the summary screen that represent many aspects of a site. For example, the mode,
alarms, indicators and status. A site is shown as a colored square in the summary screen with other colored shapes
within or around it to represent other current information.
To customize Summary Manager colors, proceed as follows.

1. In GMS, click to open the Summary Manager.

2. In the Summary Manager, select Setup > Colors, or click . The Summary Appearance dialog box opens.

3. In the Item list, select the mode/alarm/indicator, etc, that you want to customize.
4. Click the Color 1 or Color 2 lists and select a new color from the color picker that appears (or click More
Colors from within this menu to select from a larger range of colors). The new color(s) will be displayed in
Preview region.
5. Repeat previous steps as required.
6. Click OK to save and apply the settings, or Cancel to exit without saving changes.

Customizing Menus
To customize Summary Manager menus, proceed as follows.

1. In GMS, click to open the Summary Manager.


2. In the Summary Manager, select Setup > Customize Menu. The Customize Menu: Summary Manager dialog
box opens.

Chapter 1 - Configuring the System | 109


Configuring GMS - Administrator Guide

3. In the Original Menu list, select a menu or menu option. Click to display the individual menu options.

Parameter Description
Original Menu This list displays the default Summary Manager menus.
Customized Menu This list displays the custom menu.
Add Adds the selected menu options to the Customized Menu list.
Add All Adds all menus and options to the Customized Menu list.
Remove Removes a menu from the Customized Menu list.
Print Customized Menu Prints the custom menu and any associated keyboard shortcuts.
Customize Keyboard Associates shortcut keys to menu options (see Customizing Summary Manager
Keyboard Shortcuts 110 ).

4. Click Add to include the selected menu (and all of its options) or menu option in the Customized Menu list.

Note: If you have a menu option selected in the Original Menu list, when you add it to the Customized
Menu list, its parent menu is also added.
If you have a menu selected in the Customized Menu list, when you add another menu or menu option,
it is added to that menu in the Customized Menu list.
Click Add All to add all available menus and options to the Customized Menu list.

5. To remove a menu or menu option from the Customized Menu list, select it from the Customized Menu list,
then and click Remove.
6. To print the menus you have customized, click Print Customized Menu.
7. Click OK to save these changes and exit, or Cancel to exit without saving.

Customizing Keyboard Shortcuts


You can customize keyboard shortcuts, so that combinations of key strokes activate different menu options, instead
of using the mouse. Using keyboard shortcuts can be quicker than using the mouse.
To customize a keyboard, proceed as follows.
1. In the Summary Manager, select Setup > Customize Menu. The Customize Menu: Summary Manager dialog
box opens.
2. Click Customize Keyboard. The Customize Keyboard dialog box opens. Set up keyboard shortcuts according to
the following section.

110 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Parameter Description
Commands Displays the default menu of the Summary Manager. Select commands from
the list to assign keyboard shortcuts to.
Ctrl Enable to make the CTRL key part of the keyboard shortcut. This is optional.
Alt Enable to make the ALT key part of the keyboard shortcut. This is optional.
Shift Enable to make the SHIFT key part of the keyboard shortcut. This is optional.
Key Shows the keyboard shortcut. Enter a key or use the list below to select a
shortcut key to associate with the selected menu option in Commands.

Note: Ignore the "VK_" prefix to understand the actual key


represented. For example, "VK_F12" stands for the F12 key.

Reset Resets to the default shortcut key associations for all menu options.
Remove Removes the shortcut key association.
Assign Assigns the selected shortcut key association.

3. In Commands, expand a menu and select an option. If your selection already has a keyboard shortcut, it will
show in the Key field.
4. In the Shortcut Key region select a primary key stroke (this is optional).
5. In the Key field, enter a key or select one from the list beneath.
The key combination will activate the selected menu option. For example:
Enable the Ctrl and Shift option, then select VK_F2 from the Key list for a keyboard shortcut of CTRL +
SHIFT + F2.
Enable the Ctrl option and enter Q in the Key field for a keyboard shortcut of CTRL + Q.
6. Click Assign to allocate the keyboard shortcut to selected menu option.
7. Click Close to exit and save changes, click to exit without saving.
To remove a keyboard shortcut from a menu option, proceed as follows.
1. Select the menu option in Commands.
2. Click Remove.
3. Click Close to exit and save changes, click to exit without saving.
To remove all shortcuts click Reset.

Customizing the Summary Screen Layout


You can make changes to the Summary Manager summary screen layout, such as changing the number of sites
displayed, adding or deleting sites.

Note: Any changes to the summary screen layout must be performed on the active GMS server.

To customize the summary screen layout, proceed as follows.

1. In the Summary Manager, select File > Screen Layout, or click . The Summary Screen Layout Editor
dialog box opens. Configure the display according to the following sections.

Chapter 1 - Configuring the System | 111


Configuring GMS - Administrator Guide

Sites Menu
Use the Sites menu options to select the number of sites to display. For example, select 50 and 50 sites will be
displayed even if some of them do not "exist".

Options Menu
Option Description
Add a Site Adds a new site to the summary screen.
Add Sites Adds a range of new sites to the summary screen.
Add Page Adds tabs to the summary screen.
Delete a Site Deletes a site from the summary screen. Select Delete a Site and then click on
the site you want to delete in the summary screen.
Delete Sites Deletes a range of sites from the summary screen.
Delete Inactive Sites Deletes all sites that are displayed as inactive in the currently active summary
screen tab. A site is usually regarded as inactive when it has been set up in
GMS but a linecard account has not yet been activated for the site Controller.
Delete Page Deletes tabs in the summary screen.
Locate a Site Finds a specific site/area in the summary screen.
Find Highest Site Number Displays the highest site number in the displayed site range.
Select Sub Area Adding Enables or disables site sub-area adding. If this option is disabled, you will not
be able to add maps of additional floors, levels or areas to an existing or new
site.
Reset All Sites to Inactive Sets all displayed sites to inactive. This will reset the status of all active sites.
Reset All Sites to Unused Sets all displayed sites to unused.
Save As Default Layout Saves the summary screen layout as the default for Summary Manager.
Restore Default Layout Use to restore to the original (default) layout if the summary screen layout has
been changed. This command will work only if you have previously saved a
summary screen layout as the default.
Customize Menu Defines the menu options that are displayed in the Summary Screen Layout
Editor dialog box. By customizing this menu you can determine the menu items
available to Summary Manager users (see Customizing Summary Manager
Menus 109 ).

Use the Sort menu options to set the order for displaying sites according to different site information.
When finished, select Sites > Exit, or click to close the dialog box to apply the changes.

112 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Customizing the Transaction Manager


In the Transaction Manager, you can customize:
The color of messages.
The size of the message font.
Some elements of the message format, for example, displaying the date.

Changing Message Colors


Each message group in the Transaction Manager is assigned a different color. This helps to make identification of
various message (type/source) easier. You can alter the colors for different message types.
To change message colors, proceed as follows:
1. In the Transaction Manager, select Setup > Colors. The Transaction Log Appearance dialog box opens.

2. In the Parameters region, click the colored square of the message group you want to modify.
3. Select a color from the Color Palette. The selected color will be displayed in the Preview region.
4. Click OK to save and exit, or Cancel to exit without saving.

Changing Message Font Size


You can change the size of the message font in the Transaction Manager to improve readability or desktop space.
To change message text size, proceed as follows:
1. In the Transaction Manager, select Options > Toggle Font Size.
2. Select the option again to toggle font size back to either large or small font size.

Displaying the Day and Date with Messages


GMS event messages can be displayed with the day and date.

Note: Controller messages, by default, do not include date information, however, this can be activated
(see Configuring Controller Message Date-Stamps 82 ).

To set the day/date display, proceed as follows:


1. In the Transaction Manager, select Options > Toggle Date Display.
2. Select the option again to turn it off.

Displaying Messages in Hex Format


Event messages can be displayed in hexadecimal format. Generally this command is only used for analysis and
diagnostic purposes.
To set the message display format, proceed as follows:
1. In the Transaction Manager, select Options > Toggle Hex Display.
2. Select the option again to turn it off.

Chapter 1 - Configuring the System | 113


Configuring GMS - Administrator Guide

Customizing the Site Map View


You can customize the Site Map View interface as required. The interface is divided into panels (or sections), with
each displaying specific details about the site. For example, you can choose to display or hide the site transaction log,
area summary, Events Manager details, etc. Any changes you make are stored by GMS and are automatically
applied to the Site Map View until you next change them.

Note: You can customize the Site Map View only if your GMS user privileges allow it. It is recommended
that supervisors customize the Site Map View.

Each Site Map View panel can be moved or resized. You can also control the display behavior of the panels by
clicking in the panel title bar, which displays a menu, and selecting an option.

Dockable - The panel is fixed into position within the Site Map View window. The title bar is generally lighter
in color to indicate its docked state.
Floating - The panel floats independently of the other Site Map View panels. The title bar is generally darker
in color to indicate its floating state.
Auto-Hide - The panel minimizes to a tab in the Site Map View. The panel opens when you hover the mouse
cursor over the tab.

Note: In floating or docked states, panels can be moved or resized. You can also toggle between docked
and floating states by double-clicking the panel title bar.

Moving Docked Panels in the Site Map View


You can reposition docked panels along any side of the entire Site Map View window, or within any of the docked
panels inside it. The method for moving panels may differs from earlier GMS versions.
To move docked panels in the Site Map View, proceed as follows:
1. Click and drag the title bar of a panel to undock it.
2. While dragging the panel, docking icons appear on the screen for you to select in which area to dock the panel
and its orientation. These appear as you drag the panel over each area where docking can take place.

3. Move the mouse cursor over one of the docking icons and, when it changes color, release the mouse button to
dock the panel in the new position/orientation.

Note: When you hover the mouse cursor over a docking icon, the panel position is previewed as a blue
box, so you know what the display will loook like before committing to it.

Docking Icon Description


Dock the panel horizontally along the top of the Site Map View, or along the top
of a panel inside it.
Dock the panel horizontally along the bottom of the Site Map View, or along the
bottom of a panel inside it.
Dock the panel vertically along the left side of the Site Map View, or along the
left side of a panel inside it.
Dock the panel vertically along the right side of the Site Map View, or along the
right side of a panel inside it.

114 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Auto-Hiding Docked Panels in the Site Map View


When you use auto-hide he panel minimizes to a tab in the Site Map View. The panel opens when you hover the
mouse cursor over the tab, or click it. When you move the mouse cursor off the panel, it minimizes to a tab again.
To auto-hide (or minimize) docked panels in the Site Map View, proceed as follows:
1. From the title bar of the panel you want to auto-hide, click .
-or-
Click in the title bar of the panel you want to auto-hide, then select Auto-Hide from the context menu. The
panel is minimized to a tab.

Setting Site Map View Default Display Options


You can choose the information panels (along with the site map) to display in the Site Map View when it opens.

Note: The last used docking layout is always applied.

1. Select Tools > Customize Default Layout. The Customize Default Layout dialog box opens.

2. Enable the checkbox for each data panel to display, then click OK. The default layout settings will take effect the
next time you open the Site Map View.

Note: The Geographic Maps option is available only if licensed.

3. Click OK to save the settings and close the dialog box. When the Site Map View is next opened, the new
default layout will take effect.

Chapter 1 - Configuring the System | 115


Configuring GMS - Administrator Guide

Changing Your Password


To change password, proceed as follows:
1. In GMS, select File > Change Operator Password. The Change Operator Password dialog box opens.

2. In the Old Password field, enter your existing password.


3. In the New Password and Verify Password fields, enter your new password.
4. Click OK.

If you have other parameters to edit, in GMS, select File > Operator Setup, or click .

See Configuring GMS Operators 21 .

116 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Selecting Printers
Before you can print logs, reports, site maps and the contents of various parameter screens, you must set in GMS the
printer to use. By default, GMS uses the default Windows printer.
To configure a different printer, proceed as follows:
1. In GMS, select File > Printer Setup. The Windows Print Setup dialog box opens.
2. Select the appropriate printer and other options, then click OK.

Note: The Card Access Manager always uses the default Windows printer for badge printing.

Chapter 1 - Configuring the System | 117


Configuring GMS - Administrator Guide

Editing System Data Files


GMS stores alarm and device types, modem configurations, daylight saving information and monitoring company
details in a series of text files located in the GMS directory.
You can view and edit these files. You will need the authorization password to do this.

Caution: Incorrect data entry could lead to abnormal system operation. Before editing any of the system
data files, please contact Pacom Systems.

To edit system data files, proceed as follows:


1. In GMS, select Tools > System Files > Edit System Files. The Edit System Files dialog box opens.

2. Select a file to edit from the File Selection window, then click OK.
3. The GMS text editor opens with the selected file loaded.
4. Edit the file as required.
5. Click Save to save the system file. Use the text editor controls to select another file, copy and paste, etc.

Note: If you are editing the GMS32.INI file (usually on the GMS server), you will need to restart GMS in
order for the new settings to take effect.

118 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Displaying Site ID or Account Numbers


GMS can reference sites using the Controller/site number (this is default behavior), or by a user-defined account
number (see Working with Site Map Data 203 ).

Note: Each site must be assigned an ID number before GMS can display them.

To set GMS to display sites using an account number instead of ID number, proceed as follows:
1. In GMS, select Tools > Use Account # Instead of Site ID. A tick will appear against the menu option,
indicating that it is being used.
GMS will now identify sites by their ID number instead of the Controller/site number.

Note: To reset GMS to use site ID numbers, select Tools > Use Account # Instead of Site ID. The tick
against the menu option is removed, indicating that it is not being used

Chapter 1 - Configuring the System | 119


Configuring GMS - Administrator Guide

Changing GMS Timeout Parameters


GMS uses a number of different communication protocols to communicate with various devices in the security
monitoring network. For example, the Pacom Streaming Protocol (PSP) is a high-level link protocol used for
communications between Pacom software and remote devices (such as Controllers).

Pacom Streaming Protocol (PSP)


PSP timeouts determine how long your PC will wait for responses from remote devices (such as Controllers) before
regarding the message response as failed.

Caution: In most cases, the default values for PSP timeouts are appropriate. PSP timeout parameters are
usually changed only if there is a network conflict or communications problem. For this reason it is
strongly recommended that you do not change these parameters unless instructed to do so by a Pacom
engineer.

Viewing and Editing PSP Timeouts


To view and/or edit PSP timeout parameters, proceed as follows:
1. In GMS, select Hardware > Connection Parameters > PSP Timeouts. The PSP Timeout Parameters dialog
box opens. Set parameters according to the following section.

Parameter Description
Multiplier A A weighting co-efficient in the timeout back-off algorithm. Generally, this
should not require changing. Min.= 1, max.= 255.
Multiplier B Another weighting co-efficient in the timeout back-off algorithm. Again,
should not normally be changed. Min.= 1, max.= 255.
This Time Margin A margin added to the current timeout as part of the back-off algorithm.
Measured in multiples of 100 milliseconds up to 255.
Transmitter Margin A margin added to the default timeout used by GMS when transmitting data.
Measured in multiples of 100 milliseconds up to 255.
Minimum Timeout The absolute minimum that any timeout value can be. If a timeout value less
than this is ever calculated by the back-off algorithm, this minimum value will
be used instead. Measured in multiples of 100 milliseconds up to 255.
Extra Timeout/Window The extra timeout added for each block in the window. Timeouts are based on
Block the time to receive an acknowledgement, which might not be sent until a
window has been nearly all received. Since this protocol allows for messages
being delivered out of order, the first window message may be received last,
which means that the worst case time for an acknowledgement is longer for a
larger window size. Measured in multiples of 100 milliseconds up to 255.
Maximum Retries The maximum number of times any control message will be retransmitted
without receiving a response before the process will be aborted. Min.= 1,
max.= 255.
Maximum Block The maximum number of times a retransmit block request message will be
Retransmits sent without receiving a response, or the maximum consecutive number of
times a retransmit block request message will be responded to before the
process will be aborted. Min.= 1, max.= 255.

2. Enter new values as required. To reload default values click Default.


3. Click OK to save changes and exit, or Cancel to exit without saving.

120 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Changing GMS Backup Server Drive Mapping


When GMS is installed with backup servers (that is, not a standalone installation), by default the Main, Slave and
Remote servers are mapped to network drive letters "X", "Y" and "Z". In cases where these drive letters cannot be
used, you can change them. To change the backup server drive letter mapping, proceed as follows:

Note: Drive letter mapping changes must be performed on all GMS servers and workstations.

1. Open the GMS32.INI file for editing (see Editing System Data Files 118 ).
2. In the [System Parameters] section, change the following line as required:
SERVER_DRIVE_MAPPINGS=1:,2:,3:

Where:
1 represents the Main server drive.
2 represents the Slave server drive.
3 represents the Remote server drive.

Note: All three drive letters must be given values, even if Slave and Remote servers are not used. Ensure
that each drive letter is different, regardless of whether or ot the drive is actually used.

3. Save the file.


4. Restart GMS.

Chapter 1 - Configuring the System | 121


Configuring GMS - Administrator Guide

Allowing Multiple GAG Access


GMS supports assigning up to eight Global Access Groups (GAGs) to cardholders. The feature must be enabled in the
GMS32.INI file. When enabled, additional controls become available in the Card Access Manager, Cardholders
screen, Access Level tab.
To enable multiple GAG access, proceed as follows:
1. On the GMS main server, open the GMS32.INI file for editing (see Editing System Data Files 118 ).
2. In the [System Parameters] section, add the following line:
Multi-Access Level=1

3. Save the file.


4. Restart GMS.
For details on assigning GAGs to cardholder, see Using GMS - Operator Guide, Administering Access Permissions.

122 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Setting Up Delayed Downloads for Offline Controllers


In pre-GMS 4.07 versions, when access cards are modified, the information may need to be downloaded to one or
more Controllers. The Controllers that require this information is dependent on whether or not they are part of the
card access level settings. When this occurs, GMS generates one or more "DownloadCard" commands when the card
is saved. When an access card is set as "blocked", "deleted" or "expired", GMS sends a "broadcast" command to all
Controllers.
If a Controller is either offline or on dialup during a card update command or card status broadcast command, they
may not receive the information. In particular, with card deleted/blocked/expired broadcast commands, there is a
potential security risk where a Controller may not be up-to-date at the time when a deleted, expired or blocked card
is used. GMS does notify operators when Controllers fail to receive the commands, so that it is known which
Controllers are not updated. GMS also attempts to automatically "fix" card status between GMS and Controller,
however, this happens after a card is used. To overcome this potential risk, the delayed download feature has been
implemented.
Using the delayed download feature in GMS 4.07 enables automatic re-sending of card delete/blocked/expired status
data to Controllers that were unable to receive the command at the time of original transmission. This is achieved in
conjunction with the GMS Events Publisher module. When set up, card blocked/deleted/expired commands are
monitored and the system keeps records of any Controllers that were unable to accept the commands. When those
Controllers are detected as online or are restarted, the system sends previously failed commands automatically so
that Controller is updated as soon as possible and that no secondary/manual action is required.

Note: The GMS Events Publisher must be installed (see GMS Installation Guide).
This feature is available only to Controllers that connect to GMS through Pacom Base Station or TransIT
hardware.
For more details, refer to the GMS Offline Cards Download User Guide in the Extras/OfflineCardDownload
folder of the GMS installation media.

Installing the Delayed Downloads Feature


Before you can use delayed downloads, install the Events Publisher and set up GMS to use it, as follows:
1. Install the GMS Events Publisher (see GMS Installation Guide). It does not need to be installed on the GMS
server as long as it is installed on a machine in the same domain as the GMS server.
2. From the GMS installation media, navigate to the Extras\OfflineCardsDownload\Runtime folder and copy all files
in it to a folder on the same machine that the Events Publisher is installed.

Caution: Do not store the files in the Events Publisher installation folder.

3. On the GMS server, navigate to the GMS\Customer\Updatable folder and open the GMS32.INI file in a text
editor, such as Notepad.
a. Add the following lines to the file:
[Events Publishing]
PublisherHost=x
Listenerz=OfflineCardsListener;y\OfflineCardDownload.dll;OfflineCardDownload.
OfflineCardDownload

Where:
x = The name or IP address of the computer running the Events Publisher.
y = The full local path to the folder where the OfflineCardDownload.dll file is located. For example, "C:
\GMS Features\Offline Downloads".
z = The identification number for the "listener". If there is a single listener entry, enter "1"; if there
already are other listener entries, use the next available identification number (for example, if there are
already two listener entries, enter "3").

b. Add the following lines to the [System Parameters] section of the file:
OfflineCardDownload=Yes

c. Save and close the GMS32.INI file.


4. Restart GMS on the server.

Chapter 1 - Configuring the System | 123


Configuring GMS - Administrator Guide

Configuration Settings
An XML-based configuration file named OfflineCardDownload.dll.config and located in the delayed download feature
installation folder contains the parameters that control delayed download operation. You can edit the operational
parameters, if required, using a text editor, such as Notepad.

Caution: Do not change any of the XML markup tags (located between "<" and ">" characters) that are
either side of parameter values.

Note: It is recommended to change default settings only if required.

Parameter Description
DownloadMessageInQSeconds The length of time (in seconds) to allow for an acknowledgement to a
card download message before it is considered "failed" and is stored as a
delayed download. Min. = 2, default = 30.
CapturedDeleteOrBlockKeep The length of time (in hours) that delayed card delete/blocked downloads
Hours are kept for. Minimum = 1, default = 24.
RemoveExpiredDeletesAnd How often (in hours) to check for expired delayed downloads. Expired
BlocksPeriodHours delayed downloads are deleted. Minimum = 1, default = 1.
RtuStayOnlineTimeLowMinutes The default length of time (in minutes) that a Controller on dialup can
stay connected without any alarms. Minimum = 0, default = 0.
RtuStayOnlineTimeHighMinutes The maximum length of time (in minutes) that a Controller on dialup can
stay connected without any alarms. Minimum = 1, default = 5.
PauseAfterResendMilliseconds The length of time (in milliseconds) that the system pauses for after re-
sending a message. This helps reduce system loading. Minimum = 100,
default = 500.
DataFolder The name of a folder where the system can create necessary sub-folders
required for operation. If no value is entered, the folders are created
where the OfflineCardDownload.dll file is located.
CapturedDeletesAndBlocksFileNa Represents the naming convention (excluding file extension) for the file
meBase used to store failed card delete/block requests. Default =
"CapturedDeletesAndBlocks".
RepeatedDeletesAndBlocksFileNa Represents the naming convention (excluding file extension) for
meBase temporary files used to store failed card delete/block requests whilst they
are being re-sent. Default = "RepeatedDeletesAndBlocks_".
FailedDownloadsFileNameBase Represents the naming convention (excluding file extension and
Controller ID number) for the file used to store failed downloads for a
Controller. Default = "FailedDownloads_".
RepeatedDownloadsFileName Represents the naming convention (excluding file extension and
Base Controller ID number) for temporary files used to store failed downloads
whilst they are being re-sent for download. Default =
"RepeatedDownloads_".
FileNameExtension Represents the file extension to use for all files created for delayed
downloads. Default = ".txt".
GmsOperatorInitialsOrDisplay A GMS user account name (initial or display name or full name, as used
NameOrFullname by GMS) that the system uses to run the delayed downloads feature.
Default = "a".

Note: A valid GMS user account must be provided for delayed


download functionality.

GmsOperatorPassword The password for the GMS user account set in


GmsOperatorInitialsOrDisplayNameOrFullname. Default = "1".
DeleteAndBlockInSentByMe The length of time (in seconds) that re-sent card delete/blocked requests
Seconds are kept aside for to avoid capturing them as a delayed download again.
Default = 60.
TraceLowDebugMessages Used for fault finding.
TraceDebugMessages Used for fault finding.
TraceInfoMessages Used for fault finding.

Note: Critical error and warning messages are always traced/


logged.

124 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Parameter Description
TraceExceptionStack Used for fault finding.
TraceDateTime Used for fault finding.
TraceThreadId Used for fault finding.

Chapter 1 - Configuring the System | 125


Configuring GMS - Administrator Guide

Setting Up Delayed Alarm Notifications


In GMS 4.07, it is possible to "delay" alarm notifications to operators based on special conditions. That is, GMS does
not present the event to the operator unless another condition is also met. The feature is generally designed to
reduce "false alarms" and is for use with particular industry requirements (namely, UK and Irish banks).
Using the delayed alarm notification feature enables the system to generate events in GMS based on certain
conditions, rather than an alarm event being generated as a default GMS behavior. This is achieved in conjunction
with the GMS Events Publisher module and message priority settings - alarm points that are to be "delayed" must
initially be configured with an alarm priority setting of "0". Events with priority settings of "0" are sent to the delayed
alarm "listener" (and not to GMS), where depending on settings and other circumstances, they can be "escalated" to
a GMS event that has a priority of greater than "0" (requiring operator notification/action). Escalation occurs when
either of the following conditions are met:
Escalate if confirmed - An alarm is escalated if a confirmation alarm is received within a set amount of time.
For example, a PIR alarm - it should be escalated only if another PIR in the same alarm area generates an
alarm.
Escalate if not cancelled - An alarm is escalated if no cancellation message is received within a set amount of
time. For example, a "Raid alarm" - it should be escalated only if no "Cancel Alarm" message is received
(generated by a user from a keypad, for instance).
Mapping of alarm points, alarm priorities, delay lengths and confirmation points are handled through a configuration
file see Configuring Controllers - Technician Guide, Configuring Delayed Alarm Points.

Note: The GMS Events Publisher must be installed (see GMS Installation Guide).
Sites that are in Suspend mode do not generate events.
Secondary point activations that occur during the original event delay timer will not restart or cancel the
original delay timer.
For more details, refer to the GMS Delayed Alarms Solution Implementation document in the Extras/
DelayedAlarms folder of the GMS installation media.

Installing the Delayed Alarm Notifications Feature


Before you can use delayed alarm notifications, install the Events Publisher and set up GMS to use it, as follows:
1. Install the GMS Events Publisher (see GMS Installation Guide). It does not need to be installed on the GMS
server as long as it is installed on a machine in the same domain as the GMS server.
2. From the GMS installation media, navigate to the Extras\DelayedAlarms folder and copy all files in it to a folder
on the same machine that the Events Publisher is installed.

Caution: Do not store the files in the Events Publisher installation folder.

3. On the GMS server, navigate to the GMS\Customer\Updatable folder and open the GMS32.INI file in a text
editor, such as Notepad.
a. Add the following lines to the file:
[Events Publishing]
PublisherHost=x
Listenerz=DelayedAlarmsListener;y\Pacom.DelayedAlarmListener.dll;Pacom.Listener.
DelayedAlarmListener

Where:
x = The name or IP address of the computer running the Events Publisher.
y = The full local path to the folder where the Pacom.DelayedAlarmListener.dll file is located. For
example, "C:\GMS Features\Delayed Alarms".
z = The identification number for the "listener". If there is a single listener entry, enter "1"; if there
already are other listener entries, use the next available identification number (for example, if there are
already two listener entries, enter "3").

b. Save and close the GMS32.INI file.


4. Restart GMS on the server.

126 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Configuration Settings
An XML-based configuration file named DelayAlarmListenerConfig.xml and located in the delayed alarm feature
installation folder contains the parameters that control basic delayed alarm operation. You can edit the parameters if
required, using a text editor, such as Notepad.

Caution: Do not change any of the XML markup tags (located between "<" and ">" characters) that are
either side of parameter values.

Note: It is recommended to change default settings only if required.

Parameter Description
ServerName The name or IP address of each GMS server (Main, Slave, Remote etc)
machine.
InstalledLanguage The name of the language that GMS uses. The name must match the
name of the language sub-folder in the GMS\Language folder.
DebounceMsgExpiryTime The time (in milliseconds) to wait for a subsequent alarm message from
the same point, indicating a debounce condition (multiple activations
within a short amount of time). Debounced alarms are ignored.
RefreshDebounceMsgs The length of time (in minutes) that any debounce messages are stored
for.

Chapter 1 - Configuring the System | 127


Configuring GMS - Administrator Guide

Configuring IVR Operation


The GMS interactive voice response (IVR) facility allows engineers to call a GMS workstation in order to place a site in
Suspend mode and to send commands to Controllers. IVR requires a voice over Internet protocol (VoIP) and/or ISDN
(using Dialogic hardware) drivers for operation. Suspend mode is a temporary system mode that disables alarm
reporting for the purposes of testing input and output points for correct operation.
An example of use would be a technician on site wanting to check the operation of input points. They could use IVR to
call in and place the site in Suspend mode. Then, walk around to the various input points and activate them - GMS
keeps a record of all point activity during Suspend mode. The technician can then use IVR to play back all the events
that have been recorded during Suspend mode for the site, confirming the operation of each tested input point.

Note: IVR operation is licensed. You must have a suitable license activated in order to set up IVR
parameters.

The IVR facility uses a text-to-speech engine to convert text strings into an audible speaking voice that the caller
interacts with using the telephone keypad. You can also use .wav files instead of text-to-speech. Where a specified .
wav file in unavailable, text-to-speech will be used instead.

Note: An independent server is required for each communications platform must be available on the
network in order to establish communication between callers and GMS. That is, if VoIP and ISDN is used, a
separate server is required for each.

IVR operation is secure in that callers must supply a valid user ID number and PIN as well as an overall system
security code in order to gain access to the IVR menus. In addition to the log on requirements, callers must also be:
In the GMS global contacts list (see Creating and Managing a Global Contacts List 68 ).
Be categorized as "Engineer" (see Creating and Managing a Global Contacts List 68 ).
The following image shows the general IVR structure. For information on using the IVR facility, see Configuring
Controllers - Technician Guide, Using the IVR Facility.

When IVR is being used, messages are displayed and logged by the Transaction Manager (see Using the
Transaction Manager 212 ). The messages cover both log on activity as well as actions carried out by the IVR caller,
providing a log of all IVR activity.

Configuring IVR
The text strings and other IVR parameters are customizable from INI files located in the GMS\Language\[language
name] and GMS\Customer\Updatable folders. The settings need only be applied on the GMS server for all but the
IVR.INI file, as workstations inherit the properties of these files to ensure common IVR operation. The files are:
IVR.INI 131 - Used to determine the text-to-speech engine attributes and the location of the IVR driver.
IVRCommon.INI 132 - Used to set a number of common IVR operation parameters including log on and main
menu.
IVREngineer.INI 138 - Used to control the menu structure once the IVR caller is logged on.
IVREngineerLogged.INI 147 - Used to control the menu structure when the IVR caller logs on again after
switching a site to Suspend mode.
Parts of the configuration are available directly in GMS.
To configure IVR in GMS, proceed as follows:
1. In GMS, select Interfaces > IVR. The IVR System dialog box opens.

128 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

2. Click the Settings tab and configure the system according to the following section.

Parameter Description
Operational Hours Enter the start and end times of the day (in 24-hour format) that IVR calls
are accepted.
Phone number to use for Enter the telephone number to display on the receiving caller ID enabled
caller ID handset.

Note: This feature may depend on the telephony equipment being


used.

To access an outside line, Enter a pre-dial number to make an external call, if required. For example, if
dial you need to dial "1" to get a dial tone before calling an external number,
enter 1.
Logon attempts before Enter the number of times that an IVR caller can attempt to log on
disconnect unsuccessfully before they are automatically disconnected from the IVR
system.
Input attempts before Enter the number of times that a logged on IVR caller can make an invalid
abort selection before they are automatically disconnected from the IVR system.
Transfer all calls to the Lists the operator telephone numbers to transfer IVR calls to, when the IVR
operator(s) caller requests an operator.

Note: The IVR system will only attempt to use the first three
numbers in the list.
If the list is empty, the IVR caller will be disconnected immediately
after requesting an operator.

Edit Click to edit the telephone number of the selected operator in the Transfer
all calls to the operator(s) list. The Edit Phone No. dialog box opens.

Edit the number as required, then click OK.


Delete Click to delete the telephone number of the selected operator in the Transfer
all calls to the operator(s) list.
New Click to add the telephone number for an operator in the Transfer all calls
to the operator(s) list. The Add Phone No. dialog box opens.

Chapter 1 - Configuring the System | 129


Configuring GMS - Administrator Guide

Parameter Description

Enter the number as required, then click OK.


Working Time
Maximum time a site can Enter the maximum time (in hours and minutes) that a site can be placed into
stay in Suspend mode Suspend mode for. During suspend mode, engineers can extend the time as
required, however, in blocks of time no larger than this setting.
Call back 5 minutes prior Enable for GMS to contact the IVR caller to inform them that Suspend mode
to test time expiration will end in five minutes. This gives the caller the opportunity to extend the
time before the site is switched back to Day mode.
Attempt reset at test Enable for GMS to automatically return the site to Day mode when the
time expiration requested time for a site to stay in Suspend mode is reached.
Call back every 5 minutes Enable for GMS to contact the IVR caller to inform them that switching back
if reset fails to Day mode has failed. For example, if the site still has points in alarm. This
will continue until the problem is rectified. If the IVR caller cannot be
reached, the system will inform a site contact of the problem.
Sites Placed in Suspend Mode
Table (unlabelled) Lists all sites currently in suspend mode, showing site ID number, name and
contact telephone number. Click an entry to select it.
Reset Click to reset the selected site from Suspend mode back to Day mode and
remove it from the table.

Note: If the site has points still in alarm as a result of actions taken
during Suspend mode, the site is removed from the table, however,
will return to Day mode only after the appropriate points are taken
out of alarm.

Reset All Click to reset all sites displayed in the table.

When finished, click OK to save and apply changes, or Cancel to exit.

Managing IVR Channels


GMS supports up to 63 simultaneous IVR connections. Each connected IVR call is classified as a "channel". The
Channels tab of the IVR System dialog box displays a table of currently active IVR users. Information includes the
call status of the channel (idle, active etc), IVR caller contact name, ID numbers, the site being interacted with and
the mode that the site has been placed in.

You can use the controls on the Channels tab to view channels and also to drop IVR calls.
To drop a single call, select it in the table, then click Drop Call.
To drop all calls at once, click Drop All Calls.

130 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

The IVR.INI File


This file controls a range of common IVR parameters and can be customized as per customer requirements. The
following sections details parts of the file that can be customized.

[SETTING-TABLE]
Parameter Description Example
VoiceAttrib Determines the name of the text-to-speech VoiceAttrib = Name = Microsoft
engine and "voice" to use. Anna
DriverDll Determines the dll file of the IVR driver. DriverDll = SIPVOIPDriver.dll

Chapter 1 - Configuring the System | 131


Configuring GMS - Administrator Guide

The IVRCommon.INI File


This file controls a range of common IVR parameters and can be customized as per customer requirements. The file is
organized into sections - each controlling specific aspects of operation. The following sections details parts of the file
that can be customized.

Note: For text-to-speech translation, spaces are required in acronyms in order for the letters to be
translated individually and not as a single "word". For example, "I V R".
Each parameter can use a .wav file also. The .wav file parameters are ignored in the following table.
Some parameters that should not be changed are not included in the following tables.

[STRING-TABLE]
Parameter Message Description Example
AfterHourText Used when a caller tries to use IVR out of AfterHourText = "Sorry, the I
permitted hours. V R system is out of hours. For
assistance, dial direct to speak
to an operator."
AlertedWorkTimeText Used to notify a caller that their session has AlertedWorkTimeText = "There
reached a set time before expiring. is 5 minutes left of your
session. Please log on again to
extend your session."
ExpiredWorkTimeText Used when a caller's permitted session time ExpiredWorkTimeText = "Your
expires and GMS is unable to return the system session has expired. The site
to Day mode because of alarms set in Suspend could not be returned to day
mode. mode, there may be points still
in alarm. Please log on to the I
V R system again and reset the
points."
InstrMsgText Used after the WelcomeMsgText as part of the InstrMsgText = "Make your
initial IVR answer message. selection at any time without
waiting to hear all the
instructions."
InvalidSelectionText Used when the caller selects a non-existent InvalidSelectionText = "Invalid
option, site or point. selection. Try again."
InvalidLoginText Used when the caller's log on credentials are InvalidLoginText = "Invalid log
failed. on details."
LastPlayBkEventText Used during event play back when identifying LastPlayBkEventText = "That
the last event recorded during Suspend mode. was the last event."
LoggedONText Used when the caller's log on credentials are LoggedONText = "You are
accepted. logged on to %s. Please
choose one of the following
options."
MainMenuBackText Used when the caller is returned to the main MainMenuBackText = "You are
menu after performing an action. back to the main menu, please
make a selection."
MainMenuText Used to introduce the main menu, after the MainMenuText = "This is the
LoggedONText message. main menu. You can press the
asterisk key at any time to
return here."
NoPlayBkEventText Used during event play back when no events NoPlayBkEventText = "There
were recorded during Suspend mode. were no events to play back."
NotSuspendModeText Used when the site has been returned to Day NotSuspendModeText = "An
mode from Suspend mode by a GMS operator error has occurred. The site is
before the Suspend mode timeout, or being no longer in Suspend mode."
moved from Suspend mode by the IVR caller.
PlayBkStartText Used when the IVR caller requests Suspend PlayBkStartText = "During play
mode event play back. back, press any key to skip the
current event, or asterisk key
to abort."
TalkToOperatorText Used when the IVR caller elects to be TalkToOperatorText = "Please
transferred to a GMS operator. wait, your call is being
transferred to an operator."
TerminateText Used after the IVR caller has performed an TerminateText = "Thank you
action that requires the call to end. for using the I V R System.
Please hang up."

132 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Parameter Message Description Example


TransferFailureText Used when GMS operators fail to answer a call TransferFailureText = "Sorry,
transferred to them by IVR within the timeout all operators are currently
setting. busy. Please dial direct to
speak to an operator."
TransferProgressText Used intermittently when waiting for GMS TransferProgressText = "Thank
operators to answer a call transferred to them you for continuing to hold, an
by IVR. operator will be with you
shortly."
UnableToTransferText Used when an attempt by IVR to transfer a call UnableToTransferText =
fails. "Sorry, we are unable to
transfer your call. Please dial
direct to speak to an operator."
WelcomeMsgText Used before the InstrMsgText as part of the WelcomeMsgText = "Welcome
initial IVR answer message. to the I V R system."

[CALLEND]
Parameter Message Description Example
Options Determines the total number of caller selectable Options = 2
options available after the caller fails to select a
menu option after all retries have occurred.
OptionX Determines the order and text for each caller Option0 = "Select one of the
selectable option. following options."
Option1 = "To terminate the
Note: Option0 is not recognized as a call, press 0."
caller selectable option. Option2 = "To speak to an
operator, press 5."
Keys Determines the keys that correspond with caller Keys = 0,5
selectable options.
HotKeyEnabled Determines whether or not the caller can press HotKeyEnabled = 0
asterisk (*) to return to the main menu. 0 =
disabled, 1 = enabled.

[DATA-CONFIRM]
Parameter Message Description Example
Options Determines the keys that the caller can press to Options = 2
either confirm or cancel a selection or action.
OptionX Determines the order and text for each caller Option1 = "To continue using
selectable option. the current selection, press 1."
Option2 = "To cancel the
current selection and re-enter,
press 0."
Keys Determines the keys that correspond with caller Keys = 1,0
selectable options.

[USER_ID]
Parameter Message Description Example
DataText Used when requesting the caller's user ID DataText = "Enter 4 digit user I
number during IVR log on. D."
ErrorText Used when the caller enters an unrecognized ErrorText = "Invalid user I D
user ID number during IVR log on. entered."
Length Determines the number of digits that make up a Length = 4
user ID sequence.
Min Determines the lowest acceptable user ID Min = 1
number.
Max Determines the highest acceptable user ID Max = 999
number.

Chapter 1 - Configuring the System | 133


Configuring GMS - Administrator Guide

Parameter Message Description Example


ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0
the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have
entered key sequence when ConfirmEnabled is entered %s."
on. The "%s" portion represents the key
sequence.

[SECURITY_CODE]
Parameter Message Description Example
DataText Used when requesting the IVR security code. DataText = "Enter 4 digit
security code."
ErrorText Used when the caller enters an unrecognized ErrorText = "Invalid security
security code during IVR log on. code entered."
Length Determines the number of digits that make up Length = 4
the security code sequence.

[USER_PIN]
Parameter Message Description Example
DataText Used when requesting the caller's PIN during DataText = "Enter 4 digit user
IVR log on. pin."
ErrorText Used when the caller enters an unrecognized ErrorText = "Invalid user pin
user PIN during IVR log on. entered."
Length Determines the number of digits that make up Length = 4
a user PIN sequence.
ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0
the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have
entered key sequence when ConfirmEnabled is entered %s."
on. The "%s" portion represents the key
sequence.

[RTU_NO]
Parameter Message Description Example
DataText Used when requesting the Controller/site DataText = "Enter 5 digit site
number to perform an action on. number."
ErrorText Used when the caller enters an unrecognized ErrorText = "Invalid site number
Controller/site ID number. entered."
Length Determines the number of digits that make up Length = 6
a Controller/site ID number sequence.
Min Determines the lowest acceptable Controller/ Min = 1
site ID number.
Max Determines the highest acceptable Controller/ Max = 99999
site ID number.
ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0
the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have
entered key sequence when ConfirmEnabled is entered %s."
on. The "%s" portion represents the key
sequence.

134 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

[INPUT_POINT]
Parameter Message Description Example
DataText Used when requesting the input point number DataText = "Enter 3 digit input
to perform an action on. point number."
ErrorText Used when the caller enters an unrecognized ErrorText = "Invalid input point
input point number. entered."
Length Determines the number of digits that make up Length = 3
an input point number sequence.
Min Determines the lowest acceptable input point Min = 1
number.
Max Determines the highest acceptable input point Max = 256
number.

Note: A Controller can support up to


256 input points.

ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0


the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have
entered key sequence when ConfirmEnabled is entered %s."
on. The "%s" portion represents the key
sequence.

[OUTPUT_POINT]
Parameter Message Description Example
DataText Used when requesting the output point DataText = "Enter 2 digit output
number to perform an action on. point number."
ErrorText Used when the caller enters an unrecognized ErrorText = "Invalid output point
output point number. entered."
Length Determines the number of digits that make up Length = 2
an output point number sequence.
Min Determines the lowest acceptable output point Min = 1
number.
Max Determines the highest acceptable output Max = 64
point number.

Note: A Controller can support up to


64 output points.

ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0


the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have
entered key sequence when ConfirmEnabled is entered %s."
on. The "%s" portion represents the key
sequence.

[PHONE_NO]
Parameter Message Description Example
DataText Used when requesting the telephone number DataText = "Enter a contact
of a contact to call. telephone number followed by
the hash key."
ErrorText Used when the caller enters an unrecognized ErrorText = "Invalid contact
telephone number. telephone number entered."
ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0
the entered key sequence back to the caller. 0
= disabled, 1 = enabled.

Chapter 1 - Configuring the System | 135


Configuring GMS - Administrator Guide

Parameter Message Description Example


ConfirmText Used as the message before repeating the ConfirmText = "You have
entered key sequence when ConfirmEnabled is entered %s."
on. The "%s" portion represents the key
sequence.

[DURATION]
Parameter Message Description Example
DataText Used when requesting the duration of an DataText = "Enter 4 digit time
action in hours and minutes (not including duration."
Suspend mode or soak duration).
ErrorText Used when the caller enters an invalid time. ErrorText = "Invalid time
entered."
Min Determines the lowest acceptable time Min = 0001
duration.
Max Determines the highest acceptable time Max = 2359
duration.

Note: The maximum time duration is


23 hours 59 minutes.

ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0


the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have entered
entered key sequence when ConfirmEnabled is %s hours and %s minutes."
on. The "%s" portion represents the key
sequence.

[DURATION_SUSPEND_MODE]
Parameter Message Description Example
DataText Used when requesting the duration of DataText = "Enter 4 digit time
Suspend mode. duration."
ErrorText Used when the caller enters an invalid time. ErrorText = "Invalid time
entered."
Min Determines the lowest acceptable time Min = 0001
duration.
Max Determines the highest acceptable time Max = 2359
duration.

Note: The maximum time duration is


23 hours 59 minutes.

ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0


the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have entered
entered key sequence when ConfirmEnabled is %s hours and %s minutes."
on. The "%s" portion represents the key
sequence.

[DURATION_DAYS]
Parameter Message Description Example
DataText Used when requesting the duration of a soak DataText = "Enter 2 digit time
action in days. duration in days."
ErrorText Used when the caller enters an invalid time. ErrorText = "Invalid time
entered."

136 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

Parameter Message Description Example


Min Determines the lowest acceptable time Min = 00
duration.
Max Determines the highest acceptable time Max = 99
duration.

Note: The maximum time duration is


99 days.

ConfirmEnabled Determines whether or not to audibly confirm ConfirmEnabled = 0


the entered key sequence back to the caller. 0
= disabled, 1 = enabled.
ConfirmText Used as the message before repeating the ConfirmText = "You have entered
entered key sequence when ConfirmEnabled %s days."
is on. The "%s" portion represents the key
sequence.

[DURATION_TOO_LONG]
Parameter Message Description Example
ConfirmText Used when the caller's requested duration for ConfirmText = "The time duration
an action exceeds system settings. you have entered exceeds the
available maximum. The duration
Note: The maximum available has been set to %s hours and %s
duration for the requested action is minutes."
automatically applied.

Chapter 1 - Configuring the System | 137


Configuring GMS - Administrator Guide

The IVREngineer.INI File


This file has a range of parameters for controlling the main IVR menu after log on and can be customized as per
customer requirements. The file is organized into sections - each controlling specific aspects of operation. The
following sections details parts of the file that can be customized.

Note: For text-to-speech translation, spaces are required in acronyms in order for the letters to be
translated individually and not as a single "word". For example, "I V R".
Each parameter can use a .wav file also. The .wav file parameters are ignored in the following table.
Some parameters that should not be changed are not included in the following tables.

[ROOT]
Parameter Message Description Example
Options Determines the total number of caller selectable Options = 2
options available.
OptionX Determines the order and text for each caller Option1 = "To place a site in
selectable option. Suspend mode, press 2."
Option2 = "For Controller
commands, press 3."
Keys Determines the keys that correspond with caller Keys = 2,3
selectable options.
GoBackEnabled Determines whether or not the caller can press 1 GoBackEnabled = 0
to return to the previous menu. 0 = disabled, 1
= enabled.

[ROOT-1]
Parameter Message Description Example
Options Determines the keys that the caller can press to Options = 2
either confirm or cancel a site selection to be
removed from Suspend mode.
OptionX Determines the order and text for each caller Option1 = "You have requested
selectable option. switching the current site into
Suspend mode."
Option2 = "Press 1 to confirm,
or 0 to cancel."
Keys Determines the keys that correspond with caller Keys = 1,0
selectable options.

[ROOT-1-1]
Parameter Message Description Example
Option1 Determines the text to apply when the caller Option1 = "Operation
cancels switching a site into Suspend mode. cancelled."

[ROOT-1-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when the site Option1 = "Cannot switch
cannot be switched into Suspend mode due to current site into Suspend
error. mode."

138 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

[ROOT-1-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when the site has Option1 = "The current site has
successfully switched from Day to Suspend been switched into Suspend
mode. mode."

[ROOT-1-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when the site Option1 = "Cannot switch
cannot be switched into Suspend mode due to current site into Suspend mode.
it not being in Day mode before the request. The site can only be put into
Suspend mode from Day mode."

[ROOT-2]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 5
to select available Controller commands.
OptionX Determines the order and text for each caller Option1 = "To reset all latched
selectable option. input points, press 1."
Option2 = "To reset all latched
output points, press 2."
Option3 = "To isolate or de-
isolate an input point, press 4."
Option4 = "To turn on or off an
output point, press 5."
Option5 = "To soak or unsoak
an input point, press 6."
Keys Determines the keys that correspond with Keys = 1,2,4,5,6
caller selectable options.

[ROOT-2-1]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to either confirm or cancel resetting latched
points.
OptionX Determines the order and text for each caller Option1 = "You have requested
selectable option. The "%s" portions represents resetting latched alarm points at
user selected variables. site %s."
Option2 = "Press 1 to confirm,
or 0 to cancel."
Keys Determines the keys that correspond with Keys = 1,0
caller selectable options.

[ROOT-2-1-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling a Option1 = "Operation cancelled
reset latched points command. successfully."

Chapter 1 - Configuring the System | 139


Configuring GMS - Administrator Guide

[ROOT-2-1-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when a reset Option1 = "Cannot reset latched
latched points command fails. alarm points at the current site."

[ROOT-2-1-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when a reset Option1 = "Latched alarm points
latched points command is successful. The "% at site %s reset."
s" portions represents user selected variables.

[ROOT-2-3]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to isolate/de-isolate an input point.
OptionX Determines the order and text for each caller Option1 = "To isolate an input
selectable option. point, press 1."
Option2 = "To de-isolate an input
point, press 2."
Keys Determines the keys that correspond with Keys = 1,2
caller selectable options.

[ROOT-2-3-1]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to either confirm or cancel isolating an input
point.
OptionX Determines the order and text for each caller Option1 = "Site %s selected. You
selectable option. The "%s" portions have requested isolating input
represents user selected variables. point %s for %s hours and %s
minutes."
Note: The order of %s variables must Option2 = "Press 1 to confirm, or
be maintained as per the example. 0 to cancel."

Keys Determines the keys that correspond with Keys = 1,0


caller selectable options.

[ROOT-2-3-1-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling Option1 = "Operation cancelled
an isolate input point command. successfully."

[ROOT-2-3-1-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when an isolate Option1 = "Cannot isolate
input point command fails. selected input point."

140 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

[ROOT-2-3-1-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when an isolate Option1 = "Site %s selected.
input point command is successful. The "%s" Input point %s successfully
portions represents user selected variables. isolated for %s hours and %s
minutes."
Note: The order of %s variables must
be maintained as per the example.

[ROOT-2-3-1-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when an isolate Option1 = "The selected input
input point command fails because the point is point is already isolated."
already isolated.

[ROOT-2-3-2]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to either confirm or cancel de-isolating an
input point.
OptionX Determines the order and text for each caller Option1 = "Site %s selected. You
selectable option. The "%s" portions have requested de-isolating input
represents user selected variables. point %s for %s hours and %s
minutes."
Note: The order of %s variables Option2 = "Press 1 to confirm, or
must be maintained as per the 0 to cancel."
example.

Keys Determines the keys that correspond with Keys = 1,0


caller selectable options.

[ROOT-2-3-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling Option1 = "Operation cancelled
a de-isolate input point command. successfully."

[ROOT-2-3-2-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when a de- Option1 = "Cannot de-isolate
isolate input point command fails. selected input point."

[ROOT-2-3-2-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when a de- Option1 = "Site %s selected.
isolate input point command is successful. Input point %s successfully de-
The "%s" portions represents user selected isolated."
variables.

Chapter 1 - Configuring the System | 141


Configuring GMS - Administrator Guide

Parameter Message Description Example

Note: The order of %s variables


must be maintained as per the
example.

[ROOT-2-3-2-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when a de- Option1 = "The selected input
isolate input point command fails because the point is already de-isolated."
point is already de-isolated.

[ROOT-2-4]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to activate/deactivate an output point.
OptionX Determines the order and text for each caller Option1 = "To activate an output
selectable option. point, press 1."
Option2 = "To deactivate an
output point, press 2."
Keys Determines the keys that correspond with Keys = 1,2
caller selectable options.

[ROOT-2-4-1]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to either confirm or cancel activating an
output point.
OptionX Determines the order and text for each caller Option1 = "Site %s selected. You
selectable option. The "%s" portions have requested activating output
represents user selected variables. point %s for %s hours and %s
minutes."
Note: The order of %s variables Option2 = "Press 1 to confirm, or
must be maintained as per the 0 to cancel."
example.

Keys Determines the keys that correspond with Keys = 1,0


caller selectable options.

[ROOT-2-4-1-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling Option1 = "Operation cancelled
an activate output point command. successfully."

[ROOT-2-4-1-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when an Option1 = "Cannot activate
activate output point command fails. selected output point."

142 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

[ROOT-2-4-1-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when an Option1 = "Site %s selected.
activate output point command is successful. Output point %s successfully
The "%s" portions represents user selected activated for %s hours and %s
variables. minutes."

Note: The order of %s variables


must be maintained as per the
example.

[ROOT-2-4-1-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when an Option1 = "The selected output
activate output point command fails because point is already active."
the point is already activated.

[ROOT-2-4-2]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to either confirm or cancel deactivating an
output point.
OptionX Determines the order and text for each caller Option1 = "Site %s selected. You
selectable option. The "%s" portions have requested deactivating
represents user selected variables. output point %s."
Option2 = "Press 1 to confirm, or
Note: The order of %s variables must 0 to cancel."
be maintained as per the example.

Keys Determines the keys that correspond with Keys = 1,0


caller selectable options.

[ROOT-2-4-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling Option1 = "Operation cancelled
a deactivate output point command. successfully."

[ROOT-2-4-2-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when a Option1 = "Cannot deactivate
deactivate output point command fails. selected output point."

[ROOT-2-4-2-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when a deactivate Option1 = "Site %s selected.
output point command is successful. The "%s" Output point %s successfully
portions represents user selected variables. deactivated."

Chapter 1 - Configuring the System | 143


Configuring GMS - Administrator Guide

Parameter Message Description Example

Note: The order of %s variables must


be maintained as per the example.

[ROOT-2-4-2-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when a deactivate Option1 = "The selected output
output point command fails because the point point is already inactive."
is already activated.

[ROOT-2-5]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to soak/unsoak an input point.
OptionX Determines the order and text for each caller Option1 = "To soak an input
selectable option. point, press 1."
Option2 = "To unsoak an input
point, press 2."
Keys Determines the keys that correspond with Keys = 1,2
caller selectable options.

[ROOT-2-5-1]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to either confirm or cancel soaking an input
point.
OptionX Determines the order and text for each caller Option1 = "Site %s selected.
selectable option. The "%s" portions represents You have requested soaking
user selected variables. input point %s for %s days."
Option2 = "Press 1 to confirm,
Note: The order of %s variables must or 0 to cancel."
be maintained as per the example.

Keys Determines the keys that correspond with caller Keys = 1,0
selectable options.

[ROOT-2-5-1-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling a Option1 = "Operation cancelled
soak input point command. successfully."

[ROOT-2-5-1-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when a soak input Option1 = "Cannot soak
point command fails. selected input point."

144 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

[ROOT-2-5-1-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when a soak input Option1 = "Site %s selected.
point command is successful. The "%s" portions Input point %s successfully
represents user selected variables. soaked for %s days."

Note: The order of %s variables must


be maintained as per the example.

[ROOT-2-5-1-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when a soak input Option1 = "The selected input
point command fails because the point is point is already soaked."
already soaked.

[ROOT-2-5-2]
Parameter Message Description Example
Options Determines the keys that the caller can press to Options = 2
either confirm or cancel unsoaking an input
point.
OptionX Determines the order and text for each caller Option1 = "Site %s selected.
selectable option. The "%s" portions represents You have requested unsoaking
user selected variables. input point %s."
Option2 = "Press 1 to confirm,
Note: The order of %s variables must or 0 to cancel."
be maintained as per the example.

Keys Determines the keys that correspond with caller Keys = 1,0
selectable options.

[ROOT-2-5-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling an Option1 = "Operation cancelled
unsoak input point command. successfully."

[ROOT-2-5-2-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when an unsoak Option1 = "Cannot unsoak
input point command fails. selected input point."

[ROOT-2-5-2-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when an unsoak Option1 = "Site %s selected.
input point command is successful. The "%s" Input point %s successfully
portions represents user selected variables. unsoaked."

Note: The order of %s variables must


be maintained as per the example.

Chapter 1 - Configuring the System | 145


Configuring GMS - Administrator Guide

[ROOT-2-5-2-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when an unsoak Option1 = "The selected input
input point command fails because the point is point is already unsoaked."
already unsoaked.

146 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

The IVREngineerLogged.INI File


This file has a range of parameters controlling the main IVR menu after switching a site to Suspend mode and can be
customized as per customer requirements. The file is organized into sections - each controlling specific aspects of
operation. The following sections details parts of the file that can be customized.

Note: For text-to-speech translation, spaces are required in acronyms in order for the letters to be
translated individually and not as a single "word". For example, "I V R".
Each parameter can use a .wav file also. The .wav file parameters are ignored in the following table.
Some parameters that should not be changed are not included in the following tables.
The remainder of the file is the same Controller command parameters as per the IVREngineer.INI file
(see The IVREngineer.INI File 138 ). For consistent operation, it is best to have the same parameters in
both files.

[ROOT]
Parameter Message Description Example
Options Determines the total number of caller selectable Options = 4
options available.
OptionX Determines the order and text for each caller Option1 = "To switch the
selectable option. current site from Suspend to
Day mode, press 1."
Option2 = "To set the time the
current site stays in Suspend
mode, press 2."
Option3 = "To play back
events, press 3."
Option4 = "For Controller
commands, press 9."
Keys Determines the keys that correspond with caller Keys = 1,2,3,9
selectable options.
GoBackEnabled Determines whether or not the caller can press GoBackEnabled = 0
1 to return to the previous menu. 0 = disabled,
1 = enabled.

[ROOT-1]
Parameter Message Description Example
Options Determines the keys that the caller can press to Options = 2
either confirm or cancel switching a site from
Suspend back to Day mode.
OptionX Determines the order and text for each caller Option1 = "You have requested
selectable option. switching the current site from
Suspend mode."
Option2 = "Press 1 to confirm,
or 0 to cancel."
Keys Determines the keys that correspond with caller Keys = 1,0
selectable options.

[ROOT-1-1]
Parameter Message Description Example
Option1 Determines the text to apply when the caller Option1 = "Operation
cancels switching the site from Suspend mode. cancelled."

Chapter 1 - Configuring the System | 147


Configuring GMS - Administrator Guide

[ROOT-1-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when the site Option1 = "Cannot switch
cannot be switched from Suspend mode due to current site from Suspend
error. mode."

[ROOT-1-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when the site has Option1 = "The current site has
successfully switched from Suspend mode. been switched from Suspend
mode."

[ROOT-1-2-2]
Parameter Message Description Example
Option1 Determines the text to apply when the site Option1 = "Cannot switch
cannot be switched from Suspend mode due to current site from Suspend mode
points in alarm. because there are points still in
alarm."

[ROOT-2]
Parameter Message Description Example
Options Determines the keys that the caller can press Options = 2
to confirm extending Suspend mode time.
OptionX Determines the order and text for each caller Option1 = "You have requested
selectable option. The "%s" portions represents keeping the current site in
user selected variables. Suspend mode for a further %s
hours and %s minutes."
Note: The order of %s variables must Option2 = "Press 1 to confirm,
be maintained as per the example. or 0 to cancel."

Keys Determines the keys that correspond with Keys = 0,1


caller selectable options.

[ROOT-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when cancelling Option1 = "Operation cancelled
extending Suspend mode time. successfully."

[ROOT-2-2-0]
Parameter Message Description Example
Option1 Determines the text to apply when a request to Option1 = "Cannot set the time
extend Suspend mode time fails. the site will remain in Suspend
mode for."

148 | Chapter 1 - Configuring the System


Configuring GMS - Administrator Guide

[ROOT-2-2-1]
Parameter Message Description Example
Option1 Determines the text to apply when a request Option1 = "The current site will
to extend Suspend mode time is successful. remain in Suspend mode for %s
The "%s" portions represents user selected hours and %s minutes."
variables.

Note: The order of %s variables must


be maintained as per the example.

Chapter 1 - Configuring the System | 149


blank page
Configuring GMS - Administrator Guide

Chapter 2
Using the GMS Map Editor

151
Configuring GMS - Administrator Guide

Map Editor is the GMS drawing module for creating and editing site and alarm area maps to show the location of
security devices and alarm points. Site maps are an essential part of the monitoring capabilities of GMS, and work in
conjunction with the Site Map View (see Using GMS - Operator Guide, Using the Site Map View).
Use the Map Editor to:
Create and modify dynamic site maps with alarm point and device locations.
Create and modify site, contact, alarm point and device details.
Import images or data for inclusion in site maps.
Create response procedures and guard tours.

152 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Opening and Closing the Map Editor


Opening the Map Editor
Do one of the following.
1. In GMS, select Tools > Site Map Editor. The Map Editor and the Open Map File dialog box open.

Parameter Description
Site No. The site number to open the map file from.
Area If a site has more than one area (for example, more than one floor), it will
have more than one map. Enter the number that corresponds to the particular
site area.
Map Files Alternatively, select a map to open from the list.
Multi-Site Map Click to open the Open Multi-Site Map dialog box, where you can open or
create new multi-site maps (see Creating Multi-Site Site Maps 187 )

2. To open a specific site map, select a site number, then click OK .


The map for the specified site is displayed in the Map Editor.
-or-
Open the Map Editor directly from within any GMS module where you can view a site area. For example, right-
clicking a site in the Summary Manager and selecting Map File Editor from the context menu.

Closing the Map Editor


1. Select Map > Exit, or click .
If the map is already saved you will return to GMS. If it has not been saved, a dialog box opens asking if you want to
save the site map before exiting. Click Yes to save the map file in location suggested and return to GMS. Click No to
close without saving, or and click Cancel to return to Map Editor.

Chapter 2 - Using the GMS Map Editor | 153


Configuring GMS - Administrator Guide

Understanding the Map Editor Interface


The Map Editor includes command menus and a variety of tools and palettes. The following describes each of the
functional areas.

Functional Area Description


Menu bar All Map Editor commands (see Menu Bar 154 ).
Toolbar Shortcut buttons to the most commonly used Map Editor commands (see Toolbar 156
)
Toolbox Shortcut buttons for placing items in a site map such as cameras, input points, etc
(see Toolbox 156 ).
Color bar Set or change foreground and background colors (see Color Bar 157 ).
Point View pane The Point View pane of the Map Editor screen (on the left-hand side) displays
detailed information about the elements in the corresponding site map (see Point View
Pane 157 ).
Site Map pane The Site Map pane is the frame for the site map when displayed (see Site Map Pane
158 ).

Menu Bar
The menu bar contains all command options available.

Map Menu
Menu Option Description Button
New Opens a new map. GMS will first prompt for the site number.
For a new map, it will next enquire for its site details.
If the map already exists, GMS prompts a request to overwrite
the existing file. If you select Yes, the existing file is discarded
(see Managing Site Maps 199 ).
Open Opens an existing map. Select a map to open (see Managing Site
Maps 199 ).
Import DXF File Imports graphics (DXF file) from AutoCAD for inclusion on the site
map (see Importing Content into Site Maps 173 ).
Import Site Data Imports site data from a comma-delimited file such as MS Excel file
(see Importing Content into Site Maps 173 ).
Import Site Contact Imports site contact from a comma-delimited file such as MS Excel
file (see Importing Content into Site Maps 173 ).
Import Input Point Imports input point data from a comma-delimited file such as MS
Data Excel file (see Importing Content into Site Maps 173 ).
Import Output Point Imports output point data from a comma-delimited file such as MS
Data Excel file (see Importing Content into Site Maps 173 ).
Save Saves the map (see Managing Site Maps 199 ).
Save As Saves the map under another name (see Managing Site Maps 199 ).
Print Prints the map. Along with the map, choose to print site data, site
contact, instruction lists and point details (see Managing Site Maps
199 ).
Delete Choose the maps to delete from a list of existing maps (see
Managing Site Maps 199 ).
Backup Backs up map files. You can specify a destination to save the backup
(see Managing Site Maps 199 ).
Restore Restores map files from backups (see Managing Site Maps 199 ).
Clear Erases all contents of the map.
Redraw Refreshes the drawings.
Exit Closes the Map Editor (see Opening and Closing the Map Editor 153
).

154 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Edit Menu
Option Description Button
Delete an Object Deletes objects, icons and images (see Editing Site Maps 178 ).
Delete Filled Areas Deletes an object fill (see Editing Site Maps 178 ).
Redo Will redo the last delete action on the map.
Undo Removes the last object added.
Move an Object Moves an object (see Editing Site Maps 178 ).
Resize an Image Resizes images (see Editing Site Maps 178 ).
Copy an Image Duplicates an image that already appears on the map (see Editing
Site Maps 178 ).
Group Select Selects an object or group of objects (see Editing Site Maps 178 ).
Bulk Update Adds, deletes or modifies a large range of objects simultaneously
(see Editing Site Maps 178 ).
Edit Object Colors Changes the colors of selected objects (see Editing Site Maps 178 ).
Edit Point Data Edits data (alarm point type, serial number, location, etc.)
associated with the various points (input, output, camera, device
and Controller).
Edit Contacts Views and edits site contact names and phone numbers of the
displayed map (see Working with Site Map Data 203 ).
Edit Site Data Views and edits the data (site name, address, etc.) associated with
the displayed map (see Working with Site Map Data 203 ).
Edit Guard Tour Views and edits the route and time that it takes for a security guard
to tour and investigate the security of the site (see Working with Site
Map Data 203 ).
Response Procedures Adds, edits or deletes operator instructions for non-alarm situations.
Response Procedures Defines instructions for events that have been configured by the
for User Defined Events user. Instructions can be defined for events such as bomb threat,
medical emergencies. New events can be added from the site map
(see Working with Site Map Data 203 ).

View Menu
Option Description Button
Tool Box Displays or hides the Toolbox.
Status Bar Displays or hides the Status bar.
Toolbar Displays or hides the Toolbar.
Color Bar Displays or hides the Color bar.
Toggle 3D View Not functional.
Toggle Perspective Not functional.
View
Toggle Animation Not functional.
Zoom To Sets the screen resolution of the map display area. Options available
are: 640 x 480, 800 x 600, 1024 x 768.
Point Details Displays the Map Editor, Point View pane in full screen view.

Tools Menu
Option Description Button
Line Draws straight lines (see Drawing and Adding Objects to Site Maps
159 ).
Arc Draws curved lines (see Drawing and Adding Objects to Site Maps
159 ).
Circle Draws circles (see Drawing and Adding Objects to Site Maps 159 ).
Rectangle Draws rectangles (see Drawing and Adding Objects to Site Maps 159
).

Chapter 2 - Using the GMS Map Editor | 155


Configuring GMS - Administrator Guide

Option Description Button


Text Allows text entries (see Drawing and Adding Objects to Site Maps
159 ).
Fill Fills a closed object such as a circle or rectangle (see Editing
Drawings 178 ).
3D Tools These options are not available in this version of GMS.
Controller Places a controller icon on the map and specifies its configuration
(see Drawing and Adding Objects to Site Maps 159 ).
Keypad Places a keypad icon on the map and specifies its configuration (see
Drawing and Adding Objects to Site Maps 159 ).
Input Point Places an input point icon on the map and specifies its configuration
(see Drawing and Adding Objects to Site Maps 159 ).
Output Point Places an output point icon on the map and specifies its
configuration (see Drawing and Adding Objects to Site Maps 159 ).
Camera Places a camera icon on the map and specifies its configuration
(see Drawing and Adding Objects to Site Maps 159 ).
Device Places an device icon on the map and specifies its configuration.
GMS uses device icons to represent a wide range of devices such as
branch network controllers, modems, RAPs, termination units,
camera controllers, etc (see Drawing and Adding Objects to Site
Maps 159 ).
Card Reader Places a card reader icon on the map and specifies its configuration
(see Drawing and Adding Objects to Site Maps 159 ).
Door Places a door icon on the map and specifies its configuration (see
Drawing and Adding Objects to Site Maps 159 ).
Import Image Imports image files for inclusion in the map (see Drawing and
Adding Objects to Site Maps 159 ).
Command Shortcut Creates a button to execute a set of predefined commands (see
Automating Tasks Using Site Maps 183 ).
Intercom Device Places an intercom device icon on the map and specifies its
configuration (see Drawing and Adding Objects to Site Maps 159 ).

Options Menu
Option Description Button
Grid Size Sets up and displays a grid so that objects are drawn with respect to
scale and positioned appropriately in the site map (see Drawing and
Adding Objects to Site Maps 159 ).
Pen Styles Selects a line style (see Editing Site Maps 178 ).
Fonts Sets the font style and size for text placed on the map using the text
tool (see Drawing and Adding Objects to Site Maps 159 ).
Map Layer Selection Selects and defines the possible 16 layers of the map (see Using Site
Map Layers 177 ).
Locate a Point Finds a specific alarm point on the map (see Editing Site Maps 178 ).
Skip Image Selection Disables the selection of image files when moving objects (see
Editing Site Maps 178 ).
Customize Menu Customizes the menu items that should be available to Map Editor
users.

Toolbar
The Map Editor toolbar contains buttons for commonly used commands. See Menu Bar 154 for information on these
buttons.

Toolbox
The Map Editor toolbox contains button for drawing shapes and placing objects on a map, such as cameras, input
points, etc. See Menu Bar 154 for information on these buttons.

156 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Color Bar
The Map Editor color bar helps to set the foreground and background colors of objects that you draw on the map.

In the above case, blue is selected as the foreground color and white as the background color. To change either of
these colors select from the available palette.
1. To select a foreground color, left-click on the color palette.
2. To select a background color, right-click on the color palette.

Point View Pane


The Point View pane displays the information about the elements in the corresponding site map.
To open the pane in a separate window, select View > Point Details.
Click to display the properties or contents of an element, such as camera number, type, model, etc. Click to hide
the properties or contents of an element.

Function Description
Expand Group Fully expands all branches in the same group as the highlighted element.
Search Locate a point.
Close Closes the Point View window and displays the Points Details and Site Map panes.
Include Other Areas Select to display point data for all areas within the site of the current area map.

Chapter 2 - Using the GMS Map Editor | 157


Configuring GMS - Administrator Guide

Site Map Pane


The Map Editor right pane is used for displaying site maps and editing them.
When you select a command option from the menu bar or toolbar, the resulting action takes place on the open map
in this pane. Similarly, when you select an object to draw or place from the toolbox, the resulting object can be drawn
or placed on the map in this pane.

158 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Drawing and Adding Objects to Site Maps


To make a map more legible or usable, you can draw shapes, and add text entries and objects (security objects
working directly with GMS). These can represent the locations and types of devices, making it easier for operators to
pin-point alarms, based on the site map.

Displaying the Drawing Grid and Snapping to Grid


To display a grid on a map to help you align shapes and objects, proceed as follows:
1. In the Map Editor, select Options > Grid Size. The Grid Size dialog box opens.

2. Enter the distance (in pixels) between the grid lines in the Horizontal Pixels and Vertical Pixels fields.
3. Select Display Grid to show it. Disable the option to not show the grid.
4. Click OK. Grid lines will appear on the displayed map.

Turning On Snap to Grid


If Snap to Grid is on, any drawing shape or object that you place automatically aligns with the nearest dot on the
grid.
1. In the Map Editor, select Options > Grid Size. The Grid Size dialog box opens.
2. Enable the Snap to Grid option. Disable the option to turn off Snap to Grid.
3. Click OK.

Drawing Shapes
To draw a shape on a map, proceed as follows:
1. In the Map Editor, select a shape tool from the toolbox, such as a line , rectangle , circle or arc .
2. Select a color from the color bar.
3. In Options > Pen Styles, choose the width and style of the line used to draw the shape.
4. Position the cursor on the site map. Click and hold while dragging the cursor. A flexible line stretches from the
anchored end of the line to the current cursor position.
5. At the desired length, release the mouse button to anchor the second end of your line and add the shape onto
the map.

Filling Shapes with Color


To fill a shape with color, proceed as follows:
1. In the Map Editor, select from the toolbox.
2. Select a color from the color bar using right-click.

Note: If you left-click in the color bar, the background color for the entire site map changes to the
selected color.

3. Click inside the object you want to fill. The object will be filled with the selected color.

Note: The Fill tool will fill only closed drawing objects (rectangles and circles).

Adding Text and Selecting Font Style


To add a text entry, proceed as follows:
1. In the Map Editor, select from the toolbox.

Chapter 2 - Using the GMS Map Editor | 159


Configuring GMS - Administrator Guide

2. Select a color from the color bar using left-click.


3. Click on the map to display the Text dialog box.

4. Type the text to include on the site map.


5. Click Font to open the Text Fonts dialog box, where you change the style and appearance of the font used.

6. Select the font type, size and style required, then click OK.
7. Click OK when text is completed.

Note: A maximum of 254 characters is allowed per text entry. If hard returns are used in an entry (to
provide multiple lines of text per entry) then each hard return accounts for two characters.

Importing and Placing Images


To import and place images to a site map, proceed as follows:
1. In the Map Editor toolbox, click .
2. Click on the map where the image should appear. The Open dialog box opens.

3. Locate and select an image then click Open.


The image is displayed on the map at the chosen position.

Adding Objects
Objects represent various security devices, for example, card readers and access controlled doors that work in
conjunction with GMS. Text is also regarded as an object (see Adding Text and Selecting Font Style 159 ). To add an
object to a site map, proceed as follows:
1. In the Map Editor, select an object from the toolbox.

Object Type Description


Input devices detect activities on a site.
The output relays configured on the Controller, which trigger output devices to
on or off.
A keypad is an input/output device that acts as the local user interface to
control the security system such as access, mode changes.

160 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Object Type Description


The Controller communicates alarm messages from a site and controls site
access.
Film camera.

Note: Use the Device object ( ) for CCTV cameras.

Device represents a wide range of objects such as modem, DVR, alarm panels,
termination units, etc.
Card reader.
Door.
Building management system (BMS) device.
Intercom device.

2. Click on the map to place the new object in this location on the map. The appropriate Configuration dialog box
opens for the selected type of point/object when you place it.

3. Enter the relevant information in the Configuration tab. Refer to the following for further detailed information
about each object configuration requirements:
Input Points 163 .
Output Points 164 .
Keypads 164 .
Controllers 165 .
CCTV Cameras 166 .
Devices 166 .
Card Readers 168 .
Doors 169 .
BMS Devices 169 .
Intercom Devices 171 .
4. Open the Priority tab.

Chapter 2 - Using the GMS Map Editor | 161


Configuring GMS - Administrator Guide

Parameter Description
Point No. The identification number of the controller.
Alarm Group Select an alarm group to view its priority details in the Priorities region. Alarm
groups are created in the Events Manager.
Use Default Select when the point should not belong to any alarm groups and not have a
priority.
Priorities Shows what status the point has for each mode in an alarm group. Priorities are
configured in the Events Manager.

5. Open the Response Procedure tab.

To make any necessary changes to the response procedures for a point, proceed as follows:
Use the Available Instructions region to add, edit or delete operator instructions to the specific alarm
message.
To associate to an existing local instruction, select Local List and select from the list.
To associate to an existing global instruction, select Global List and select from the list.
Click Add to associate the instruction to the selected alarm message. The instruction is displayed in
Selected Instructions for the Point. Multiple instructions can be associated to one alarm message.
Multiple instructions associated with an alarm message can be sequenced. In Selected Instructions for the
Point select an instruction and use the arrows to shift within the list. This is to ensure that a set sequence is
followed in response to the alarm.
Click OK.
6. Save the site map.

162 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Input Points

Parameter Description
Point No. Specify the input point number.
Device Type Choose an appropriate type.
Bitmap Click to assign a user-defined bitmap image.
Manufacturer Specify the manufacturer of the input device.
Model No. Enter the model number of the input device.
Serial No. Enter the serial number of the input device.
Location Specify the location of the input device on the site. Example, "Front entrance, main
building".
Direction Enter an angle (in degrees) to represent the orientation of the input on the map.
Associated CCTV Specify the camera number with which the point is linked. In cases when the point
Camera goes into alarm, the video feed from the camera can be called.
Associated Reader Specify reader number for the point. In cases when the point goes into alarm, the
reader can be accessed for further action.
Select Layers Use to specify the map layer(s) to which this point should be assigned (see Using Site
Map Layers 177 ).

Parameter Description
EPD Templates When any text is entered in Extended Point Description, it is available for use by
any other point as a template in this space.
Delete Click to delete selected text from EPD Template.
Copy Click to copy selected text from EPD Template to Extended Point Description.

Chapter 2 - Using the GMS Map Editor | 163


Configuring GMS - Administrator Guide

Parameter Description
Extended Point Enter additional details of the point. For example, a detailed description of the point
Description location might be critical. An operator can use this to describe its location to the fire
brigade so they can get to it quickly.

Output Points

Parameter Description
Output No. Specify the output point number.
Device Choose an appropriate type.
Bitmap Click to assign a user defined bitmap.
Location Specify the location of the output device on the site. For example, "Front entrance,
main building".
Direction Enter an angle (in degrees) to represent the orientation of the output on the map.
Select Layers Use to specify the map layer(s) to which this point should be assigned (see Using Site
Map Layers 177 ).

Keypads

Parameter Description
Keypad No. Specify the keypad number.
Model No. Select the appropriate model of the keypad.
Bitmap Click to assign a user defined bitmap.

164 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Parameter Description
Serial No. Enter the serial number of the keypad.
Location Specify the location of the keypad on the site. For example, "Front entrance, main
building".
Direction Enter an angle (in degrees) to represent the orientation of the keypad on the map.
Select Layers Use to specify the map layer(s) to which this keypad should be assigned (see Using
Site Map Layers 177 ).

Controllers

Parameter Description
Controller Select appropriate model of Controller.
Serial No. Enter serial number of the Controller.
Location Specify location of the Controller.
Direction Enter an angle (in degrees) to represent the orientation of the Controller on the map.
Select Layers Use to specify the map layer(s) to which this Controller should be assigned (see Using
Site Map Layers 177 ).

The Controller dialog box has four extra instruction lists. The lists are divided into categories depending on the type of
Controller alarm state, and will display the appropriate operator instructions for an alarm of that type.

Parameter Description
Comms Callout List Operator instructions relating to communication alarms involving Controllers.
Mode Callout List Operator instructions relating to Controller mode changes, for example, Day mode,
Night mode, Test mode, etc.
Partial Seal Callout Operator instructions relating to partial seal alarms involving Controllers, for example,
List ATM, Cleaner, Guard, Maintenance, etc.
Status Callout List Operator instructions relating to Controller status changes.

Chapter 2 - Using the GMS Map Editor | 165


Configuring GMS - Administrator Guide

Film Cameras

Parameter Description
Camera No. Specify the camera number.
Manufacturer Specify the manufacturer of the camera.
Model No. Enter model number of the camera.
Serial No. Enter serial number of the camera.
Location Specify the location of the camera on the site. For example, "Front entrance, main
building".
Direction Enter an angle (in degrees) to represent the orientation of the camera on the map.
Select Layers Use to specify the map layer(s) to which this camera should be assigned (see Using
Site Map Layers 177 ).

Devices

Parameter Description
Device No. Specify the device number.
Device Type Click to view a list of supported devices and select an option that represents the
actual device. Click an option to select it:
Branch Controller - Represents older technology, where a device is required to
connect slave terminals within the location to a system mainframe.
Termination Unit - Represents older technology, where a termination unit that
serves as a hub or multiplexer is required as a point for cable termination.

166 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Parameter Description
General I/O - Represents a piece of hardware (for example, Pacom 1076 I/O)
used to increase the number of physical inputs/outputs connected to the Controller.
Camera Controller - Represents older technology, where a specific device is used
for controlling film cameras.
Remote Alarm Panel - Use the Controller ( ) object.
Branch Modem - Represents older technology, where a specific modem device is
used for communications between the location and an external system.
Branch Dataline - Represents older technology, where specific cabling is used for
communications between the location and an external system.
Guard - Represents a security guard.
Dialer Interface - Represents older technology, where a device is used for
enabling dialup communications between devices and an external system.
Radio - Represents a security radio.
Main Unit Port - Represents a communications port/connection on a Controller.
Finger Scan Interface - Represents a biometric finger scanning device.
Mezzanine Socket - Represents a communications port/connection on a Controller
expansion card.
PLAN-640 Alarm I/F - Use the Intercom Device ( ) object.
Door - Use the Door ( ) object.
Motorola Card Reader - Use the Card Reader ( ) object.
LAN Adapter - Represents a piece of hardware used to interface a device with the
IT network (LAN).
Branch Router - Represents older technology, where a device that serves as
communication switcher/router for interconnecting devices.
Listen-in Device - Represents a microphone used for receiving audio in
conjunction with the listen-in feature.
Vault - Represents a vault.
CCTV Camera - Represents a CCTV camera.
Elevator Controller - Represents a piece of hardware (for example, Pacom 1065
EC) used specifically to control elevator floor access.
Elevator - Represents an elevator (lift).
Power Monitor - Represents a Pacom power supply that is capable of
communicating with the system for monitoring purposes (for example, Pacom
8305).
Vault Controller - Represents a piece of hardware (for example, Pacom 1076 VC)
used specifically to control vault doors and to monitor specific vault imputs (for
example, seismic detectors).
Bitmap Click to assign a user defined bitmap to appear in site maps to represent the device
type.
Serial No. Enter the serial number of the device.
Location Specify the location of the device on the site. For example, "Front entrance, main
building".
Direction Enter an angle (in degrees) to represent the orientation of the device on the map.
Select Layers Use to specify the map layer(s) to which this device should be assigned (see Using
Site Map Layers 177 ).

Chapter 2 - Using the GMS Map Editor | 167


Configuring GMS - Administrator Guide

Card Readers

Parameter Description
Reader No. Specify the reader number.
Model Choose an appropriate model.
Serial No. Enter the serial number.
Location Specify the location of the device on the site. For example, "Front entrance, main
building".
Bitmap Click to assign a user defined bitmap.
Direction Enter an angle (in degrees) to represent the orientation of the card reader on the
map.
Floors Accessed If the reader is an elevator then specify the range of floors accessible by the
elevator.
Associated CCTV Link a CCTV camera to the reader
Cameras
Associated Output Set by the Controller and not configurable.
Points
Door Unlock Time Set by the Controller and not configurable.
(Secs)
Door Shunt Time (Secs) Set by the Controller and not configurable.
Door Open Time (Secs) Set by the Controller and not configurable.
Time Zones Set by the Controller and not configurable.
Select Layers Use to specify the map layer(s) to which this device should be assigned (see Using
Site Map Layers 177 ).

168 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Doors

Parameter Description
Door No. Specify the door number.
Location Specify the location of the device on the site. For example, "Front entrance, main
building".
Direction Enter an angle (in degrees) to represent the orientation of the door on the map.
Select Layers Use to specify the map layer(s) to which this device should be assigned (see Using
Site Map Layers 177 ).

BMS Devices

Parameter Description
Device No Specify the BMS device number.
Device Type Click to display a list of devices. Each device type has a set of options that appear in
the Configuration region when selected. Click an option to select it:
Analog In - Represents an analog input device.
Analog Out - Represents an analog output device.
Digital In - Represents a digital input device.
Digital Out - Represents a digital output device.
Pulse Counter - Represents an input device that is used for counting.
Run Timer - Represents a programmable delay timer.

Chapter 2 - Using the GMS Map Editor | 169


Configuring GMS - Administrator Guide

Parameter Description
Thermistor - Represents an analog thermistor device input. Thermistor resistance
varies according to temperature.
Device Name Enter a name for the device.
Icon File Click to assign a user defined bitmap.
Manufacturer Specify the manufacturer of the device.
Model No Enter the model number.
Serial No Enter the serial number.
Location Specify the location of the device on the site. For example, "Front entrance, main
building".
Configuration
°C For analog devices. Select if the device is to display temperature values in degrees
Celsius (Centigrade).
°F For analog devices. Select if the device is to display temperature values in degrees
Farenheit.
% For analog devices. Select if the device is to display values as percentages.
Other For analog devices. Select to customize the device display and enter the units of
measurement in the adjacent field. For example, if the device is representing weight
in kilograms, enter "Kg".
Base Value For analog devices. Enter an initial value to display for the device.

Note: Available only when Other is selected.

Range For analog devices. Enter.

Note: Available only when Other is selected.

On Text For digital devices. Enter appropriate text to represent what has caused the device to
become ON.
Off Text For digital devices. Enter appropriate text to represent what has caused the device to
become OFF.
Value per Pulse For pulse counters.
Unit For pulse counters.
Unit [hh:mm:ss] For run timers. Enter the amount of time to countdown when the device is triggered.
You must enter the time in full HH:MM:SS format. For example, a time of 1 hour, 5
minutes and 40 seconds requires an entry of "01:05:40".
Value Display Position
Top Select to have any display text associated with triggering the device appear above its
site map icon.
Bottom Select to have any display text associated with triggering the device appear below its
site map icon.
Left Select to have any display text associated with triggering the device appear to the
left of its site map icon.
Right Select to have any display text associated with triggering the device appear to the
right of its site map icon.

Select Layers Use to specify the map layer(s) to which this device should be assigned (see Using
Site Map Layers 177 ).

170 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Intercom Devices

Parameter Description
Configuration Tab
Device ID Enter an intercom device number.
Bitmap Click to assign a user defined bitmap.
Location Specify the location of the device on the site. For example, "Front entrance, main
building".
Select Layers Use to specify the map layer(s) to which this device should be assigned (see Using
Site Map Layers 177 ).
Intercom Parameters Tab
Device Short Name Enter a brief name for the device. This name appears on the site map alongside the
device icon.
Device Full Name Enter a more detailed name for the device. This name appears when hovering the
mouse cursor over the device icon on the site map.
Device Type
External Select when the intercom device is a physical piece of hardware. That is, the device is
a third-party intercom unit.
Source ID Enter an identification number for the third-party intercom unit as it is defined in the
intercom system plug-in. Each intercom within the system must have a unique
identifier.

Note: Available only when the External option is selected.


Due to each plug-in being specific to the requirements of the associated
third-party intercom system, configuration is beyond the scope of this
documentation - refer to the Intercom Driver document supplied with the
intercom system plug-in.

Comment Enter any additional comments for the intercom device.

Note: Available only when the External option is selected.

Input Point Select when the intercom function is to be triggered by an input point. For example, a
button that is connected to the Controller as an input.

Note: You must also set up an input point object on the site map to act as
the "trigger" for the associated intercom object (see Input Points 163 ).

Input Point No Enter the identification number of the input point, as it is configured in the Controller
hardware device map, to associate with the intercom. That is, when the Controller
receives a signal from the input point, GMS recognizes it as an intercom "call".

Chapter 2 - Using the GMS Map Editor | 171


Configuring GMS - Administrator Guide

Parameter Description

Note: Available only when the Input Point option is selected.

Card Reader Select when the intercom function is to be triggered by a card swipe on a card
reader.
Card Reader No Enter the identification number of the card reader, as it is configured in the
Controller, to associate with the intercom. That is, when there is a valid card read
from the reader, GMS recognizes it as an intercom "call".

Note: Available only when the Card Reader option is selected.

Request Handling Parameters


Request Priority Enter the priority number (1 to 4) for the intercom. The priority value determines the
position in the list of intercom "calls" visible to GMS operators in the Intercom
Manager. By default, the higher the priority number, the closer to the top of the list
the "call" will be. Priority also controls the text color of the request and optional
notification sounds.
Request Time to Live Enter the length of time that a "call" from the intercom point will be made visible and
selectable to GMS operators in the Intercom Manager. Values of 1 to 10 are
counted in minutes; values of 11 to 255 are counted in seconds. Min. = 1, max. =
255.
Operator Instructions Enter any text that you want the operator to see when they action a "call" from the
intercom point. The text is displayed to the operator through the Intercom Request
Action dialog box. For example, "Verify the identity of the person wanting entry and
let them in if they have an appointment".
Request Handling Scripts

Note: All intercom related scripts must be as individual sections within the GmsIntercomScripts.config file,
located in the GMS\Customer\Intercom folder.
Scripts are required to perform automated GMS actions, such as unlocking doors, switching lights etc.
Different scripts can be run for different GMS operator intercom actions.

On Create Enter the name of the script to run when a "call" is made from the intercom point.
On Select Enter the name of the script to run when a "call" from the intercom point is selected
by a GMS operator.
On Allow Access Enter the name of the script to run when a GMS operator selects the Allow Access
option in response to a "call" from the intercom point.
On Deny Enter the name of the script to run when a GMS operator selects the Deny option in
response to a "call" from the intercom point.
Entrances

Note: These reference door objects when a single intercom point is required to work in conjunction with
multiple doors (up to three). An operator can select one door only when using the Allow Access action.
Multiple door options are presented to operators in the form of a selection list attached to the Allow
Access button or context menu option.

Entrance 1 Enter the name of the sub-script to run when the operator selects the Allow Access
function for this door. Generally, the name of the door is suitable. Values are case-
insensitive.

Caution: The text here must match that used in the sub-script for identifying
the door.

Entrance 2 Enter the name of the sub-script to run when the operator selects the Allow Access
function for this door. Generally, the name of the door is suitable. Values are case-
insensitive.

Caution: The text here must match that used in the sub-script for identifying
the door.

Entrance 3 Enter the name of the sub-script to run when the operator selects the Allow Access
function for this door. Generally, the name of the door is suitable. Values are case-
insensitive.

Caution: The text here must match that used in the sub-script for identifying
the door.

172 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Importing Content into Site Maps


GMS can import content, such as site data into a map from various external files.

Note: During importation, if any imported text fields exceed the GMS character limit, they are
automatically truncated.

Importing AutoCAD DXF Site Drawings


GMS supports AutoCAD *.dxf files. This allows you to import an accurate floor plan, without you having to draw it.

Note: You can import and place images *.bmp, *.pcx, *.png, *.jpg and *.tif formats (see Drawing and
Adding Objects to Site Maps 159 ).

Importing DXF files


To import a *.dxf file into a map, proceed as follows:
1. Open the relevant map file (see Managing Site Maps 199 ).
2. Select Map > Import DXF File. The Windows Open dialog box opens.
3. Locate the file then click OK.
4. The dxf file will be displayed as part of the map.

Note: Ensure that the *.dxf file being imported does not have more than two layers.

Importing Site Data


The Import Site Data option allows programming of site data by using a spreadsheet file such as Microsoft Excel, or
a text file using a delimiting character (for example, a "," (comma)).
To import the spreadsheet data into site data, proceed as follows:
1. In the Map Editor, select Map > Import Site Data. The Import Site Data from File dialog box opens.

Note: Ensure that no map file is open when importing site data or site contacts. If a map is open those
options will be greyed out in the menu. Open a new map from the GMS main menu to access the Import
Site Data and Import Site Contacts options from the Map Editor Map menu.

2. On the Import File tab, specify the location of the spreadsheet file. Either click Browse to locate the file or
type the path of the file.
3. Enter a delimiting character (usually comma is used) in Enter a separator character.
4. Enter the index value in the fields which are concurrent with the site data details.
For example, if column A in your spreadsheet is specified for Controller numbers, then type 1 as the index value
in Controller No.. Specify index values for concurrent fields with matching column number.
A text file can also be used to import site data into the Map Editor. The text file must have each entry (each
unit of data) separated by a comma. Specify index values for concurrent fields with matching entry number.
For example, if in your text file the first entry is for the Controller number then type 1 as the index value in
Controller No. text field in the Import Site Data from File dialog box.
5. Similarly, fill the concurrent text boxes in all the tabs of the Import Site Data from File dialog box.

Note: Enter 0 for text boxes that are not required. Enter "-1" To retain existing data of the field on the
map.

6. Fill all fields then click OK.


7. To check for the imported data, in the Map Editor menu, select Map > Open and from the list open the map
file for which the data was imported. Once the map file is open check its site data by selecting Edit Site Data
from the Edit menu.

Chapter 2 - Using the GMS Map Editor | 173


Configuring GMS - Administrator Guide

Importing Site Contacts


The Import Site Contact option allows the programming of site contacts using a spreadsheet file such as Microsoft
Excel, or a text file using a delimiting character (for example, a "," (comma)).

Note: GMS can import a maximum of 5000 contacts from a single import file.

To import the spreadsheet data into Site Contact, proceed as follows:

Note: Ensure that NO map is open in the Map Editor.

1. In the Map Editor, select Map > Import Site Contact. The Import Site Contact Data from File dialog box is
displayed.
2. On the Import File tab, specify the location of the spreadsheet file. Either click Browse to locate the file or
type the path of the file.
3. Enter a delimiting character (usually comma is used) in Enter a separator character.
4. Enter the index value in the fields which are concurrent with the site contact details.
For example, if column A in your spreadsheet is specified for Controller number then enter 1 as the index value
in Controller No.. Specify index value for concurrent fields with the matching column number.
A text file can also be used to import site contacts into the Map Editor. The text file must have each entry
(each unit of data) separated by a comma. Specify index values for concurrent fields with matching entry
number.
For example, if in your text file the first entry is for the Controller number, then enter 1 as the index value. The
text file must have each entry (unit of data) separated by a comma. Specify index value for concurrent fields
with matching entry number.

Importing Input Point Data


Data on both input and output points can be imported from another spreadsheet package such as Microsoft Excel, or
a text file using a delimiting character.
To import the spreadsheet data into Input Point Data, proceed as follows:
1. Open the map file (see Managing Site Maps 199 ).

Note: Point data can only be imported to a map that is open in the Map Editor.

2. In the Map Editor, select Map > Import Input Point Data. The Import Input Point Data from File dialog box
opens.

3. On the Import File tab, specify the location of the spreadsheet file. Either click Browse to locate the file, or
type the path of the file.
4. Enter a delimiting character (usually comma is used) in Enter a separator character.
5. Enter the index value in the fields which are concurrent with the input point details.
For example, if column A in your spreadsheet is specified for controller numbers then enter 1 as the index value
in Controller No.. Specify index value for concurrent fields with matching column number.
A text file can also be used to import input point data into the Map Editor. The text file must have each entry
(unit of data) separated by a comma. Specify index value for concurrent fields with matching entry number.
For example, if the first entry in the text file is for the Controller number, then enter 1 as the index value in
Controller No. in the Import Input Point Data from File dialog box.
6. Similarly, fill the concurrent text boxes in all the tabs of the Import Input Point Data from File dialog box.

174 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Note: Type 0 for text boxes that are not required.

7. Fill all text fields, then click OK.


The points imported will be displayed on the map. You can also use the Point Details to check the point information
(see Point View Pane 157 ).

Importing Output Point Data


The Import Output Point Data option allows the programming of site contact in advance, by using a spreadsheet
package such as Microsoft Excel, or a text file using a delimiting character.
To import the spreadsheet data into Output Point Data, proceed as follows:
1. Open the map file (see Managing Site Maps 199 ).

Note: Point data can only be imported to a map that is open in the Map Editor.

2. In the Map Editor, select Map > Import Output Point Data. The Import Output Point Data from File dialog
box opens.

3. On the Import File tab, specify the location of the spreadsheet file. Either click Browse to locate the file, or
type the path of the file.
4. Enter a delimiting character (usually comma is used) in Enter a separator character.
5. Enter the index value in the fields which are concurrent with the output point details.
For example, if column A in your spreadsheet is specified for controller numbers then enter 1 as the index value
in Controller. Specify index value for concurrent fields with matching column number.
A text file can also be used to import output point data into the Map Editor. The text file must have each entry
(unit of data) separated by a comma. Specify index value for concurrent fields with matching entry number.
For example, if the first entry in the text file is for the Controller number, then enter 1 as the index value in the
Controller text field in the Import Output Point Data from File dialog box.
6. Similarly, fill the concurrent text boxes in all the tabs of the Import Input Point Data from File dialog box.

Note: Enter 0 for text boxes that are not required.

Chapter 2 - Using the GMS Map Editor | 175


Configuring GMS - Administrator Guide

7. Fill all text fields then click OK.


The points imported will be displayed on the map. You can also use the Point Details to check the point information
(see Point View Pane 157 ).

176 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Using Site Map Layers


Layers in site maps are designed primarily to de-clutter the map when drawing. Each layer can be named and have
points and devices allocated. You can hide or display any layers as required, and is useful when creating complex site
maps. A site map supports up to 16 layers. For example, using a layer for readers, another for input points, another
for output points, etc.
Map layers are managed using the Map layer Selection dialog box.

To open the dialog box, click or select Options > Map Layer Selection.

Naming Site Map Layers


To allocate a name to a layer, proceed as follows:
1. In the Map Layer Selection dialog box, click a layer to select it - it becomes highlighted (click again to de-
select). Layer Number and Description shows the last layer selected (or de-selected).
2. Enter a name in Description.
Repeat the previous steps to name more layers.
3. Click OK to save the changes.

Adding Points to Site Map Layers


A new or existing point can be added to a map layer. To add a point to a layer, proceed as follows:
1. In the Map Editor toolbox, click , then click the point you want to edit. The Configuration dialog box for the
point opens.
2. Click Select Layers. The Map Layer Selection dialog box opens.
3. Select the layer(s) the point should be visible on. Click a layer to select it - it becomes highlighted (click again to
de-select). To select all layers click All. To de-select layers, click None.
4. Click OK.

Viewing Site Map Layers


To view a map layer, proceed as follows:
1. In the Summary Manager, click on a site to open its site map.
2. In the Site Map View, select Setup > Map Layer Selection. The Map Layer Selection dialog box opens.
3. Select the layers to display. Click a layer to select it - it becomes highlighted (click again to de-select). To select
all layers click All. To de-select all layers, click None.
4. Click OK.
Only points on the selected layer(s) are displayed on the site map.

Chapter 2 - Using the GMS Map Editor | 177


Configuring GMS - Administrator Guide

Editing Site Maps


You can modify objects on site maps. For example, changing the outline width and color, and adding a fill.

Changing the Pen Style for Group of Objects


To change the outline of a group of drawn objects simultaneously, proceed as follows:
1. In the Map Editor, select from the toolbox.
2. Hold the left mouse button and drag across the objects you want to edit. A selection box appears around the
objects and a context menu appears.

3. Click Change Pen Style. The available pen styles appear in a second context menu.

4. Click a pen style to apply it. The outline of the selected objects changes to the new pen style.

Changing the Color of Objects


To edit the colors of objects of various types in an entire map, proceed as follows:
1. In the Map Editor, select from the toolbox. The Edit Object Colors dialog box opens.

2. Select the type(s) of object(s) you want to change the color of.

Note: GMS considers filled areas as separate to the containing objects, such as rectangles and circles.

3. Click OK. The Colors dialog box opens.

4. Select a foreground and/or background color.


5. Click OK. The selected objects change to the new color(s).
To edit the colors of selected objects only (of any type), proceed as follows:
1. In the Map Editor, select from the toolbox.
2. Hold the left mouse button and drag across the objects you want to edit. A selection box appears around the
objects and a context menu appears.
3. Click Change Colors. The Colors dialog box opens.
4. Select a foreground and/or background color.
5. Click OK. All selected objects change to the new color(s).

178 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Editing Text
To edit text strings on a site map, proceed as follows:
1. In the Map Editor, select from the toolbox.
2. Click the text you want to change. The Text dialog box opens for the text string.
3. Edit the text as required.
4. Click OK.

Resizing Images
To resize an image on a site map, proceed as follows:

Note: Ensure that the Options > Skip Image Selection option is disabled.

1. In the Map Editor, select from the toolbox.


2. Click the image you want to resize. A marquee (border) appears around the image.
3. Click and hold the left-mouse button while you drag the cursor. The marquee stretches in the direction you are
dragging, expanding or contracting as you move the mouse.
4. When the marquee is the size and shape you want, release the mouse button to display the resized image.

Duplicating Images
To duplicate an existing image on a map, proceed as follows:

Note: Ensure that the Options > Skip Image Selection option is disabled.

1. In the Map Editor, select Edit > Copy an Image.


2. Click on the outline of the image you want to duplicate.
3. Position the cursor where you want the duplicate to appear and click again. The duplicate appears on the map in
the chosen position.
4. To make another copy, click again on the outline of an image and then click on the map to position the
duplicate. Each copy requires this procedure.

Moving Shapes and Objects


To move any element type on a site map, proceed as follows:

Note: Ensure that the Options > Skip Image Selection option is disabled.

1. In the Map Editor, toolbox select .


2. Position the cursor on the outline of the object, then click and hold while you drag the object to the new position.

Moving Shapes and Objects, but Not Images


Objects are sometimes placed on top of images (such as an image of a building) and the object cannot be selected or
moved without moving the image first. To ensure only the objects move and not the image, proceed as follows:
1. In the Map Editor, enable the Options > Skip Image Selection option. This will disable the selection of
images when moving objects.
2. In the Map Editor, toolbox select .
3. Select the objects on the map and move and rearrange as required.

Deleting All Information From Site Maps


To delete all objects, images and information on a site map, proceed as follows:
1. In the Map Editor, select Map > Clear. A confirmation is displayed.
2. To proceed click Yes. The map will be instantly cleared of everything.

Chapter 2 - Using the GMS Map Editor | 179


Configuring GMS - Administrator Guide

Deleting Shapes, Objects and Images


To delete specific objects, shapes and images from a site map, proceed as follows:
1. In the Map Editor, toolbox select .
2. Position the cursor on the outline of the object then click. A prompt is displayed.

3. Click Yes to delete the object from the map.

Deleting Fills From Shapes


To delete the fill from a shape, but leave the outline remaining, proceed as follows:
1. In the Map Editor, select Edit > Delete Filled Areas. The cursor will point at the first filled object and a
prompt displays.

2. Click Yes, to remove the fill.


3. The cursor will then point at the next filled object and ask again to delete the filled area. Click Yes or No. This
process is repeated for all filled objects or Cancel is clicked.

Note: Remove the fill before the outline of a filled object. If you remove the outline before removing the
fill, the fill becomes the background color for the entire map.
If an object has been filled several times over, you will need to delete each fill individually as they are
treated as individual objects.

Selecting Multiple Objects


To select multiple objects, proceed as follows:
1. In the Map Editor, toolbar select .
2. Hold down the left mouse button and drag across the objects you want to edit. The selected objects will be
surrounded (marquee) and a context menu appears.

3. Select the action you want to take from the context menu.

Bulk Updating Groups of Elements


The changes that you administer on multiple elements such as input points, cameras, etc, on a map, allow you to bulk
add, delete or modify. This saves time by allowing you to perform the same action to a group of elements, rather
than having to update them one at a time.
To perform a bulk update, the group of elements must be of the same type and you must be performing the same
action to each element.
To update a group of elements, proceed as follows:
1. In the Map Editor, select Edit > Bulk Update. The Bulk Update dialog box opens.

180 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

2. Enter the range of points to perform the bulk update on in Enter Point Range (for example, 1-10, 30-50, etc.).
3. Select the appropriate point type. You can only choose one point type. To update a different point type, a
separate bulk update must be performed.
4. Select the appropriate action to perform (Add, Delete or Modify).
5. If adding or modifying elements, use an existing point as a template for the new points. Enter the existing point
number in Use Point No.. To view existing points, click Selection. This allows viewing the existing points
without affecting the Bulk Update dialog box.
6. Click OK to action these changes.
7. If action is to add points, click on the map where the points should be positioned.

Viewing Site Map Point (GMS Object) Details


The Map Editor, Point Details pane displays detailed information about the elements on the site map.
To view only the point details and not the map, proceed as follows:
1. In the Map Editor, select View > Point Details. This Point View pane opens.

Locating Points (GMS Objects) on Site Maps


To locate a point on the map, proceed as follows:
1. In the Map Editor toolbar, select . The Locate a Point dialog box opens.

2. Select a GMS object (input point, card reader, door, etc) from the Point Types list.
3. Enter the number of the point you want to locate in Enter Point No..
4. Click OK to start the search. The cursor automatically moves to the location of the point on the map.

Aligning Points (GMS Objects) on Site Maps


To align a group of points vertically or horizontally, proceed as follows:

Chapter 2 - Using the GMS Map Editor | 181


Configuring GMS - Administrator Guide

1. In the Map Editor, toolbar select .


2. Hold down the left mouse button and drag across the objects you want to edit. The selected objects are
surrounded (marquee) and a context menu appears.

3. Select Align Vertically or Align Horizontally as required. The Point Alignment Distance dialog box opens.
4. Specify the distance (in pixels) you want between the points.

5. Click OK.

182 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Automating Tasks Using Site Maps


GMS has several features built into site maps for automating operator tasks. These can be clicking a site map object
to run a predefined command, opening a document or web page, creating an email or running other applications or
batch files.
GMS URL features are also available to operators in other aspects of the system. For example, operator response
procedures and various text fields. URLs always appear in "hyperlink" blue.

Command Shortcuts
Command shortcuts are site map "objects" that operators can click to execute predefined tasks. These can be applied
to the range of commands available for the following site objects:
Input points.
Output points.
Readers.
CCTV cameras.
Controllers.
Elevators.
Additionally, command shortcuts can be used as triggers to perform up to two operations. For example, trigger an
output for a period of time, then to turn a CCTV camera on for a period of time.

Creating Command Shortcuts


To add a command shortcut, proceed as follows:
1. In the Map Editor select from the toolbox.
2. Click on the map to display the Configure User Defined Shortcut dialog box.

3. In the Shortcut Details region:


a. In the Shortcut Name field, type a name for the shortcut. The name will appear as a tooltip when an
operator hovers over the bitmap image for the shortcut in the site map. If you do not provide a name, there
will be no tooltip.

b. In the State Bitmap list, select a bitmap image from the GMS/Customer/Bitmaps folder. To select an image
from another location, click Bitmap. The Windows Open dialog box opens, where you can browse for the
file. Click Open to assign the file and close the dialog box. The new image displays in the preview region.

Note: GMS copies the image to the GMS/Customer/Bitmaps folder. The new image will apply to all GMS
workstations.

4. In the Command Configuration, Execute this command region:


a. In the Point Types list, select the site object type to apply the command to. The site object type will
determine the options available in the Commands list.
b. In the Commands list, select the command to send to the site object.

Chapter 2 - Using the GMS Map Editor | 183


Configuring GMS - Administrator Guide

c. For the Point field (the name can vary depending on the site object type selection) click Select to open the
Select dialog box, where you can type in the ID number in the Input No field, or select a group of objects
to apply the command to. For a group, enable the Input Group option to display the Groups dialog box,
where you can select from available object groups.

Note: For Controller related and miscellaneous commands, the field is used for selecting a site.

d. After selecting the target object(s), click OK to return to the Configure User Defined Shortcut dialog box.
e. In the Time Until field, enter a length of time for how long the object(s) comply with the command state.
For example, to set a time of five minutes, enter "00:05". Leaving the field empty will leave the object(s) in
the new state indefinitely.

Note: For Controller related and miscellaneous commands, the field is used for selecting an alarm area
within the site.

You can optionally set up a second command using the controls in the Command Configuration, Then region
similarly to the above procedure and by enabling the Execute this command option. When doing this, you can
delay the second command by a period of time using the After Time Interval field.
When finished, click OK to close the dialog box and return to the map. The shortcut command appears as text/image
according to your settings.

Uniform Resource Locators (URLs)


URLs can be placed on site maps and will be "clickable" to operators, much like hyperlinks in web pages. URLs are
pointers that can be used for accessing web sites or documents. As long as the operating system can find the
resource and a suitable application for opening it, any type of file or document can be specified. For example, image
files, text documents, word processor documents, PDF documents etc.
URLs can be shown in site maps as text (in "hyperlink" blue), or as bitmap images. In the case of using images, when
the user hovers the mouse cursor over the image, a "tooltip" appears showing the actual URL text.
URLs can be up to 32 characters in length using the standard command shortcut feature, however, can be up to 254
characters by using a text object.

Note: A site map object can have no more than one URL assigned to it.

Creating Command Shortcut URLs


To add a URL command shortcut, proceed as follows:
1. In the Map Editor, select from the toolbox.
2. Click on the map to display the Configure User Defined Shortcut dialog box.

184 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

3. In the Shortcut Details region:


a. In the Shortcut Name field, type the URL for the shortcut. The URL will appear as a tooltip when an
operator hovers over the bitmap image for the shortcut in the site map. Use the following syntax for URLs,
replacing the bold text with your specific requirements:
For opening web sites or web pages, use "http://www.website.com/" or "www.website.com".
For various documents, use the path to the file. For example, "file://c:\security\evac.doc" or "http://
10.154.220.66/gms/al.bmp".

Note: Spaces in URLs are supported. Ensure replace all spaces in the URL with "%20".
The URL text can be up to 32 characters in length. For longer URLs use the text object method.

b. In the State Bitmap list, select a bitmap image from the GMS/Customer/Bitmaps folder. To select an image
from another location, click Bitmap. The Windows Open dialog box opens, where you can browse for the
file. Click Open to assign the file and close the dialog box. The new image displays in the preview region.

Note: GMS copies the image to the GMS/Customer/Bitmaps folder. The new image will apply to all GMS
workstations.

4. In the Command Configuration, Execute this command region:


a. In the Point Types list, select Miscellaneous.
b. In the Commands list, select Browse Web URL.
5. Click OK to close the dialog box and return to the map. The URL appears as text/image according to your
settings.

Creating Text Object URLs


To add a URL shortcut text object, proceed as follows:
1. In the Map Editor, select from the toolbox.
2. Click on the map to display the Text dialog box.

3. In the text entry region type the URL for the shortcut. The URL will appear as a tooltip when an operator hovers
over the bitmap image for the shortcut in the site map. Use the following syntax for URLs, replacing the bold
text with your specific requirements:
For opening web sites or web pages, use "http://www.website.com/" or "www.website.com".
For various documents, use the path to the file. For example, "file://c:\security\evac.doc" or "http://
10.154.220.66/gms/al.bmp".

Note: Spaces in URLs are supported. Ensure replace all spaces in the URL with "%20".
The URL text can be up to 254 characters in length. The URL text must be a single continous line - do not
use carriage returns.

You can specify displaying a bitmap image from the GMS/Customer/Bitmaps folder in the Site Map View
instead of the actual text. Do this by typing a space after the URL text and adding the bitmap file name in curly
braces. For example, "file://c:\for%20testing\security\printme.doc {code%20red.bmp}". Operators will see the
bitmap image instead of the URL text, however, they can see the URL text in a tooltip by hovering the mouse
cursor over the bitmap image.
4. Click OK to close the dialog box and return to the map. The URL appears as text/image according to your
settings.

Running Applications
Windows operating system support running applications and executing scripts or batch files using command
shortcuts, based on its "Start-Run" feature. GMS offers similar functionality through its URL support, where clicking a
URL can run another application or process. Using this method, it is also possible to define a specific application to run
as part of the URL. For example, instead of using Notepad to open a text file, you can specify using Word.
Create a URL using one of the above described methods, taking note of the following requirements.

Chapter 2 - Using the GMS Map Editor | 185


Configuring GMS - Administrator Guide

A special syntax is required in the URL, representing Windows parameters, to specify the application and the file in
question. Use the following syntax for URLs, replacing the bold text with your specific requirements:
For specifying an application that is registered by Windows and the file to open, use "wais://run://winword?
params=c:\security\evac.doc'. In this example, the name of the application executable is required only,
followed by the full file path.
For specifying an application that is not registered by Windows and the file to open, use 'wais://run://"c:
\program%20files\my%20app\myapp.exe"?params="c:\security%20folder\evac%20plan.doc"". In
this example, the full path to the application and the full application name is required, followed by the full file
path.

Note: Spaces are supported for running applications. If there are spaces, you need to replace them with
"%20" and enclose the parameter in double quotation marks ('"') as per the above example.
Depending on the application being used to open the file, it may be possible to open several files from the
one command. To do this, separate each file using "%20". For example, to open three files (called "file1.
doc", "file 2.txt" and "file3.rtf") with Microsoft Word, use "wais://run://winword?params=c:\test\file1.doc
%20"c:\test\file%202.txt"%20c:\test\file3.rtf".

186 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Creating Multi-Site Site Maps


GMS allows you to create a site map for multiple Controllers. This allows points from more than one Controller to
exist on a single site map. This feature is suitable for creating site maps for large installations with several
Controllers.
For example, a building has four Controllers. For a guard monitoring entrance readers, they must jump between four
site maps to view entries. As an alternative, a single map can be created with all readers visible on it. This single map
is referred to as a multi-site map.

Creating Multi-Site Site Maps


The first step to create a multi-Controller site map is to create a group of the sites to put on the map.
To create a site group, proceed as follows:
1. In the Map Editor, select Map > New. The Create New Map For dialog box opens.

2. Click Multi-Site Map. The Open Multi-Site Map dialog box opens.

3. To create a site group, click New. The Select Site(s) dialog box opens.

4. Select Site Group and click Edit. The SITE Groups Configuration dialog box opens.

5. Enter a group name in Enter Group Name.


6. Enter the sites to include in the group in Enter Range.
7. Click OK. A message is displayed asking if you want to overwrite the current group name. Click No to create a
new site group, click Yes to rename an existing site group. The dialog box closes.
8. In the Select Site(s) dialog box the newly created site group displayed in Site Group. Click OK. The dialog box
closes.

Chapter 2 - Using the GMS Map Editor | 187


Configuring GMS - Administrator Guide

9. In the Open Multi-Site Map dialog box, select the group from List of Site Groups, then click Open. The dialog
box closes.
10. The Site Details for Site dialog box for the selected site group opens (see Working with Site Map Data 203 ).
11. Enter details as required, then click OK. The dialog box closes.

12. Draw and place elements on the site map as required (see Drawing and Adding Objects to Site Maps 159 ).

Note: In a multi-site map you do not have the choice of configuring a reader as they have already been
configured.

Viewing Multi-Site Site Maps


1. In the Summary Manager, select View > Multi Site Map. The Multi-Site Map Selection dialog box opens.
2. Select a map then click Display Site Map.
3. When viewing a multi-site site map, transactions from all associated Controllers are displayed in the
Transaction Manager.
4. Clicking a card reader on a multi-site site map will still enable sending commands to the reader with the Reader/
Elevator Status dialog box.

188 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Configuring DVRs and CCTV Cameras


After installing GMS DVR support (see GMS Installation Guide or DVR Module Installation Guide), you must add the
DVR to the Controller hardware and set up the associated CCTV cameras. This maps the DVR and cameras, so that
operators can view video of an event from the correct camera and at the correct time.

Note: All DVR types must be configured as detailed below - any differences to the "standard"
configuration procedure for specific DVRs is detailed where required.
It is important that you create and position the cameras correctly on the site map in order to provide the
most accurate video footage possible.
When DVRs and cameras are correctly configured, the Transaction Manager creates "Video Event
Captured" messages each time an event from an input point with an associated camera/DVR is received
(see Recalling Stored Video from the Transaction Manager 217 ).
For a list of currently supported DVRs and features, refer to the DSS-019 Digital Video Datasheet.PDF file
that is installed into the GMS/DVR folder.

Adding a DVR to GMS


You need to add the DVR and set the correct type and model so that GMS can correctly communicate with it and the
connected cameras.
To add a DVR, proceed as follows:

1. In GMS, click . The Summary Manager opens.

2. In the graphical summary screen, right-click the site that will communicate with the DVR and select Controller
Settings from the context menu. The Controller dialog box for the site opens.

Note: The folowing sub-sections are additional requirements and apply to the specific DVR types
mentioned. DVR types not detailed in the sub-sections do not have additional requirements and the
"standard" configuration applies.

Controller Port Settings for Pelco and Dedicated Micros DVRs


The following port configuration is required for Pelco and Dedicated Micros DVRs:

Note: The Device ID value must match the ID number configured for the DVR in the DVR application.

a. In the Controller dialog box, select General > Network > Port Settings. The Controller Port Parameters
dialog box opens.

Chapter 2 - Using the GMS Map Editor | 189


Configuring GMS - Administrator Guide

b. Click the image of the port that the DVR is connected to. The Port Protocol Parameters dialog box for the
port opens.

c. In the Protocol list, select General Purpose DVR Driver.


d. In the DVR Type list, select the DVR type.
e. In the Baud Rate list, select the value matching the DVR communications speed.
f. In the No. of Data Bits list, select 8.
g. In the No. of Stop Bits list, select 1.
h. In the Parity list, select None.
i. In the Receive Buffer Size field, enter the maximum size that a frame of video footage can be. This value
is multiplied by 16 bytes to get the total number of bytes allowed. For example, a value of "100" would
equate to a maximum buffer size of 1600 bytes.
j. In the Physical Layer Protocol list, select EIA RS232C.
k. In the SCC Reset Time when Offline field, enter 5.
l. In the Time between idle polls field, enter 10.
m. In the Max. NAKs before delete field, enter 5.
n. In the Device ID field, enter the device number on the port for the DVR.
o. Click Download to save the settings in the Controller.
p. Click Reboot to restart the port using the new settings.

Controller IP Settings for Lanaccess OnSafe DVRs


The following IP port configuration is required for Lanaccess OnSafe DVRs:

190 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Note: If the DVR is not using the default port number, specify the correct port number.
If the network has multiple onSafe DVRs, it is best to specify IP addresses.
Controller preset passwords are set from General > Networks > Port Settings > Advanced > System
Passwords. When setting the password, ensure that the Unicode option is disabled.

a. In the Controller dialog box, select General > Network > General Purpose IP Settings. The General
Purpose IP Parameters dialog box opens.

b. In the Port# field, enter the DVR port address to use for communications. The default port for onSafe DVRs
is "2002". Specifying 2002 or 0 will connect to the default port.
c. In the Protocol list, select onSafe and in the adjacent list, select TCP.
d. In the Local Port list, select (1) Ethernet.
e. In the IP Address field, enter the DVR IP address. If you leave the setting at "0.0.0.0", the Controller will
look for an OnSafe DVR and use the details of the first OnSafe DVR it finds.
f. In the Login Name field, enter the login name programmed in the DVR (max. 15 characters).
g. In the Select a number from the Password Index field, enter a password number from the Pacom
password list. This password associated with the number must match the password programmed in the
DVR.
h. Click Download to save the settings to the Controller, then click Close.
When the DVR comes online to the Controller, a corresponding message is displayed in the Transaction
Manager.

3. In the Controller dialog box, select Alarm > Configure > Hardware. A graphical representation of the
hardware configuration is displayed in the dialog box - this is the "device map", showing the various pieces of
hardware (keypads, I/O devices, etc) attached to the Controller.

4. Right-click a blank area of the device map and select Add Device from the context menu. The Device
Configuration dialog box opens.

Chapter 2 - Using the GMS Map Editor | 191


Configuring GMS - Administrator Guide

5. In the Device Type list, select 3rd Party Device. Ignore the Port Number setting.

Note: The folowing sub-sections are additional requirements and apply to the specific DVR types
mentioned. DVR types not detailed in the sub-sections do not have additional requirements and the
"standard" configuration applies.

Device Map Settings for Lanaccess OnSafe DVRs


The following procedure describes how to add an Lanaccess OnSafe DVR to the device map:

Note: See the OnSafe DVR documentation for input types.


Virtual outputs are not assigned to any outputs in the OnSafe DVR.
OnSafe DVRs generate alarm messages if they have a hard drive failure.

a. In the Device Type list, select onSafe DVR I/O.


All OnSafe DVR inputs are mapped 1 to 1. This means all DVR inputs can be mapped to Controller inputs.
Physical inputs 1 - 4.
Hard drive fails 121 - 122.
Virtual inputs 128 - 135.
Camera no signal 136 - 155.
Virtual inputs 201 - 220.
All OnSafe DVR outputs are mapped 1 to 1.
Physical outputs 1 - 3.
To turn an OnSafe virtual input on, additional virtual outputs are used. Onsafe virtual outputs 193 - 200
are used to activate virtual inputs 128 - 135 and virtual outputs 201 - 220 for virtual inputs 201 - 220.
When configuring Controller outputs to activate the first block of virtual inputs on the DVR, add a new
OnSafe output device which starts at address 201. Set this to any free output point on the Controller
(max. available outputs is generally 64).
All OnSafe DVR cameras are assigned an ID number from 1 - 20. When configuring cameras on the
Controller, add a new OnSafe device which starts at address 1. Set this to any free camera point on the
Controller.

6. In the Start Point No on Device field, enter "1".

Note: If you have multiple DVRs using the same Controller port, the Start Point No on Device setting
can not overlap with an already used point number. For example, if your first DVR supports 16 cameras
and its Start Point No on Device setting is "1", the next DVR Start Point No on Device setting should
be "17".

7. In the Point Type list, select CCTV Camera.


8. In the Report Point Start Address field, enter 1.
9. In the Number of Report Points field, enter the number of cameras that the DVR supports. For example, if the
DVR is a GE model that supports 16 cameras, enter "16".
10. Click OK to save changes and exit. A third-party device is added to the device map. The descriptive text shows
you the port number that the DVR is connected to and the logical camera numbers.
11. In the Controller dialog box, select File > Download Configuration to save the changes in the Controller.
Once the DVR is set up in GMS, you can add CCTV cameras to the site map and assign a DVR to them.

192 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Adding CCTV Cameras to Site Maps and Assigning DVRs


Adding CCTV cameras to site maps is an optional configuration that allows GMS operators to view representations of
cameras (locations and associated input points). When an input point with an associated camera is in alarm,
operators see this on the site map and when actioning the alarm, video footage is displayed automatically as part of
the alarm actioning process (see Configuring Automatic Video Display on Alarm 195 ). Operators can also selectively
view footage from a CCTV camera by clicking its site map icon, regardless of any alarms. When adding CCTV cameras
to site maps, they must be linked to a configured DVR. To add cameras to a site map and assign the DVR, proceed as
follows:

Note: For instructions specific for certain DVRs, refer to the DVR Type Notes 194 .
Any required IP address entries must be correct in order for GMS to locate the device.

1. In GMS, click . The Summary Manager opens.

2. In the graphical summary screen, right-click the site that you want to add CCTV cameras to and select Site Map
Editor from the context menu. The Map Editor opens with the site map loaded (see Using the Site Map Editor
152 ).

3. In the Map Editor, click to enter device placement mode. Click a location on the map to place a camera. The
Device Configuration dialog box opens.

Chapter 2 - Using the GMS Map Editor | 193


Configuring GMS - Administrator Guide

4. Click the Configuration tab.


5. In the Device Type list, select CCTV Camera.
5. In the DVR Type list, select the correct DVR make/model that the camera is attached to.
6. In the IP Address/Phone # field, enter the IP address of the DVR.
7. In the User Login field, enter the login name to use to connect to the DVR.
8. In the Password field, enter the password of the user login.
9. In the Physical Device No field, enter the input number on the DVR that the camera is connected to.
10. In the Direction field, enter a number of degrees to rotate the camera counter-clockwise if required.
11. Click OK. A camera icon appears in the site map.

DVR Type Notes


Note: The following notes are appplicable only to the specific DVR types mentioned and detail any
deviations from the "standard" configuration, as required.

DVR Type Notes


Unsupported DVRs In the DVR Type list, select Custom.
Dallmeier In the IP Address/Phone # field, enter the name of the DVR as set in its
configuration using the DVR application. The login credentials are also set in the DVR
application - leave the User Login and Password fields blank.
Dedicated Micros In the DVR Type list, select either Ded. Micros DS2 or Ded. Micros DV-IP
depending on the model DVR. For DS2 series set the User Login and Password
fields to the same values set in the DVR application. For DS2 series enter the DVR
device line address. If you have daisy-chained multiple DVRs this setting needs to be
the address of the master DVR (see Installing Dedicated Micros DS2 Series DVRs).
For DV-IP series the User Login and Password fields are not applicable.
GE Set the User Login and Password fields to the same values set in the DVR
application.
IDIS Set the User Login and Password fields to the same values set in the DVR
application.
IndigoVision Set the User Login and Password fields to the same values set in the DVR
application. Click Advanced to open the Advanced Configuration dialog box and enter
the IP address of the NVR in the NVR IP Address field. Click OK to save the settings
and close the dialog box.
Integral Technologies Set the User Login and Password fields to the same values set in the DVR
application.
IP Camera Enables video to be shown in a standard web browser (no GMS viewer or special
viewer application required) and not in the GMS DVR dialog box. In the IP Address/
Phone # field, enter the IP address of the camera. Set the User Login and
Password fields to the factory default values, or to values set in the IP camera
configuration application.
Samsung The IP address and login credentials are set in the DVR application. As part of this
process, enter the site name matching that entered in the DVR application in the IP
Address/Phone # field and leave the User Login and Password fields blank.

194 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

When you have finished adding CCTV cameras, save the map file, then exit the Map Editor.

Configuring Automatic Video Display on Alarm


GMS supports linking input points with CCTV cameras/DVRs. This is so that when an input point is in alarm and the
operator actions the alarm, live video footage of the location where the alarm has occurred is automatically displayed
to the operator. This facility can be enhanced by also showing pre-recorded video footage of the alarm location in a
second dialog box.

Configuring Live Video on Alarm


To configure live video display when actioning alarms, proceed as follows:

1. In GMS, click . The Summary Manager opens.

2. In the graphical summary screen, click the site that you want to edit. The Site Map View opens with the site
map loaded.

3. Right-click the required input point. The Input Point Configuration dialog box opens.

Chapter 2 - Using the GMS Map Editor | 195


Configuring GMS - Administrator Guide

4. Click the Configuration tab.


5. In the Associated CCTV Camera field, enter the input point number to associate with.
6. Click OK.
Now, when the input point with camera associated is in an alarm state and is actioned, the DVR dialog box displays
automatically with live video showing.

Configuring Recorded Video on Alarm


Note: This feature is available only with DVRs that support pre and post-event video recall.

To configure pre-recorded video display when actioning alarms, proceed as follows:

1. In GMS, click . The Summary Manager opens.

2. In the graphical summary screen, right-click the site to edit and select Controller Settings from the context
menu. The Controller dialog box for the site opens.
3. In the Controller dialog box, select Alarm > Configure > Hardware. A graphical representation of the
hardware configuration is displayed in the dialog box - this is the "device map", showing the various pieces of
hardware (keypads, I/O devices, etc) attached to the Controller.

196 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

4. On the device map, click the PCB image for the input device. A graphic of the PCB displays in a new dialog box.
The input points display as a red and white icons.
5. Double-click the input point to edit. The Configuration for Input dialog box opens.

6. Click Outputs. The Output Activations for Input dialog box opens.

7. Select a suitable option from the Select an output or camera... list and the click Add Activation. The output
and its vocab is added to the Activate list and the Activation Duration dialog box for the selected output opens.

Note: If the output activation already exists for the input, click Edit Activation to open the Activation
Duration dialog box.

Chapter 2 - Using the GMS Map Editor | 197


Configuring GMS - Administrator Guide

8. Select the Time option and enter an amount of time to recall video for in the Duration field. To set the duration
in minutes, enable the Activation time in min option.
9. Enable the Capture Pre and Post Alarm Video option.

Note: The Set video to local playback port and Write video to disk options apply to pacom Witness
DVRs only.

10. Click OK in the various dialog boxes used to save settings and close them.
Now, when the input point with camera associated is in an alarm state and is actioned, the DVR dialog box displays
automatically with recorded video showing for the required time before and after the actual time that the alarm event
occurred.

Changing DVR Parameters


DVR operating parameters are usually configured using the native DVR application or from the DVR INI file. These
parameters include settings such as the length of time for pre and post event footage and preset degrees of camera
rotation, etc. Refer to the DVR documentation for details.
To launch DVR applications from GMS, select Interfaces > DVR, then click the DVR application to open.

Note: Some DVR applications require you to be logged in as a Windows administrator to perform certain
functions, such as adding DVR servers.
You cannot launch the Dedicated Micros DV-IP DVR application from GMS.

Synchronizing DVRs with GMS


Alarm system management and response is time based, therefore, it is crucial that DVRs are time-synchronized with
GMS. The GMS event management time and DVR time must be synchronized, so that when video footage is
requested for an event in GMS, the GMS time of the actual recording calls up the correct footage from the DVR.

Caution: If GMS and DVR times differ, it may not be possible to display the correct, or full video footage
from the DVR through GMS.

After installing a DVR, synchronize it to GMS time using Windows or DVR-specific methods. See Windows and DVR
documentation for details.

Note: For some Samsung DVRs, the DVR application has a feature that synchronizes the DVR with the
local computer time. You can also time-synchronize using a Network Time Protocol (NTP) server.

198 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Managing Site Maps


You can use the Map Editor to create and modify maps of sites to show the location of security devices and alarm
points. You can create multiple maps for an area and save them individually.

Creating Map Files


To create a map, proceed as follows:
1. Select Map > New, or click . The Create New Map For dialog box opens.
-or-
Select Map > Open, or click . The Open Map File dialog box opens.

2. In the Site Number field, enter the site number to associate the map with.
Either of the following will happen based on whether or not a map file for the site already exists.
For a new map, GMS will display a dialog box prompting for site data (see Working with Site Map Data 203 ).
For an existing map, GMS requests to overwrite the existing file. Click Yes to discard existing file. Click No to
enter a different site number.

Caution: If an existing map file has the same name as the new map, it is DISCARDED (replaced with new
blank map) along with any associated site details and site contacts.

An empty map for the nominated site is displayed.

Opening Existing Map Files


To open an existing map, proceed as follows:
1. Select Map > Open, or click . The Open Map File dialog box opens.
2. In the Site Number field, enter the site number for the map. If the site has multiple map files, select one in
the Map Files list.
3. Click OK. The selected map is displayed.
-or-
In the Open Map File dialog box, click Multi-Site Map. The Open Multi-Site Map dialog box opens.

Select the site maps to open, then click Open. The selected map is displayed.

Chapter 2 - Using the GMS Map Editor | 199


Configuring GMS - Administrator Guide

Note: You can open the Map Editor directly from within any GMS module where you can view a site area.
For example, right-clicking a site in the Summary Manager and selecting Map File Editor from the
context menu.

Saving Map Files


Note: When saving a map in the Map Editor, hold down the SHIFT key during the save. This ensures that
GMS synchronizes the map file and the database and will avoid any possible differences between them.
This also works with map files brought in from other systems, where the contents of the map file will be
included in the GMS database.

To save a map, proceed as follows:


1. Select Map > Save, or click .

Saving a Map File to a New Name


To save a map to a new name, proceed as follows:
1. Select Map > Save As, or click . The Create New Map For dialog box opens.

2. Do either of the following:


In the Site No. field, enter the site number to save the map to and, if required, in the Area field, enter the
area number if the map has to be saved for a specific area of the site.
Select an existing map file from the Map Files list. This will overwrite the existing map file.
3. Click OK. The Save Options for Site dialog box opens.

200 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

4. Enable the checkbox for each piece of information you want to save from the existing map file to the new file.
5. Click OK to save the map file.

Printing Map Files


You can print a map as well as the data related to the map. To print a map, proceed as follows:
1. Select Map > Print, or click . The Printing Topics dialog box opens. Configure the parameters according to the
following section.

Parameter Description
Site Details Select to print site details for the displayed site map.
Site Contact Select to print site contact details for the displayed site map.
Callout List Select to print a callout list for the displayed site map. All instructions for the
map are displayed, local as well as global.
Points Details Select to print points details for the displayed site.
Map Select to print the site map for the displayed site.
Preview Select to display a report on topics that are to be printed. This preview is
available before the report is printed to the printer.

Note: You cannot preview that actual map diagram, and if the
Preview option is enabled, the map diagram will not be printed.

2. Click OK. If the Preview option is enabled, a preview of the report will display in a preview dialog box. You can
print the report directly from the dialog box.

Note: If the Preview option is enabled, the map diagram will not be printed. Therefore, in order to print
the actual map diagram, ensure that the Preview option is disabled.

Backing Up Map Files


To backup a map, proceed as follows:
1. Select Map > Backup, or click . The Backup Files dialog opens.

2. In the Files list, select the map files to backup. To select a range of files, hold down the SHIFT key and click the
first and last files, or click each individual file.

Chapter 2 - Using the GMS Map Editor | 201


Configuring GMS - Administrator Guide

3. In the Enter Destination Dir field, enter the location for the backup files to be saved to, or click ... to open the
Windows Browse for Folder dialog box, where you can browse to the save location.
4. Click OK to start the backup. You can use the Windows Explorer to check if the files are in the destination folder.

Restoring Map Files from Backup


To restore a map file from its backup, proceed as follows:
1. Select Map > Restore, or click . The Restore Files dialog box opens.

2. In the Enter Source Dir field, enter the location of the backup map files, or click ... to open the Windows
Browse for Folder dialog box, where you can browse to the store location.
3. In the Files list, select the map files to restore. To select a range of files, hold down the SHIFT key and click the
first and last files, or click each individual file.
4. Click OK to start the restore.
5. If the file(s) that are to be restored already exist, a prompt is displayed. Click Yes for the backup file to replace
the current file.

Deleting Map Files


To delete a map file, proceed as follows:
1. Select Map > Delete. The Delete Files dialog box opens.

2. In the Files list, select the map(s) to delete. If you are deleting a map file with multiple areas, a confirmation
window will open asking if you wish to delete the associated files as well. Click No to delete the single area only,
or Yes to delete the area as well as all the associated files

Note: The map file being deleted should not be open.

3. Click OK.

202 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Working with Site Map Data


You can store various information regarding a site together with its map, such as:
Site contacts.
Site data.
Guard tour data (see Creating Guard Tours 207 ).
Operator response procedures (operator instructions) (see Assigning Operator Response Procedures 54 ).
This information provides GMS operators quick access to people to contact when a security issue occurs and
instructions as to what they should do in response to the situation.

Adding Site Contact Information to Site Maps


To add site contact details for a site to its map, proceed as follows:
1. In the Map Editor toolbar click . The Site Contacts for Site dialog box opens.

Note: By default, each site has up to 8 contacts. This number can be modified to a maximum of 32
contacts. To do this, from the GMS window, click Tools > Options, specify the value in No. of Site
Contacts (per Site).

2. In the Name fields enter the name(s) of site contact person(s).


Alternatively, click Global Contacts to select members of the Global Contacts list.
3. Enter the position or title of the contact person in Position.
4. Enter the contact person address in the Address tab fields.
5. Enter information in the remaining details as required.

Note: Telephone number entry fields can also be automatically filled from Address Book contacts, see
Automatically Applying/Dialling Address Book Telephone Numbers in GMS 71 .

6. To change order of the contact people in the Personal Details list, enter their list number next to Swap, then
click Swap.
7. Click OK.

Adding Site Data to Site Maps


Details about a site can be stored in the map, such as location, contact numbers etc.
To specify or modify site data, proceed as follows:
1. In the Map Editor toolbar, click . The Site Data for Site dialog box opens.

Chapter 2 - Using the GMS Map Editor | 203


Configuring GMS - Administrator Guide

Parameter Description
Account # Enter site account information (any characters), if required. This is generally
used to help operators more easily identify a site than by logical site number
alone. The account number can be used to identify the site for Transaction
Manager messages and in the Summary Manager (see Displaying Site ID or
Account Numbers 119 ).
Security Level Enter a number (1 - 8) to represent the security importance perceived for the
site, if required. This setting works in conjunction with the event dispatch
scheme (Event Dispatch Scheme Configuration dialog box, Site Security
Level option)
URN Enter a unique identifier for the site (any characters), if required. This is
generally used as an extra "password" for authenticating a caller from a site.
That is, only a GMS operator would be able to see and quote this information.
URN2 As per the URN field, above.
Site Name Enter a name for the site.
Address, Address-1, Enter site address details in the appropriate fields. The site address information
City, State, Zip is used by GMS mapping features (if installed) for locating the site and
displaying the appropriate map. If no site address is provided or can be found
by the mapping application, the co-ordinates are used.
Phone, A/H Phone, Fax Enter site contact telephone details in the appropriate fields.
Time Zone Select the time zone for the site.
Longitude Enter the longitudinal co-ordinate of the site. GMS mapping features (if
installed) will use this setting or locating the site and displaying the
appropriate map, if no site address is provided.
Latitude Enter the latitudinal co-ordinate of the site. GMS mapping features (if installed)
will use this setting or locating the site and displaying the appropriate map, if
no site address is provided.
Linked Enter the site (Controller) ID number to link to. Any one site can be linked to
up to two others and allows operators to switch between them directly in the
Site Map view. When linking sites, the site where this parameter has been set
is the "master" site, with the other site(s) being slaves. Slave sites follow mode
changes of their master site.

2. In the Details tab, specify the general details about the site, such as name and location.
3. Open the Miscellaneous tab. Enter details such as names and contact numbers as required.

204 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Note: Telephone number entry fields can also be automatically filled from Address Book contacts, see
Automatically Applying/Dialling Address Book Telephone Numbers in GMS 71 .

4. Fields in the User Page-1 and User Page-2 allow for customized details.
5. Open the Times tab. In this tab users can specify the opening and closing times of the site for weekdays,
weekends and holidays. Drag the lower slide first to specify the closing time of the site. Then drag the upper
slide to set the opening time of the site.

For more information on how to control alarms beyond the opening and closing times (see Setting Up Outside
Hours Access to Site Maps 205 ).

Note: GMS operators can set up "temporary" open/close times for a site that over-ride the site data
settings for up to seven days (one week), after which "normal" site data times are used (see Configuring
GMS - Administrator Guide, Understanding the Site Map View Interface).

6. In the Panel Page tab, most information is read from the Controller and is not available for modification.
However, in the last four fields, users can specify their own data as they require.

7. Click OK.

Setting Up Outside Hours Access Using Site Maps


Note: This is an alternative to configuring the Controller to monitor the Outside Hours Access alarms.

A site that is late to open or late to close will create an "Outside Hours Access" alarm for anyone openning a site
outside of working hours. Control when the alarms should be generated by setting the following flags in the GMS32.
INI file under [Parameters].

Chapter 2 - Using the GMS Map Editor | 205


Configuring GMS - Administrator Guide

Parameter Description
OHAOffset Any entrance into a site before or after working times creates an alarm, however, you
can specify a period of time before/after normal hours to wait before generating the
alarm. For example, setting a value of 30 for a site with working hours of 0900 to
1700 hours will prevent any outside hours access alarms being generated from 0830
to 0900 hours and 1700 to 1730 hours.
OHAEnabled Set to 0 for sites with no time programmed and not wanting any outside hours access
alarms reported. Also set to 0 if open and close times are not set in the Site Data for
Site dialog box, Times tab (see Adding Site Data to Site Maps 203 ).
Set to 1 for sites that require alarms for every entry even if times are programmed.

Note: Once the GMS32.INI settings have been configured and the Site Data Times have been entered, a
system task is required for LTO (Late To Open) and LTC (Late to Close) alarms for each site or site group
that is to be monitored.
A site with time programmed for one or more days will also create outside access alarms if opened on any
other, non-programmed days.

206 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

Creating Guard Tours


You can set up a route for a security guards to follow and check the security of a site. Each guard tour can be made
up of a sequential route through each area of the site, or setup as unsequenced with a specific time limit assigned to
the tour. As the guard passes through the site, detectors pick up his/her progress, which helps maintain their safety
and also checks that detectors and other devices are working properly.
Guard tours can also be assigned to multiple sites (see Creating and Managing Multi-Site Guard Tours 89 ).

Creating Guard Tours


To create a guard tour, proceed as follows:
1. In the Map Editor select Edit > Edit Guard Tour. The Guard Tour Configuration dialog box opens.

Parameter Description
Enter Guard Tour No. Enter the number of the guard tour you want to create, view or edit. Max. = 8.
Select Click to view or edit the guard tour specified in the Enter Guard Tour No.
field. The points included in the tour and the time allowed to spend on each is
displayed.
Unsequenced Enable so that the guard does not have to visit the points in a set order during
the tour.
Enter Station Sequence If the Unsequenced option is disabled, the guard must visit the points in the
order entered here. Enter the point numbers manually, or click on the points on
the map to create the tour.
Enter Station Duration Enter the amount of time allowed for each station (point). The guard must not
(Mins) exceed this time at any stage during their tour or an alarm will be raised.

Creating Guard Tours for a Single Site - Sequenced Route


To specify a guard tour for a single site for a sequence route, proceed as follows:
1. In the Map Editor select Edit > Edit Guard Tour. The Guard Tour Configuration dialog box opens.
2. Enter a number of a security guard tour in Enter Guard Tour No.. Alternatively, click Select to select an
existing guard tour to edit.
3. Ensure the Unsequenced box is not selected.
4. Enter the sequence of stations that the guard must follow during the tour of the site, in Enter Station
Sequence.
Alternatively, use the site map. Move the Guard Tour Configuration dialog box to one side of the screen (do not
close it) so that the site map is visible. Click on each point in the map that is to be included in the tour, in
sequence. The sequence of stations will automatically appear in Enter Station Sequence.
5. Enter the amount of time allowed for travelling between each station in the tour, in Enter Station Duration. If
the station sequence was created by clicking on the points on the map, a default time of ten minutes was
automatically entered. Edit to suit tour.
The guard must not exceed this time limit at any stage of their tour, or an alarm is raised.
6. Click OK.

Creating Guard Tours for Single Site - Unsequenced Route


To specify a guard tour for a single site for an unsequenced route, proceed as follows:
1. Repeat all steps from in Setting Guard Tours for Single Site - Sequenced Route 207 , except:
Ensure that the Unsequenced option is enabled.

Chapter 2 - Using the GMS Map Editor | 207


Configuring GMS - Administrator Guide

Alarm State Icons


GMS site maps use a range of icons that represent various security devices on site maps. This is to make
identification of what type of object is in an alarm, or other state. When an alarm point changes state, GMS uses the
icon for the corresponding state in the site map. The idea of having different icons for each state is to make the state
change obvious to operators. For example, having an input point in black for normal state and in red for alarm state.

Note: Before alarm state icons can be used, they need to be enabled. In the GMS32.INI file (System INI
file option in the Edit System Files dialog box), under [System Parameters], set Use Alarm State
Bitmap to 1 (see Editing System Data Files 118 ).

The following example shows a door icon in locked and unlocked states, making either easy to spot on a site map.

Note: Some types of site map objects, such as input and output points, support an array of icons to
represent several possible states.

State Icon Transaction Manager Message


Door Icon (locked)

Door Icon (unlocked)

Using Custom Alarm State Icons


You can use different icons to display on site maps instead of the Pacom types. In order to do this, you need to create
the icons in bitmap format and assign them to device types in GMS. For each object type, there are several icons,
each one representing a different state.
The naming of the icon files is how GMS determines which one to use for a particular state. Alarm state icons are
named in three parts, as follows:
The first part of the file name represents the device type. For example, "PIR".
The second part of the file name represents the state that the point must be in to use a particular icon. It is
"_" (underscore) followed by a letter that represents the state. For example, "PIR_A" represents a PIR input in
an alarm state. See the following tables for which letters represent which state for the applicable major device
types.
The third part of the name is the file suffix. This must always be ".BMP".

Note: You must define a icon for each possible state.

Input Point, Output Point and Card Reader Icon Naming


Input Points Output Points Card Readers
*.BMP Normal state. *.BMP Normal state. *.BMP Normal/Restore
state.
*_A.BMP Alarm state. *_O.BMP On state. *_L.BMP Lock state.
*_I.BMP Isolate state. *_I.BMP Isolate state. *_I.BMP Isolate state.
*_N.BMP Report Alarm state. *_E.BMP Access/Egress state.
*_P.BMP Tamper alarm state. *_A.BMP Offline, Tamper or
Report Alarm state.
*_S.BMP Soak state. *_U.BMP Unlock state.

Note: Other type of alarm points (devices/keypads etc.) use the same file naming convention as input
points.
In all cases, *.BMP is used if no icon is available for a particular state, and may also be masked to appear
somewhat different to the "normal state" icon.

Assigning Custom Alarm State Icons


To assign non-standard icons to site map device types, proceed as follows:
1. Open the site map for any site.

208 | Chapter 2 - Using the GMS Map Editor


Configuring GMS - Administrator Guide

2. Right-click the device type you want to change the icons for. The Configuration dialog box for the device opens.

Note: Each major device type (for example, inputs and outputs) has a range of related device types,
which are presented in the Configuration dialog box for that major device type. For example, the Input
Point Configuration dialog box lists input devices that you can assign custom icons to. To assign custom
icons to output objects, use the Output Point Configuration dialog box.

3. In the Device Type list, select the device you want to customize.
4. Click Bitmap. The Bitmap dialog box opens.

5. Deselect the Use Default option.


6. Click .... The Windows Open dialog box opens, where you can browse for the file. Click Open to assign the file
and close the dialog box.
7. The new image displays in the Preview region. Click OK to save the settings and close the Bitmap dialog box.
8. Click OK to close the Configuration dialog box.
GMS copies the icons to the GMS/Customer/Bitmaps folder. The new icons will apply to all GMS workstations.
To revert to the original Pacom icons, repeat steps 1 - 4, then:
1. Enable the Use Default option.
2. Click OK, OK to apply the changes and close the dialog boxes.

Chapter 2 - Using the GMS Map Editor | 209


blank page
Configuring GMS - Administrator Guide

Chapter 3
Using the Transaction Manager

211
Configuring GMS - Administrator Guide

The Transaction Manager displays all alarms detected on the security network and other messages, and
automatically records a log of each days activity. The Transaction Manager is "live" all the time. That is, its activity
is constantly being updated in real-time.
The Transaction Manager can perform, or supports the following:
Real-time transaction management.
Monitoring network activity.
Creating customized site and network element reports.
Displaying transaction management logs.
Alarm message management.
Log file management.
Edit system message files.

Opening the Transaction Manager

1. In GMS, click .

212 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Understanding the Transaction Manager Interface


Messages displayed in the Transaction Manager can be categorized into several groups. All Transaction Manager
messages adhere to a set format, so there is no confusing messages of different types.

You can use the Transaction Manager to access the Site Map View (see Using GMS - Operator Guide, Using the
Site Map View), automatically loading information about the associated site by double-clicking site related messages.
You can also access the Card Access Manager (see Using GMS - Operator Guide, Using the Card Access Manager),
automatically loading information about the associated cardholder by double-clicking card-related messages.

Message Colors
The Transaction Manager uses color coding to primarily differentiate messages of different types and severity.
Accompanying each message is a range of summary information that determines the time that the alarm/event
causing the message happened, where it occurred, etc. The following section describes the basics for understanding
Transaction Manager messages.

Note: Due to the large number and variety of potential messages that can be generated in a system, it is
not practical to document each one individually.
The standard GMS color scheme is used. The color scheme can be modified.

Color Message Type Explanation


Turquoise Message: Local Status - Represent local GMS system messages for confirming
configuration changes and connections to GMS. These messages are not
transmitted across the network. For example, changing alarm priorities, updating
site maps, GMS workstation connection and operator log on/off.
Red Message: Alarm - Represent alarms and events reported by Controllers from
attached hardware devices and network elements. These can be either internal
(tamper, battery, etc) or external (sensors, buttons, etc connected to inputs)
alarms, for example, an I/O device input point.
Dark Red Alarm: Site - Represent messages or alarms relating to the site only, and not the
system. These include operator actions on a site, for example, sending group
commands.
Black Message: External - Represent alarm reminder messages from network elements
and messages generated by other operators on the network. For example, other
GMS PCs that are connected to different CPU card ports - not the one your GMS PC
is connected to.
Message: Reset - Represent messages to indicate the resetting of alarm points.
Pink Message: CPU Internal - Represent CPU card activity messages. That is,
messages transmitted between the CPU card and other network elements, such as
Base Stations.
Yellow Alarm: System - Represent messages or alarms generated by and relating to local
GMS activity only, not the site. For example, internal condition messages and
system tasks.
Blue Message: GMS - Represent internal actions performed by GMS. These include
requests, commands and responses messages (to and from network elements). For
example, downloading configuration data to Controllers.
White Operator Actions - Actions taken by an operator in response to an event. That is,
event handling. These also provide an audit of operator actions.
Navy Blue Message: Card Access - Represent card access transaction messages. For
example, a valid card swipe through a reader.
Brown Represent group commands. That is, commands that are sent to multiple objects.

Chapter 3 - Using the Transaction Manager | 213


Configuring GMS - Administrator Guide

Color Message Type Explanation


Highlighted text abc Represent new events of a type - the type is represented by the highlight color.
Subsequent events of the same category appear as normal alarm/event messages
until the original event is cleared from the Events Manager. For example, an
external alarm occurring for the first time will be white text and red highlight.
Strikethrough Represents events that have been forwarded to a sub-server for handling (see
Using GMS Sub-Servers 236 ).

Due to limiting the bandwidth of messages throughout the system to maintain optimal system performance,
messages are kept as small as possible. The general format for messages covers two lines, as follows:

Customizing Transaction Manager Message Appearance


You can change the colors for a range of important message types and the background, as follows:
1. In the Transaction Manager, select Setup > Colors. The Transaction Log Appearance dialog box opens.

2. In the Item list, select the message type to configure.


3. Click the Color rectangle to select a color from the color picker. The Preview area shows the selected color
against the background as it would appear in the Transaction Manager.
4. Click OK to exit and apply the changes.
To return the settings to default, click Reset.

214 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Filtering Messages
You can select specific message types to filter from the Transaction Manager display. Filtering removes the
messages from the display, making the Transaction Manager easier to use, however, GMS still stores the filtered
messages in its database.

Note: Message filtering applies only to the "live" Transaction Manager display. You cannot filter
transaction log files saved from previous days.

To filter out specific messages, proceed as follows:


1. In the Transaction Manager, select Setup > Message View Filters. The Setup Message View Filters dialog
box opens.

2. Select the message types that you want to prevent from appearing in the Transaction Manager.
3. Click OK.

Chapter 3 - Using the Transaction Manager | 215


Configuring GMS - Administrator Guide

Managing Message Type Files


From time to time, Pacom may supply new alarm type message files, for a more extensive range of messages or new
features. You can load these files into GMS using the Transaction Manager. When you do this GMS will
automatically updates the existing message files with any extra content from new ones.
You can also edit the files, in effect, customizing the message formatting.

Loading Message Files


To load new/updated message files, proceed as follows:
1. In the Transaction Manager, select Options > Load Message Files. The Restore Files dialog box opens.

2. In the Enter Source Dir field, enter the location of the new message files, or click ... to open the Windows
Browse for Folder dialog box, where you can browse to the store location.
3. In the Files list, select the message files to load. To select a range of files, hold down the SHIFT key and click
the first and last files, or click each individual file.
4. Click OK to load the message files and exit, or Cancel to exit without loading the message files.

Editing Message Files


Caution: Pacom advises that message files should only be edited in consultation with a Pacom systems
engineer.

To edit alarm types/message files, proceed as follows:


1. On the GMS server, in the Transaction Manager, select Options > Edit Message Files. The Edit System Data
Files dialog box opens listin all available message string files.

2. In the File Selection list, select the message file, then click OK.
3. The GMS text editor opens with the selected file loaded.
4. Edit the file as required.
5. Click Save to save the system file. Use the text editor controls to select another file, copy and paste, etc.

216 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Recalling Stored Video from the Transaction


Manager
You can have GMS recall stored video footage by double-clicking a status message in the Transaction Manager.
An alarm message coming from a CCTV camera/DVR may have a video clip attached to it. It can be an alarm
message or a card transaction. If a video clip is attached, the alarm message will have a (V) in front of it.

You can also recall the video by double-clicking from the site log.

Note: When an alarm message is clicked it looks for an event captured message. If event captured is not
found there will be a beep.

An event created by an alarm will also display the operator instructions along with the video so the operator can see
what caused the alarm.

Chapter 3 - Using the Transaction Manager | 217


Configuring GMS - Administrator Guide

Managing and Viewing Log Files


GMS automatically records a log of each days Transaction Manager messages and other system activities on a daily
basis. These log files allow you to search back for transactions and past events or can be used for fault finding by
suitable technicians. Log files are stored in the GMS\Customer\Log folder.

Note: The log file name indicates the date that it represents. For example, the file WM070109.LOG is the
Windows/Transaction Manager (WM) log file (.LOG), for 9 January 2007 (07 - year, 01 - month, 09 -
day).

Viewing Log Files


To view a log file, proceed as follows:
1. In the Transaction Manager, click View Log File or select Log > View Log File. The View Log File dialog box
opens

2. Select the log file(s) you want to view. The default location is the GMS\Customer\Log folder.
3. Click Open. The log view is displayed in a separate panel within the Transaction Manager.

4. Click Home to go to the start of the log file, or End to go to the end of the file.
5. Press the F2 key or F2=Time Search to search for messages at a specific time in the log. The Enter Log Search
Time dialog box opens.

6. Enter the time in format HH:MM:SS.


7. Click OK. If a message does not exist for the exact time you entered, then the next closest time message is
displayed.
8. Click Exit to return to the Transaction Manager.

Printing Log Files


Note: Typically, log files are quite large and a print can run up to 120 A4 pages.

218 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

To print a log file, proceed as follows:


1. In the Transaction Manager toolbar, click Print Log File or select Log > Print Log File. The Print Log File
dialog box opens.

2. Select the log file to print.


3. Click Open to display the Windows Print dialog box.
4. Click OK to print.

Backing Up Log Files


To backup log files, proceed as follows:
1. In the Transaction Manager, select Log > Backup Log File. The Backup Files dialog box opens.

2. Select the log files to backup.


3. Enter a destination in the Enter Destination Dir field, or click ... to open the Windows Browse for Folder dialog
box, where you can browse to the save location.
4. Click OK to backup the selected files to the specified folder and exit.

Restoring Log Files from Backup


To restore log files, proceed as follows:
1. In the Transaction Manager, select Log > Restore Log File. The Restore Files dialog box opens.

2. In the Enter Source Dir field, enter the location of the backup map files, or click ... to open the Windows
Browse for Folder dialog box, where you can browse to the store location.
3. In the Files list, select the map files to restore. To select a range of files, hold down the SHIFT key and click the
first and last files, or click each individual file.
4. Click OK to start the restore to the GMS\Customer\Log folder and GMS database, then exit.

Chapter 3 - Using the Transaction Manager | 219


Configuring GMS - Administrator Guide

If the file(s) that are to be restored already exist, a prompt is displayed. Click Yes for the backup file to replace the
current file.

Deleting Log Files


To delete log files, proceed as follows:
1. In the Transaction Manager, select Log > Delete Log File. The Delete Files dialog box opens.

2. Select the log files to delete in the Files list.

Note: Only log files stored in the GMS\Customer\Log folder can be deleted.

3. Click OK to delete the selected log files and exit.

Limiting Log File Size


GMS has the ability to limit the size of certain log files (Trace.log, Task.log, Mobile.log and CMSGMS.log) using a
setting in the GMS32.INI file. At midnight, GMS examines the log file sizes and truncates them down to the maximum
allowable limit, where necessary. When truncation occurs, the oldest data is discarded.

Note: GMS can perform log file truncation only when it is able to load the entire file into virtual memory
as a single block, that is, there must be no interruption to the memory blocks representing the file data.
This means that if a large log file cannot be loaded into the one continuous memory space, GMS will not be
able to determine the end of the file and therefore, will not be able to truncate it. The actual setting of the
maximum file size is 10MB by default, however, depending on the system resources available, it is
recommended to set the maximum log file size to no more than 150MB.

Limit the maximum allowable log file size in the GMS32.INI file, as follows:

Note: Changes to the GMS32.INI file for log files must be carried out on the GMS server only.

1. Open the GMS32.INI file on the GMS server (see Editing System Data Files 118 ).
2. Under [System Parameters], edit the following line:
Max Log File Size=xx
Where xx is the required size (in MB).

220 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Creating and Managing Site and Transaction Reports


A database of information about the sites in the security network is recorded and saved by GMS. You can call on
these details to report on specific information about your security network.
You can set the reports up to include any information you require about the different elements of your security
network. For example, details about specific sites, network elements, site events and the actions performed by GMS
users.
The reports available from the Transaction Manager are:

Report Type Description


Site Information about the various alarm messages or actions that are specific to a site.
Site reports can include any range of sites (from 1 to 10,000), a date and time
window, and a number of message types.
Network Element Information specific to network elements. Network element reports can include any
range of network elements (from 1A/1B to "n"'A/"n"B), a date and time window, and
a number of element, alarm, status and parameter types.
User Action Information about the actions performed by GMS users. User action reports can
include any range of users (from 1 to 32), a date and time window, and a number of
action types. The user action report is essentially an audit trail.
Site Event Information about specific events that have occurred at sites. Site event reports can
include any event type for a site that occurred between a range of dates.

Note: There are two types of site event report, depending on the selected
alarm management mode (see Configuring Alarm Event Management &
Response Procedure Display Settings 49 ).

Note: Transaction reports are also available from GMS. In GMS, click , then select the required
report type from the context menu.

Once you have decided on the appropriate type of report, you can further customize them as required.

Creating Site Reports


To create a site event report, proceed as follows:

1. In the Transaction Manager, click or select Report > Create Site Report. The Site Report Options
dialog box opens.

2. In the Enter Site No and End Site No fields, define the range of sites to generate the report from.
3. In the Start Date and End Date fields, define the date for the report (in DD/MM/YYY format).
4. In the Start Time and End Time fields, define the time range for the report (in HH:MM:SS format).
To search only between the Start Time and End Time settings for each day in the date range, enable the
Within Time Interval option. If this option is disabled, searching begins from the Start Time on the first
day and ends at the End Time on the last day.
5. In the Sorted Field list, select the order in which the data will be presented. For example, select Date & Time
to sort the data by the date and time of each event, rather than by the site.
Enable the Reverse Chronological Order option to reverse the order that the data is displayed in the report.
6. In the Report Types list, select the data type for the report. For example, select Alarms, and the report will
contain only alarm messages. Conversely, select All Messages, and the report will contain all possible message
types.

Chapter 3 - Using the Transaction Manager | 221


Configuring GMS - Administrator Guide

7. Click Set to create the report (this may take a few moments). When the report is complete, Preview, Print and
Export become available.
To preview a report click Preview. The report is displayed in the Report Preview window. This may take a
few moments, depending on the size of the report.
To print a report, click Print.
To export a report to a file, click Export. The Export dialog box opens.

In the Format list, select the relevant file type for the exported report, then click OK. The Export Options
dialog box opens.

Select the range of report pages to include in the exported report, then click OK. The Choose Export File
dialog box opens.

Browse for a folder to save the exported report to and provide a name in the File Name field, then click
Save.
9. Click Done in the Site Report Options dialog box when you have completed all required actions. This will
complete the site report.
Depending on the selected Report Type option, GMS allows for further customization of reports:

Report Type Customization Options


User Defined Allows a combination of message types. Select the message types to include in the
site report by selecting the relevant alarm messages from each tab. Select as many
alarm message types as you like.
External Alarms Include external points, then enter relevant details.

222 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Report Type Customization Options


Operator Actions Sort the operator actions by either selecting Operator No and select an operator
from the list, or by entering an event number in Event No. Select the operator
actions to include from Operator Actions. Select Event Type and Additional
Options.
Using Report Select the appropriate report template from Report Templates to use a standard, or
Templates customized site report.

Creating Network Element Reports


To create a network element report, proceed as follows:

1. In the Transaction Manager, click or select Reports > Create Net Elem Report. The Create Network
Element Report dialog box opens.

2. In the Element Types list, select the network elements to include in the report.
3. Select CPU Port: A and/or B to include selected element types connected to the relevant Base Station CPU card
ports.
4. In the Start Elem No and End Elem No fields, type the range of elements.
5. In the Start Date and End Date fields, type the date range for the report (in DD/MM/YYYY format).
6. In the Start Time and End Time fields, define the time range (in HH:MM:SS format).
7. In the Alarm Types list, select the types of network element alarm messages. To select all alarm types in the
list, click Select All. Keep in mind that this also selects all status types and alarm reset types. Click Deselect
All to de-select all alarm types.
8. In the Status Types list, select the types of network element status messages.
9. In the Alarm Reset Types list, select the types of network element alarm reset messages.
10. A number of other messages may also be included in the network element report. Select the relevant
checkboxes in the Miscellaneous and Parameters regions to include these message types in the report.
11. After selecting the element/message type options to include in the report, you can choose to view, print, and/or
write the report to a file:
To preview the report after it is created, enable View.
To print the report after it is created, enable Print. The report will be sent directly to the default printer. A
confirmation will be displayed briefly.
To write the report to a file after it is created, select Write to File.
12. Click OK to create the report.
If Write to File was selected, the Enter File Name dialog box opens.
Enter the name of the report in the text field. There is no set format but either the date or report type will
make future identification easier.
Click OK to write the report to the specified file. Reports are stored in the GMS\Customer\Report folder.

Chapter 3 - Using the Transaction Manager | 223


Configuring GMS - Administrator Guide

Creating User Action Reports


To create a user action report, proceed as follows:

1. In the Transaction Manager, click or select Reports > Create User Action Report. The Create User
Action Report dialog box opens.

2. In the Start User No and End User No fields, define the range of users.
3. In the Start Date and End Date fields, define the date range (in DD/MM/YYYY format).
4. In the Start Time and End Time fields, define the date range (in HH:MM:SS format).
5. In the Report Types list, select the type of report by indicating the user actions to include in the report. For
example, select Download Controller Parameters, and the report will contain only the user actions that
requested a parameter download. Conversely, select All Messages, and the report will contain all possible user
actions.
6. If you select User Defined as the report type, the Create User Action Report dialog box expands to allow a
combination of user actions. A number of additional action types (not listed in Report Types list) are available
for selection.

7. Select the user action types to include in the report.


8. After selecting the user actions to include in the report, you can choose to view, print, and/or write the report to
a file:
To preview the report after it is created, enable View.
To print the report after it is created, enable Print. The report will be sent directly to the default printer. A
confirmation will be displayed briefly.

224 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

To write the report to a file after it is created, select Write to File.


9. Click OK to create the report.
If Write to File was selected, the Enter File Name dialog box opens.
Enter the name of the report in the text field. There is no set format but either the date or report type will
make future identification easier.
Click OK to write the report to the specified file. Reports are stored in the GMS\Customer\Report folder.

Refer to Managing and Viewing Log Files 218 for window functionality.

Creating Site Event Reports


Note: There are two types of site event report, depending on the selected alarm management mode -
Legacy or Campus (see Configuring Alarm Event Management & Response Procedure Display Settings 49 ).

Legacy Mode Alarm Management


To create a site event report in Legacy alarm management mode, proceed as follows:

1. In the Transaction Manager, click or select Report > Create Site Event Report. The Create Site Event
Report dialog box opens.

2. In the Enter Site No field, enter the site number to generate the report from.
3. In the Event No field, enter the event number for the event type to report on. If you are unsure of the event
number allocated, click Search. The Find an Event dialog box opens.

To search for an event type and its identification number, enter the start and finish times for occurrences of
the event in the Event Time and To fields (in HH:MM:SS format).
In the Event Date and To fields, enter the start and finish dates for occurrence of the event (in DD/MM/
YYYY format).
Click Search.
GMS will search log files for the period specified (per event type and site). The status of the search will be
displayed in the Searching field. A message will be displayed to confirm a completed search.

Chapter 3 - Using the Transaction Manager | 225


Configuring GMS - Administrator Guide

The search results are displayed in the Available Events list.


Select the event to report on, then click Select. The dialog box closes.
4. In the Create Site Event Report dialog box, the selected event is displayed in the Event No field.
5. Click OK to create the report. The report is displayed in the Report Preview window.

Campus Mode Alarm Management


To create a site event report in Campus alarm management mode, proceed as follows:

1. In the Transaction Manager, click or select Report > Create Site Event Report. The Site Event Report
dialog box opens.

2. In the Sites field, enter the site number(s) to generate the report from. To enter a range of sites, enter the first
site number followed by hyphen ("-") then the last site number. To enter several individual sites, separate them
with commas (","). For example, "1,3,8,10-25".

Note: Leaving the field blank searches all sites.

3. In the Date and To fields, enter the start and finish search dates (in DD/MM/YYYY format).
4. In the Time and To fields, enter the start and finish search times for occurrence of the event (in HH:MM:SS
format). The search will find events that occur between the start and end search times for each day in the
search date range.
5. In the Message Category list, select a message type to find. Select <No Select> for any message type.
6. In the Message Group list (where applicable), select a message group type to find from the events found for
the selected message category.
7. Click Search. Results of the search appear in the table, showing event number, date and time, site name and ID
number, alarm description and location.
8. Click an event in the list to select it, then click:
Activity Report - Produces a report detailing operator actions carried out when handling the selected event
(s).

Note: To select a range of events, click the first, hold the SHIFT key, then click the last. To select
individual events, hold the CTRL key, then click each event to select it. Details for multiple events are
separated by a header in the report.

Event Report - Produces a report with summary information for all listed events.
The report is displayed in the Report Preview window.

226 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Managing Report Files


Different actions can be performed on reports saved in the system:
Viewing reports.
Printing reports.
Backing up and restoring reports.
Deleting reports.
Setting daily report parameters.

Viewing Reports
To view a report, proceed as follows:
1. In the Transaction Manager, select Report > View Report. The View Report File dialog box opens.
2. Select a report to view.
3. Click OK. The report is displayed in the Transaction Manager.

Refer to Managing and Viewing Log Files 218 for window functionality.

Printing Reports
To print a report, proceed as follows:
1. In the Transaction Manager, select Report > Print Report. The Print Report File dialog box opens.
2. Select a report to print.
3. Click Open. The Windows Print dialog box opens.
4. Click OK to print the selected report file.

Backing Up Report Files


To backup a report, proceed as follows:
1. In the Transaction Manager, select Report > Backup Report. The Backup Files dialog box opens.

2. Select the report files to backup.


3. Enter a destination in Enter Destination Dir, or click ... to open the Windows Browse for Folder dialog box,
where you can browse to the save location.
4. Click OK to backup the selected files to the specified directory and exit.

Chapter 3 - Using the Transaction Manager | 227


Configuring GMS - Administrator Guide

Restoring Reports from Backup Files


To restore a report from a backup file, proceed as follows:
1. In the Transaction Manager, select Report > Restore Report. The Restore Files dialog box opens.

2. Enter the location of the stored files in Enter Source Dir, or click ... to open the Windows Browse for Folder
dialog box, where you can browse to the store location.
3. In the Files list, select the report files to restore. To select a range of files, hold down the SHIFT key and click
the first and last files, or click each individual file.
4. Click OK to start the restore to the GMS\Customer\Report folder and exit.
If the file(s) to be restored already exist, a prompt is displayed. Click Yes for the backup file to replace the current
file.

Deleting Reports
To delete a report, proceed as follows:
1. In the Transaction Manager, select Report > Delete Report. The Delete Files dialog box opens.

2. Select the report files to delete in the Files list.

Note: Only report files stored in the GMS\Customer\Report folder can be deleted.

3. Click OK to delete the selected log files and exit.

228 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Creating User-Defined Reports


GMS offers an optional Custom Reports module that enables users to design and develop reports.

Creating a User-Defined Report


To create a user-defined report, proceed as follows:

1. In GMS, click , then select Create Site Report. The Site Report Options dialog box opens.

2. Enter the date, time and site details upon which the report will be based.
3. In the Report Types list, select User Defined.
4. Click Set. The User Defined dialog box opens.

5. Click . The User Defined Reports dialog box opens.

6. Click . The Create a New Report dialog box opens.

7. Enter a name in the Report Name field. Add a description for clarity. Click OK. The dialog box closes.

Chapter 3 - Using the Transaction Manager | 229


Configuring GMS - Administrator Guide

8. In the Report Template list, select Gmsrep.rpt. The report is generated and opens in a preview window.
You can use the Search/Seek button to look for specific strings that exist within the previewed report.

The report is automatically saved when it is previewed. Click to save it with a different name.

Configuring Report Filters & Search Criteria


A range of criteria can be added to the custom report to meet exact requirements. The report criteria can be
associated with the data in the following table:

Category Filter/ Attributes


Condition
External Alarms Alarm Group Alarm message group - Defaults are Burglar Alarm, Fire Alarm, Holdup
Alarm, Raid Alarm, Smoke Alarm and Vault Alarm, plus any custom
message groups that have been created.

Note: There is a limitation to the number of message groups


and user-defined reports, in that you cannot create user-
defined reports that reference any message group beyond the
first 255 in the list (you can view the list from the Transaction
Manager by selecting Options > Edit Message Files to open
the Edit System Files dialog box, then selecting External
Alarm Groups from the File Selection list and clicking OK).

Alarm Type Alarm during test mode, Collector active, Detector tamper, Device
tested, Dummy Alarm, Failed Self Test, Failed Test, Failed Alarm, False
Alarm, Fault point status report, Fire Alarm, Fire Fault Alarm, Guard
Tour, Isolated, Isolated point status report, Monitored fault point status,
Monitored isolated point status, Monitored latched point status,
Monitored point status report, Monitored soak point status, Night alarm,
Normal, Normal (fallback), Normal (shadow), Open Circuit, Override
seal, Point retrieve alarm, Point status report alarm, Short circuit, Shunt
alarm, Soak alarm, Soak point status report, Suspect device, Tamper,
Test mode alarm, test mode soak alarm, testing overdue, Timeout exit
test, Trouble
Location Enter the name of the point.
Point Number Enter the point number.
Point Type Alarm Button, Door contact, Holdup Button, Infrared Det(ector), Raid
Button
Priority Enter the priority of the point (0-255).
Internal Alarms Alarm Type A/C fail, Accessed, Ajar alarm, Batt test fail, Battery low, Bell fault,
Cable fault, Camera faulty, Cleaner key in, D/line bypass, Data error,
Deactivated, Device Trouble, Dialup connection fail, Duress alarm, Early
open, Emergency stopped, Failed to close, Failed to exit, Failed to open,
Failed to start, Film low, Film out, Fire alarm on, Floor accessed, Forced
alarm, Forced offline, Fuse fail, General access, General fail,
Independent service on, Invalid response received, LAN Disconnect,
Late cls vault, Late open vault, Late to close, Late to open, No battery,
Normal alarm, Not configured, Offline, On dial up, Reporting off,
Security fail, Supply 2 fail, Switched On, Tamper/unlock, Unlocked,
Upload/Download in progress, User lockout, Vibration detectors
isolated, Video signal lost, Warning
Priority Enter the priority of the point (0-255).
Card Access Card Status Card blocked, Card database full, Card database warning (90% full),
Card deleted, Card download status update, Card duress, Card enroll,
Card in/out error, Card invalid temporary schedule, Card not
programmed, Card Q transaction, Card reader interlock, Card
supervisor error, Card Type Blocked, Card usage expired, Egress button
activated, Expired card, Guard Tour transaction, Invalid day, Invalid
department, Invalid dual entry, Invalid issue level, Invalid mode, Invalid
Mode Change, Invalid Pin entered, Invalid reader, Invalid Security
Level, Invalid system no., Invalid time zone, No dual entry, No escort,
Pass back, PIN code error, T&A card entry, T&A card exit, Temporary
Access Level deleted, Valid card, Valid PIN entry
Priority Enter the priority of the point (0-255).
Status Change Priority Enter the priority of the point (0-255).

230 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Category Filter/ Attributes


Condition
Controller 2nd user auth granted for dual custody, 4 hour battery warning, Action
Status Qualifier, Ajar alarm cleared, Alarm buffer overflow, Alarm lost,
Authority denied, Authority modified, Autoset of devices failed, Auto-set
time reached, Auto-unset time reached, Cannot change mode - zone
undefined, Code check fail, Communications reset, Count changed,
Critical fault message lost, Data error, Database denied, DES encryption
error, Detectors in test, Device alarm, Device all points sealed, Device
tested, Device type invalid, Dial in connect, Dial out connect, Dial up
test failed, Dial up test passed, Dialler check in, Dialup No. not
programmed, DIP switch changed, Dual Port Ram Fault, Duplicate
address detected on network, Early heartbeat response, EEPROM error,
EEPROM sector erased, Enrolled OK, Erase requested, Excessive errors
on port, Exit bypass alarm, External EEPROM updated, Failed to
connect, Failed to set, False finger threshold modified, Film replaced,
Final set at night, Final set to %2 not received, First entry, Floor
changed, Floor chosen, Forced alarm cleared, Format Requested,
General status report, Global soak alarm, HUA alarm message lost, HUA
test warning, I/O modified, ID deleted, Improper shut down, checking
file system, Int Alarm isolated at mode change, Internal EEPROM
updated, Internal error, Invalid ID or PIN, Invalid time or date, Key
turned to Clear position, Key turned to Reset position, Key turned to
Test position, Keypad data sts, Keypad inactivity timeout, Lobby break
glass broken, Local setup modified, Low space, Manual output
performed, Master code updated, Memory DIMM card detected, No
heartbeat acknowledge, No heartbeat response, No master key, No
session key, Non-PA alarm during comms fail, Normal alarm cleared,
Opening procedure ambush, Operation aborted, PA alarm during comms
fail, Password reset, PIN length modified, PIRs armed, PIRs isolated,
Poll to line card, Port is looped back or being echoed, Program error,
Request schedule off, Request schedule on, Restart, Controller system
status, Schedule executed, Schedule resumed, Schedule suspended/
stopped, Second alert, Security modified, Service requested, Service
vibration detectors in test, Shut down, Software download: Finished,
Software download: Preparing, Software download: Started, Software
EEPROM checksum error, Software invalidated in other chip, Software
version error, Solenoid time modified, System not reset, Tamper alarm
cleared, Tamper message lost, Test mode timeout warning, Threshold
modified, Time and/or date changed, Timezone modified, Vault vibration
detectors in test, Video Event Captured, Warm restart, Warning-1,
Warning-2, Zone currently disabled, Zones currently isolated, Zones in
alarm at mode change

Chapter 3 - Using the Transaction Manager | 231


Configuring GMS - Administrator Guide

Category Filter/ Attributes


Condition
Mode Change Mode Status A/C fail, Access outside hours, Alarm lost, Area close by user, Area open
by user, Arming station menu mode, ATM mode, Auxiliary access mode
#1, Auxiliary access mode #2, Auxiliary ATM mode, Backup
communications started, Battery low, Camera film alarm, Can't change
mode - zone undef, Card access door alarms, Cleaner mode, Close
(night mode), Code check fail, Configuration changed, Courier mode,
Data line communications failed, DES encryption error, Detectors in
test, Device off line, Device off line isolate, Dial out to controller failed,
Dial up communications started, Duress close (night mode), Duress
mode, Duress open (day mode), EEPROM error, EEPROM updated,
Engineering lockout mode, Engineering mode, Exit bypass alarm,
Extended late working to all night, External ATM mode, External cleaner
mode, External point isolate, Film replaced, Final set at night, Final set
to night not received, Fire test mode, Forced zone window mode,
General fail, General log on, General status report, Guard mode,
Internal alarm isolated at mode change, Internal ATM mode, Internal
cleaner mode, Invalid ID or PIN, Invalid time/date, Invalid/inactive
controller connected, Late to close, Late to open, Late working in vault,
Late working on premises, Maintenance mode, Management mode,
Master code updated, No heartbeat ack/response, No master key, No
session key, Open (day mode), Opening procedure ambush, Other
alarm in comms fail, Out of hours access, Output alarm, Output isolate,
Partial system reset, Perim/B auto-set time reached, Perim/B auto-
unset time reached, Personal attack in comms fail, PIRs armed, PIRs
isolated, Program closing time mode, Program ID mode, Reminder
alarm, Remote alarm panel restart, Reset film frames, Restricted access
mode, Returned to day mode, Controller alarm buffer overflow,
Controller day test fail, Controller day test pass, Controller dial up test
fail, Controller dial up test pass, Controller night test fail, Controller
night test pass, Controller off line, Controller restart, Second alert,
Service vibration sensors in test, Sonalert mute, System not reset,
System reset / alarm cancel, Tamper, Tamper isolate, Test mode, Test
mode timeout warning, Vault vibration sensors in test, View log mode
Priority Enter the priority of the point (0-255).
Event Event No. Enter the event number based upon either data appearing either in an
alarm or from the transaction log.
Event Type These options come from the operator response when actioning an
alarm:
False, Procedure, Real, Test.
Operator No. The options displayed are the operator name and number.
Workstation No. Enter the workstation number (0-32).

Filter Conditions
Once a category is selected, select a query filter. Select one of the following conditions from the list.

Rule Description
equal to Displays only those results which match the entered criteria exactly.
not equal to Displays all the records that do not exactly match the entered criteria.
less than This filter can operate in two different ways depending on whether it applies to
numerical or alphabetical data. For numeric data, records are filtered such that they
are smaller than the entered criteria. For alphabetical data, records are filtered such
that letters preceding the entered criteria will appear in the report.
less than or equal Acts as a combination of the less than and equal to filter.
greater than This filter can operate in two different ways depending on whether it applies to
numerical or alphabetical data. For numeric data, records are filtered such that they
are larger than the entered criteria. For alphabetical data, records are filtered such
that letters following the entered criteria will appear in the report.
greater than or equal Acts as a combination of the greater than and equal to filter.
one of This filter allows a selection of multiple attributes. For example, the Card Access >
Card Status can be set to be one of several different status conditions, for
example, Invalid day and Invalid timezone. The report will display results that
contain any of these conditions.

232 | Chapter 3 - Using the Transaction Manager


Configuring GMS - Administrator Guide

Rule Description
not one of This filter allows the selection of multiple attributes. For example, the Card Access
> Card Status can be set to be NOT one of several different status conditions, for
example, Invalid day and Invalid timezone. The report will display results that do
not contain either of these conditions.

Designing User-Defined Reports with Complex Queries


You may be required to design a complex report using multiple AND/OR operands. These are supported by user-
defined reports.

Note: AND queries can only be performed on criteria in the same category. GMS will automatically put OR
queries together when the category-specific queries are added and saved to the report.

Using User-Defined Reports in Other Areas of GMS


In many cases, you may want to use customized reports in other areas of GMS. For example, if you have designed a
new Access Control report, you would probably want it to appear as a standard report in the Card Access Manager.
Proceed as follows:
1. In GMS, select Tools > System Files > Edit System Files. The Edit System Data Files dialog box opens.

2. Select the Report templates file, then click OK. The file opens in the GMS text editor.

3. Scroll down to the [CARD REPORTS] section. At the bottom of the list (that is, the first blank line), add a
logical description for the report and the custom report file name (previously created) using the following
convention.
Report Description=REPORTNAME.RPT

Note: Ensure that a blank line is left between your entry and the next item in the file.

4. Save the system file.


Open the Card Access Manager, then click the Reports tab. Under the Standard Reports tab, check that this new
report entry appears in the list. Preview the report again to verify that it operates correctly.

Chapter 3 - Using the Transaction Manager | 233


blank page
Configuring GMS - Administrator Guide

Chapter 4
Using GMS Sub-Servers

235
Configuring GMS - Administrator Guide

Sub-server operation is designed to break down the GMS system into smaller units. A typical Pacom system consists
of one or more GMS servers and its local workstation(s). When a sub-server is added, it provides local control for
handling alarms and events on a range of Controllers (sites), with main control remaining with the main server. A
sub-server can have up to 32 connected workstations to allow multiple local system administrators (or tenants) within
a single building, to have access and control over their specific parts of the main system.

Note: Non-sub-server components of the Pacom system are referred to as "main system".

For example, a sub-server may be introduced for local monitoring during office hours, while the main server is used
for monitoring the rest of the day and night, weekends and holidays. In the case of high priority events or timed-out
events, the main server can take over control for immediate action (depending on the setup). Access control audits
can be done from the local sub-server and also the main head office server.
The sub-server primarily receives messages from the connected CPU card/Controller, processes messages, creates
events and forwards messages to its workstation(s). Site maps and card details can also be altered on sub-servers.
The GMS main server and sub-server manage their own databases to carry out their functions, however, certain sub-
sets of database information is synchronized to maintain consistent in both.
A sub-server can:
Support up to 24 sites when connected peer-to-peer.
Support up to 10,000 sites when connected using a Base Station.
Configure up to 255 message priorities.
Have up to 255 operators.

236 | Chapter 4 - Using GMS Sub-Servers


Configuring GMS - Administrator Guide

Sub-Server Deployment
Operating System and Domain Participation
A sub-server can either be a standalone server or a server-workstation installation. For a standalone installation, one
of the following operating systems must be installed on the sub-server:
Windows XP.
Windows Server 2003.
Windows Vista Business/Ultimate/Enterprise.
Windows Server 2008.

Note: GMS supports 64-bit versions of Windows Vista and Windows Server operating systems and SQL
Server applications.

For server-workstation installations, the server must use a Windows Server operating system. Workstations can use
Windows XP or Vista. The sub-server must be a member server of an existing domain. It can be part of the main
server domain or another domain.

Database
If more than two workstations are connected to the sub-server, it is recommended to use SQL Server.

Sub-Server Connections and Protocol


A sub-server can be deployed to connect to:
One or more Controllers using RS232 EPCP or Ethernet using UDP/IP - for monitoring up to 24 sites (master/
slave peer-to-peer configuration).
A TransIT using RS232 EPCP or Ethernet using UDP/IP or TCP/IP - for monitoring up to 100 sites.
A Base Station using RS232 EPCP or PCP - for monitoring up to 10,000 sites.

Note: Normal sub-server deployment is to a master Controller with a number of slave Controllers
connected peer-to-peer.

Chapter 4 - Using GMS Sub-Servers | 237


Configuring GMS - Administrator Guide

The following image shows connections between the GMS main server and sub-server

The sub-server is connected to the Pacom hardware using RS232 or Ethernet. Optionally, the sub-server can connect
to the GMS main system using Ethernet. If this is the case, the sub-server must be part of the same domain as all
other GMS servers and workstations.

Note: When a sub-server utilizes an Ethernet link to communicate to GMS main system, it is referred to as
a "mapped sub-server".

The Ethernet link between the GMS main system and the sub-server is used to transfer information about the
Controllers connected to the sub-server, including alarm and card access information. A fast link ensures the
databases on both servers are synchronized.
If a sub-server is connected to the main system through a TransIT/Controller, limited GMS data can be transferred.
For instance:
Status of the sub-server including operator login information.
Transfer small database changes.
Event information.
Map changes (for points (not background images) are broadcast to all machines connected to the TransIT).

Note: For medium to large systems, it is recommended that Ethernet is used to connect the GMS main
system and sub-server.

GMS Prerequisites
The GMS version (including Service Pack version) installed on the main and sub-server must be identical.
Both the main system and the sub-server must be licensed for sub-server support and the number of sub-
servers supported must have a value greater than 0.

238 | Chapter 4 - Using GMS Sub-Servers


Configuring GMS - Administrator Guide

Sub-Server Event Handling


When an event occurs, both the sub-server and main server create an event. Before presenting events to operators,
both servers confirm the:
Priority - If the priority is within the sub-server range.
Site - If a sub-server is set up to handle the site event.
Time of Event - If the sub-server will handle the event during the time period.
Main servers only allow sub-servers to handle events after verification. On the main server Transaction Manager,
events being handled by sub-servers are shown in strike-through highlighted text for a new event and strike-through
text for successive alarms in the event. The sub-server Transaction Manager displays event messages in normal
highlighted text.

Once an event has been dispatched, the main server and sub-server start the event action time-out, which is the time
programmed for the event priority. If the event is not actioned by sub-server workstation operators in time, it is re-
activated in the main system for its workstation operators to action.
Events dispatched to sub-servers do not populate main system events list. If an event is not actioned and is re-
activated at the main server, however, it appears in the main systems event list.
The main server controls the event priorities and time-outs. It is recommended that this data is modified on the main
server and then copied to the sub-servers.
If however, at any time this data is modified on a sub-server, the main server will continue to work with its own
settings, which may be different from the updates made on the sub-server. That is, the main server and the sub-
server will continue to work but with different settings, until modifications are made and saved on the main server. At
this time the main server data will overwrite the settings on the sub-server to bring them back to same settings.

Chapter 4 - Using GMS Sub-Servers | 239


Configuring GMS - Administrator Guide

Database Synchronization
Sub-servers are responsible for taking information from, and updating data, to the main system. The mechanism is
referred to as "synchronization", and is carried out by each sub-server and a currently active GMS server.

Site Map Synchronization


If a site map is changed in a workstation connected to the sub-server, or on the sub-server itself, these changes are
reflected back to the current active GMS server. Likewise, if any modification is made on a site map either the main
server or the sub-server (for example, point data addition or changes), the whole site map is transferred.
The following indicates the concurrent updates on the site map and its data, and a few exceptions to these concurrent
updates.

Type of Data Data


Site map All.
Site data All, except information on the Panel tab.
Site contact All.
Points All, except new point types and new manufacturers. This data is maintained
locally on both the servers.

Site map changes can be transferred over an RS232 link.

Card Access Synchronization


All card access data is transferable between the main GMS server and the sub-server. This transfer can only take
place over a WAN link. The following depicts the GMS folder structure on a main GMS server.

When card data changes on the main GMS server, the changes are copied to all sub-folders (SS1, SS2, ...SS32) of
the sub-server MS-SS folder. Each sub-server in the system monitors its own folder (GMS\MS_SS\SS#) on the main
server and picks up the changes as they are made available by the main GMS server. Once it picks up the changes,
the changes are deleted from the sub-server folder (GMS\MS_SS\SS#) on the main GMS server. On receipt of these
changes, the sub-server updates its own database with the changes.
A sub-server polls the main server every five minutes to check for additional changes and retrieves this information,
where applicable.
If a sub-server is unavailable, the main server accumulates and stores the changes in the local sub-server folder.
When the sub-server becomes available, it checks for any changes on the main GMS server and updates
automatically.
If any card data is modified in the sub-server, it pushes the changes to its folder on the main GMS server (this time it
is the SS# folder under the GMS folder). For example, sub-server2 has a folder called SS2 under the GMS folder. This
folder receives changes made on the sub-server. The main server monitors this folder (GMS\SS2) for changes and,
when it finds them, updates its own database with the SS2 folder of the sub-server (where the modifications
originated). This ensures that changes made by a sub-server are replicated to other sub-servers and servers.

Note: Changes are detected almost simultaneously, given the required bandwidth. Once the changes are
detected and uploaded on the destination server (either main or sub-server), the modifications are
removed from the source server folder.

240 | Chapter 4 - Using GMS Sub-Servers


Configuring GMS - Administrator Guide

If the main server is unavailable, however, the sub-server maintains the changes that it needs to inform the main
server of in its own GMS\SS_MS folder. When the main server comes online, the sub-server pushes the data from
this folder to it.

Language File Synchronization


The following files, located in the Language folder on the active GMS server, are synchronized with sub-servers:
Department.str - contains department name.
Title.str - contains cardholder position/job title.
CardUserDefs.str - contains titles of user-defined fields in the Card Access Manager.
IPType.str - contains input type names, used in the Map Editor.
RTUTIME.str - contains description of standard timezones used in GMS.
All .msg files located in thr Language\Message folder.
When any of the above files is modified on an active server, the file is copied to the MS_SS\Language\ or
MS_SLanguage\Message folder. The folder is monitored by each "mapped" sub-server, and when a changed or new
file is detected, it is copied to the sub-server system. Sub-servers process the file and update their database.

Note: The files listed above are excluded from the Edit System Files dialog box on a mapped sub-server.
For example, the Input Types [Language\English\IPTYPE.STR] file and all \Language\Message\*.msg files.
The files remain in MS_SS\Language and MS_SS\Language\Message folders indefinitely.
On startup, a mapped sub-server checks files in MS_SS\Language folder on active server, and copies any
newer files into its own system.

On a mapped sub-server, or a workstation connected to a mapped sub-server, it is not possible to edit Department
or Title fields in the Card Access Manager.

On a mapped sub-server, or a workstation connected to a mapped sub-server, the Input Point Configuration dialog
box, Device Type field is not editable.

Chapter 4 - Using GMS Sub-Servers | 241


Configuring GMS - Administrator Guide

Note: Card Access Manager layout customization is still allowed on a sub-server. A sub-server user can
changes titles of user-defined fields as part of the customization, and it will update the content of local
CARDUSERDEF file. The local changes will remain for as long as the file does not get overwritten from the
active server by the new synchronization mechanism.

Other GMS Data Synchronization

Type of Data Data Transferred between Main and Sub-server


Visitor All.
Address book Maintained locally and not exchanged.
Staff verification code All.
Operator configuration Configured on the main GMS server for operators on both main and sub-server.

242 | Chapter 4 - Using GMS Sub-Servers


Configuring GMS - Administrator Guide

Port settings, Pelco 189


Index Ste map, configuring on 159
Customized text

-A- Configuring, Setup Wizard


Overview 16
16

Address Book
Contact, adding 70
Contact, deleting 70 -D-
Contact, editing 70 Database
Overview 70 Language, collation order settings 17
Searching 70 Dedicated Micros DVR
Administrator Settings, Controller port 189
Account, configuring 31 Device
Alarm Ste map, configuring on 159
Message priority, configuring 37 Dialog box
Overview 37, 39 Activation Duration for CCTV Camera 61
Priority display (Events Manager), configuring Backup Files 199, 218
39 Bitmap 208
Response procedure, associating with 54 Cardholder Group Configuration 21
Response procedure, setting behavior 53 Change Operator Password 116
Sound, assigning to 39 Configuration for Input 61
Alarm Management Mode Configure User Defined Shortcut 183
Campus, overview 49 Console Groups 42
Legacy, overview 49 Controller 189
Controller Port Parameters 189
-B- Create a New Report 229
Backing up Create Network Element Report 221
GMS, guidelines 18 Create New Holiday 75
Base Station Create New Map for 187
Synchronizing, with GMS 67 Create Site Event Report 221
Bing Create User Action Report 221
Installing 81 Custom Text - User Defined Words 16
Customize Card Access 100

-C- Customize Defaut Layout 114


Customize Events Manager Header 106
Camera
Customize Keyboard 106, 109
CCTV, linking to event 61
Customize menu 21, 109
Campus
Customized Card Access Template 105
Alarm Management Mode, overview 49
Dates for Remote Maintenance 85
Alarm management mode, site event report
Delete Files 199, 218
221
Device Configuration 189
Card Access Manager
DVR 61
Interface, customizing 100
Edit Authorization Password 77
Interface, saving custom to template 105
Edit Properties 100
CCTV Camera
Edit System Files 118
GMS, adding to 189
Edit Template Name 49
Ste map, configuring on 159
Enter Authorization Password 77
Codepage
Event Dispatch Scheme Configuration 42
Database, setting for language 17
Event Summary Options 39
Command shortcut
Export 221
Site map, creating 183
Export Options 221
Contact
Extended Macro Conditions 159
Site, importing to site map 173
Find an Event 221
Controller
Font 106
Date stamp, message enabling 82
General Purpose IP Parameters 189
Date stamp, overview 82
General Response Procedure Configuration
IP settings, Lanaccess OnSafe DVR 189
54, 58
Port settings, Dedicated Micros DVR 189
Global Contacts 68

Index | 243
Configuring GMS - Administrator Guide

Dialog box View Log File 218


Global Contacts Details 68 Workstation Groups Configuration 42
Grid Size 159 Dispatch scheme
Guard Tour Configuration 207 Alarm type 42
Holiday Configuration 75 Last done 42
Import Input Point Data from File 173 Overview 42
Import Output Point Data from File 173 Round robin 42
Input Point Configuration 61 Site group 42
Local Alarm Card 61 Site security level 42
Map Layer Selection 177 Site time zone 42
Messgae Handling Configuration 37 Workstation type 42
Multi-Site Guard Tour Configuration 89 Door
New Frame 100 Ste map, configuring on 159
New Standard Field 100 Dual-password access
New Static Text 100 GMS32.INI, configuring in 21
Open Multi-Site Map 187 Overview 21
Opening Map File 153 DVR
Operator Instruction Settings 49, 53 Audio-visual intercom (Bosch VIP-X),
Operator Setup 21 configuring 61
Operator-1 Logoff 72 GMS, adding to 189
Operator-1 Logon 72 Linking Controller events to 61
Options: System Parameter Configuration 9 Synchronizing, GMS with 189
Output Activation for Input 61 Transaction Manager, viewing footage from
Password Policy Settings 15 217
Photo/Signature File Names 70 DXF file
Port Protocol Parameters 189 Site map, importing to 173
Print Log File 218
Priority Configuration 39 -E-
PSP Timeout Parameters 120 Event
Rapid Access Button Configuration 21 Controller, linking to DVR 61
Reader Control 61 Dispatch scheme, alarm type 42
Reader Priorities 21 Dispatch scheme, configuring 42
Rename 100 Dispatch scheme, last done 42
Report Templates 229 Dispatch scheme, overview 42
Response Procedure Configuration 58 Dispatch scheme, round robin 42
Response Procedure Configuration for GMS Dispatch scheme, site group 42
Messages 58 Dispatch scheme, site security level 42
Response Procedure Configuration for Network Dispatch scheme, site time zone 42
Messages 58 Dispatch scheme, workstation type 42
Restore Files 199, 218 Message priority, configuring 37
Select Engine Mode 80 Overview 37
Server Configuration 78 Events Manager
Settings 100 Interface, customizing 106
Setup Message View Filters 215
Site Contacts for Site
Site Data for Site 203
203
-G-
General response procedure
Site Event Report 221
Creating 58
Site Report Options 221, 229
Deleting 58
Summary Appearance 109
GMS messages, for 58
Summary Screen Layout Editor 109
Modifying 58
System Tasks 65
Network messages, for 58
Task Configuration 65
Overview 58
Text 159
Geographic Maps
Text Fonts 159
Browser requirements 81
Transaction Log Appearance 113, 213
Installing 81
User Defined 229
Global Access Group (GAG)
User Defined Reports 229

244 | Index
Configuring GMS - Administrator Guide

Global Access Group (GAG)


Multiple access, enabling 122 -H-
Global contact Holiday
Deleting, speeding up 68 Yearly calendar, setting date 75
Members, adding 68 Yearly calendar, setting type 75
Members, deleting 68
Members, editing
Members, importing
68
68
-I-
Input point
Overview 68
Site map, configuring on 159
GMS
Site map, importing to 173
Administrator account, configuring 31
Intercom
Auto-filling telephone number fields 70
INI file, definition 92
Auto-logon, setting 72
INI file, editing 92
Backing up, guidelines 18
Overview, GMS administrators 91
CCTV camera, adding to 189
Reporst, configuring 96
Drive mapping (backup servers), changing
IP Camera
121
GMS, adding to 189
DVR, adding to 189
DVR, assigning CCTV camera to 189
Exiting 74 -K-
Log on/off 72 Keypad
Operator menus, configuring 21 Ste map, configuring on 159
Operator partitioning (site), configuring 21
Operator privileges, configuring 21 -L-
Operator, adding 21 Lanaccess OnSafe
Operator, configuring 21 Hardware, device map settings 189
Operator, deleting 21 Settings, IP 189
Operator, editing 21 Layer
Operator, privileges 32 Site map, drawing on 177
Password, changing 116 Using 177
Site account, displaying 119 Legacy
Site ID number, displaying 119 Alarm Management Mode, overview 49
Synchronizing, DVR with 189 Alarm management mode, site event report
Synchronizing, with Base Station/TransIT 67 221
System configuration, overview 8 Log file
System files, editing 118 Backing up 218
Timeout parameters, setting 120 Deleting 218
Web client operator, deleting 21 Managing 218
Workstation, adding 78 Printing 218
Workstation, deleting 78 Restoring from backup 218
Workstation, editing details of 78 Viewing previous 218
Workstation, management overview 78 Log on/off
Workstation, remotely controlling 78 Auto-logon, setting 72
Google Earth Overview 72
Installing 81 Windows authentication, using 72
Google Maps
Installing 81 -M-
Guard Tour Macro
Multi-site, creating 89 Extended conditions, using 159
Multi-site, deleting 89 Map 199
Multi-site, modifying 89 Map Editor 154, 189
Sequenced route, creating on site map 207 Drawing object, aligning 178
Site map, creating 207 Drawing object, duplicating 178
Unsequenced route, creating on site map Drawing object, editing 178
207 Drawing object, locating 178
Drawing object, moving 178
Drawing object, resizing 178

Index | 245
Configuring GMS - Administrator Guide

Map Editor 154, 189 Configuring, Setup Wizard 21


Drawing object, selecting 178 Deleting 21
Editing multiple drawing objects (bulk update) Editing 21
178 Log on/off, GMS 72
File, backing up 199 Menus, configuring 21
File, creating 199 Partitioning (site), configuring 21
File, opening 199 Password, changing 116
File, printing 199 Privileges, configuring 21
File, restoring from backup 199 Rapid reader access, configuring 21
File, saving 199 Web client, creating 21
Grid, displaying 159 Operator response procedure
Images, importing and placing 159 Alarm, associating with 54
Input point, configuring 159 Creating 54
Interface 154 Deleting 54
Layers, using 177 Modifying 54
Map file, backing up 199 Overview 54
Map file, creating 199 Output point
Map file, opening 199 Site map, configuring on 159
Map file, printing 199 Site map, importing to 173
Map file, restoring from backup 199
Map file, saving
Menu 154
199 -P-
Partitioning
Multi-site, creating 187
Operator, configuring (site) 21
Multi-site, viewing 187
Password
Opening/closing 153
Authorization, changing 77
Overview 152
Authorization, enabling 77
Point view, using 178
Changing 116
Shapes, drawing 159
Policy, setting 15
Shapes, filling 159
Strong, overview 15
Site Map pane 154
Pelco
Text, adding 159
Settings, Controller port 189
Toolbar 154
Printer
Toolbox 154
Selecting 117
MapPoint
Privileges
Installing 81
Operator, reference 32
Menu
Map Editor 154
Message
-R-
Rapid reader access
Alarm, configuring priority 37
Operator, configuring 21
Controller date stamp, enabling 82
Reader
Controller date stamp, overview 82
Ste map, configuring on 159
Event, configuring priority 37
Remote Maintenance
Group, creating 37
Installing 85
Priority, overview 37
Overview 85
Message file
Reports, configuring 85
Transaction Manager, editing 216
Scheduling 85
Transaction Manager, loading 216
Report
Multi-site guard tour
Network element (Transaction Manager) 221
Creating 89
Remote Maintenance, configuring 85
Deleting 89
Site event (Transaction Manager) 221
Modifying 89
User action (Transaction Manager) 221
User defined (Transaction Manager) 229
-O- Reports
Operator
Intercom, configuring 96
Adding 21
Response procedure
Auto-logon, setting 72
Alarm, setting behavior 53
Configuring 21

246 | Index
Configuring GMS - Administrator Guide

Response procedure
Creating 58 -T-
General, overview 58 Task
GMS messages, for 58 Overview 65
Interface, customizing 53 System, configuring 65
Modifying 58 Template
Network messages, for 58 Card Access Manager custom interface, creating
Operator, creating 54 105
Operator, deleting 54 Response procedure, editing name 53
Operator, modifying 54 Response Procedures, overview 49
Operator, overview 54 Response Procedures, renaming 49
Text-to-speech
-S- Configuring 80
Shortcut Overview 80
Command, site map 183 Timeout
Site 173 GMS, parameter setting 120
Account, displaying 119 Toolbar
ID number, displaying 119 Map Editor 154
Site map Toolbox
Alarm state icons, customizing 208 Map Editor 154
Alarm state icons, overview 208 Transaction Manager
CCTV camera, configuring on 159 DVR video footage, viewing 217
Command shortcut, creating 183 Guidelines to interpreting messages 213
Contact, adding 203 Hex display, applying 113
Contacts, importing to site map 173 Interface 213
Controller, configuring on 159 Interface, customizing 113
Details, adding 203 Log file, backing up 218
Device, configuring on 159 Log file, backup restoring 218
Door, configuring on 159 Log file, deleting 218
Images, importing 173 Log file, managing 218
Keypad, configuring on 159 Log file, printing 218
Linking 203 Log file, viewing previous 218
Outside hours, setting for 203 Message color, customizing 213
Reader, configuring on 159 Message file, editing 216
Site data, importing 173 Message file, loading 216
Site map, importing to 173 Message filter, configuring 215
URL, creating 183 Network element report 221
Site map view Opening 212
Default display options, setting 114 Overview 212
Interface, customizing 114 Reports, management 221
Sub-server Reports, overview 221
Overview 236 Site event report 221
Summary Manager 189 User action report 221
Interface, customizing 109 User defined reports 229
Summary screen, customize layout 109 TransIT
System files Synchronizing, with GMS 67
Editing 118
System parameters -U-
Access display preferences, configuring 9 URL
Configuring, Setup Wizard 9 Creating 183
Logon parameters, configuring 9 Overview 183
System task
Configuring 65 -V-
Overview 65 Video
Audio-visual intercom (Bosch VIP-X),
configuring 61

Index | 247
Configuring GMS - Administrator Guide

Video
Linking Controller events to 61
Transaction Manager, viewing footage from
217

-W-
Web client
Operator, configuring 21
Windows
Authentication, GMS users 72
Workstation
Adding 78
Deleting 78
Editing details of 78
Management, overview 78
Remotely controlling 78

-Y-
Yearly calendar
Holiday, setting date 75
Holiday, setting type 75

248 | Index

You might also like