9600-0497 Symmetry Software Reference Manual (Standard Edition), Issue 9.3.0v1
9600-0497 Symmetry Software Reference Manual (Standard Edition), Issue 9.3.0v1
Reference Manual
Standard (non-Homeland) Edition
9.3.0v1
1
9600-0497
© G4S Technology Limited 2020
All rights reserved. No part of this publication may be reproduced in any form without the written
permission of G4S Technology Limited.
9600-0497
2
Table of Contents
Introduction ............................................................................................................................................................1
Introduction to the Online Help ..............................................................................................................................1
Starting Symmetry ................................................................................................................................................1
Options Available from the Symmetry Button ........................................................................................................3
Customize Quick Access Toolbar Screen..............................................................................................................4
Home Menu.............................................................................................................................................................6
Alarms ("Home/Monitoring/Alarms") ......................................................................................................................6
Current Activity ("Home/Monitoring/Activity" or "Home/Video & Audio/Virtual Matrix") .......................................... 13
Graphics Screen ("Home/Monitoring/Graphics") .................................................................................................. 16
Command Center Screen (Graphical) ("Home/Monitoring/Command Center") ..................................................... 18
Command Center Screen (Non-Graphical) ("Home/Monitoring/Command Center") ............................................. 25
Change Threat Level ("Home/Monitoring/Change Threat Level") ......................................................................... 29
Change Company Screen ("Home/Monitoring/Change Company")...................................................................... 30
Controls Screen ("Home/Monitoring/Controls") .................................................................................................... 30
Tasks Screen ("Home/Monitoring/Tasks") ........................................................................................................... 34
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix") ............................................................................... 38
Video Playback Screen ("Home/Video & Audio/Video Playback") ........................................................................ 45
Intercom Screen ("Home/Video & Audio/Intercom") ............................................................................................. 48
CCTV Cameras Screen ("Home/Video & Audio/CCTV Cameras") ....................................................................... 53
Intercom Control Screen ("Home/Video & Audio/Intercom Control")..................................................................... 55
Video Status Screen ("Maintenance/Video/Video Status") ................................................................................... 57
Card Holders Screen ("Home/Identity/Card Holders") .......................................................................................... 58
Visitors Screen ("Home/Identity/Visitors") ............................................................................................................ 64
Identity Verification Screen ("Home/Identity/Verification") .................................................................................... 68
Locator Screen ("Home/Identity/Locator") ........................................................................................................... 71
Bulk Card Amendments Screen ("Home/Identity/Bulk Card Amendments") ......................................................... 72
Print Badges Screen ("Home/Identity/Print Badges") ........................................................................................... 75
Home and Full Screen ........................................................................................................................................ 77
Operation Menu .................................................................................................................................................... 78
Hours Definition Screen ("Operation/Times/Hours") ............................................................................................ 78
Time Codes Screen ("Operation/Times/Time Codes") ......................................................................................... 80
Holiday Screen ("Operation/Times/Holiday") ....................................................................................................... 83
Access Codes Screen ("Operation/Times/Access Codes") .................................................................................. 84
Scheduled Commands Screen ("Operation/Commands/Scheduled")................................................................... 87
Predefined Command Screen ("Operation/Commands/Predefined").................................................................... 92
Trigger Commands Screen ("Operation/Commands/Trigger") ............................................................................. 93
Alarm Instructions Screen ("Operation/Alarms/Instructions") ............................................................................... 97
Alarm Comments Screen ("Operation/Alarms/Comments") ................................................................................. 99
Alarm Commands Screen("Operation/Alarms/Commands") ................................................................................ 99
Alarm Routing ("Operation/Alarms/Routing") ..................................................................................................... 101
Alarm Definitions Screen ("Operation/Alarms/Definitions") ................................................................................. 103
Alarm Reporting ("Operation/Alarms/Reporting") ............................................................................................... 106
Custom Alarm Emails Screen ("Operation/Alarms/Custom Alarm Emails") ........................................................ 110
Data Import Screen ("Operation/Data/Data Import") .......................................................................................... 111
Data Export Screen ("Operation/Data/Data Export") .......................................................................................... 113
Archive Screen ("Operation/Data/Archive") ....................................................................................................... 114
Backup Screen ("Operation/Data/Backup") ....................................................................................................... 115
Directory Link Screen ("Operation/Data/Directory Link") .................................................................................... 116
Control Centers Screen ("Operation/Controls/Control Centers") ........................................................................ 117
Control Group Screen ("Operation/Controls/Control Groups")............................................................................ 118
Control Point Definition Screen ("Operation/Controls/Control Points")................................................................ 120
Reports Menu ..................................................................................................................................................... 122
History Activity Screen ("Reports/History/Activity") ............................................................................................ 122
i
Table of Contents
ii
Symmetry Software Reference Manual
iii
Table of Contents
Network Video Recorder (NVR) ("Install/Video & Audio/Digital Video") .............................................................. 324
Region Definition ("Install/Global/Region") ........................................................................................................ 325
Global Connection ("Install/Global/Global Connection") ..................................................................................... 326
Maintenance Menu ............................................................................................................................................. 328
Set Password Screen ("Maintenance/User & Preferences/Set Password") ........................................................ 328
User Roles Screen ("Maintenance/User & Preferences/Roles") ......................................................................... 328
User Accounts Screen ("Maintenance/User & Preferences/Accounts") .............................................................. 334
Command Roles Screen ("Maintenance/User & Preferences/Command Roles") ............................................... 338
System Preferences Screen ("Maintenance/User & Preferences/System Preferences") .................................... 339
Client Preferences Screen ("Maintenance/User & Preferences/Client Preferences") .......................................... 342
Home Screens Definition ("Maintenance/User & Preferences/Home Screens").................................................. 346
Download Cards Screen ("Maintenance/Download/Cards") ............................................................................... 346
Download a Node ("Maintenance/Download/Node") .......................................................................................... 347
Download a Chain ("Maintenance/Download/Chain") ........................................................................................ 348
Download a Video Server ("Maintenance/Download/Video Server") .................................................................. 348
Download Intrusion Users ("Maintenance/Download/Intrusion Users") ............................................................... 348
Node Priority Screen ("Maintenance/Download/Node Priority").......................................................................... 349
Door Timing Screen ("Maintenance/Access Control/Door Timing") .................................................................... 350
Upload Screen ("Maintenance/Access Control/Upload") .................................................................................... 351
Node Status ("Maintenance/Access Control/Node Status") ................................................................................ 351
Encode Cards Screen ("Maintenance/Access Control/Encode Cards") .............................................................. 352
Read a Card Screen ("Maintenance/Access Control/Read a Card") .................................................................. 353
Read a Smart Card Screen ("Maintenance/Access Control/Read a Smart Card") .............................................. 353
System Time Screen ("Maintenance/Time/System Time") ................................................................................. 354
Client Comms ("Maintenance/Communication/Client") ...................................................................................... 355
System Licenses ("Maintenance/Licensing/System Licenses") .......................................................................... 356
RDS/Citrix Client Licenses ("Maintenance/Licensing/RDS/Citrix Client Licenses") ............................................. 357
Maintenance Zones Screen ("Maintenance/Maintenance Zones/Maintenance Zones") ...................................... 358
Hyperlinked Main Topics ................................................................................................................................... 360
About Alarm and Output Controllers .................................................................................................................. 360
About Card Commands .................................................................................................................................... 361
About the Directory/LDAP Authentication Module.............................................................................................. 362
About Maintenance Zones ................................................................................................................................ 363
About the Service Monitor ................................................................................................................................. 364
About the Symmetry NVR ................................................................................................................................. 366
Acknowledge Alarm Screen ("Home/Monitoring/Alarms") .................................................................................. 368
Acknowledge Multiple Alarms Screen ("Home/Monitoring/Alarms") ................................................................... 370
Activity History Screen ("Home/Monitoring/Activity") .......................................................................................... 371
Add Comment Screen....................................................................................................................................... 373
Adding and Editing Card Details ....................................................................................................................... 373
Alarm/Event Messages ..................................................................................................................................... 375
Alarm/Event Messages A-D .............................................................................................................................. 375
Alarm/Event Messages E-M .............................................................................................................................. 377
Alarm/Event Messages N-Z .............................................................................................................................. 378
Alarm Processing Screen ("Maintenance/User & Preferences/Roles") ............................................................... 381
Appearance of the Alarms Screen ("Home/Monitoring/Alarms") ......................................................................... 381
Assign Access Rights Screen ........................................................................................................................... 383
Assign Card Relay Output Group Screen .......................................................................................................... 388
Assign Holiday Type Screen("Operation/Times/Holiday") .................................................................................. 388
Available Unassigned (Network Discovery of Digital Video Device) ................................................................... 389
Badge Design Rule Screen ("Setup/Identity/Badge Designer") .......................................................................... 389
Badge Preview Screen ..................................................................................................................................... 389
Blocked Cards Caused by PIN-Entry Errors ...................................................................................................... 390
Camera Tour Period ......................................................................................................................................... 391
Card Layout Screen .......................................................................................................................................... 392
Card Number .................................................................................................................................................... 393
iv
Symmetry Software Reference Manual
v
Table of Contents
vi
Introduction
Aim
The aim of this online help is to provide full information about every screen and option that is available.
Context-Sensitive Help
This online help is context sensitive. This means that when you select a Help button in one of the screens, you are
automatically taken to the description of that screen. There is no need to search around a manual to find the
information you need; it is found for you automatically.
User's Guides
What this online help doesn't tell you is the approach to security management or the general user interface; these
aspects are described in the Symmetry User's Guide. It is strongly recommended that you read the Symmetry
User's Guide before you attempt to use Symmetry.
Also available are Installation & User Guides that describe a particular feature or module of Symmetry. For
example, the following publications are available:
Threat Level Manager Installation and User Guide
Guard Patrol Manager Installation and User Guide
Intrusion Management Installation and User Guide
Intercom Management Installation and User Guide
RDS/Citrix Client Access Installation and User Guide
Data Connect Manual
M2150 Intrusion Guide
M2150 Design Guide
Disconnected Doors Installation and User Guide
Aperio Locks Configuration and User Guide
NIC Module Configuration Guide
Starting Symmetry
1
Starting Symmetry
Logging In
After you have started the software, the Logon dialog is displayed. If there are any uncleared alarms, the following
information is displayed:
New Alarms: The number of alarms that have not yet been acknowledged, excluding masked and
task alarms.
Total Alarms: The number of alarms not yet cleared, excluding masked and task alarms.
Highest Priority: The priority of the highest-priority new alarm (1 is the highest priority, 999 is the
lowest).
If there are alarms, you will see the following icon flashing blue/red light in the Windows System Tray (normally in
the bottom-right corner of the screen):
Dwelling the mouse pointer over either icon reveals the number of new alarms and the total number of alarms.
Note: RDS/Citrix Clients do not show the System Tray alarm icon or the alarm information in the Logon dialog.
Note: The Logon dialog is not displayed if you are using the Command Line Logon feature, which allows your
username and password to be specified in the Windows command line. This feature is enabled using
Command Line Logon in the "Maintenance/User & Preferences/System Preferences" screen.
Note: After you have logged in, you can change your password by using the Set Password option in
"Maintenance/User & Preferences" (if available, as determined by your privileges).
Note: If you are using the "Directory/LDAP Authentication Module", you can enter a domain username
and password.
2. You may be prompted to present your fingerprint or smart card if a secure logon is required, as set up in the
"Maintenance/User & Preferences/Accounts" screen.
3. The Symmetry main window is displayed, ready for you to open and use the required screens.
Software Licensing
Symmetry needs to have the correct licenses installed, as described in the Software Installation Manual. Each
license requires an activation code. If the license activation code has not been entered, users will still be able to log
in, but the system operates with restricted operation. Users are given read-only access to the entire system; they
will not be able to add or change information with the exception of the "Home/Monitoring/Alarms" screen where full
operation will be available.
2
Symmetry Software Reference Manual
This mode enables users to handle alarms and view the content of other screens, but prevents changes being
made in other screens.
Advanced information about the Service Monitor
3
Customize Quick Access Toolbar Screen
General
Introduction
This screen is displayed by selecting More Commands from the Quick Access Toolbar menu:
You can use the screen to set up your Quick Access Toolbar, which is displayed near the top-left corner of the
Symmetry window. Each user can set up their own toolbar after logging in.
The toolbar can contain icons for:
Any screen in the Symmetry software that your user role gives you access to. These are listed in
the Views tab on the left side of the screen.
Any predefined command that your user role allows you to send, as set up in the
"Operation/Commands/Predefined" screen. If you have access to predefined commands, these
are listed in the Commands tab on the left side of the screen.
External applications (such as spreadsheet or graphics application).
The right-hand side of the screen (Selected Commands) lists the icons that are currently included in your
toolbar, if any.
Adding items to your toolbar
You can add a screen or predefined command to your toolbar by selecting the item in the Available
Commands area and clicking >. You can add an external application using the Add button.
To remove an icon from your toolbar, select it in the Selected Commands area and click <. Clicking <<
removes all icons.
The order of the icons listed in the Selected Commands area determines their order in the toolbar. The icon at
the top of the list appears on the left in the toolbar. You can use Move Up and Move Down to change the order
of the icons.
Screen Options
>
Use this button to add a selected screen or predefined command to your toolbar.
<
Use this button to remove a selected icon from your toolbar.
<<
Use this button to remove all icons from your toolbar.
Move Up
Use this option to change the order of the icons in the toolbar. Moving an icon one place up in list will move it
one place to the left in the toolbar.
Move Down
Use this option to change the order of the icons in the toolbar. Moving an icon one place down in list will move it
one place to the right in the toolbar.
4
Symmetry Software Reference Manual
Add
You can use this option to add an icon to the toolbar that can be used to launch an external application (exe
file).
The option is available only if Allow external commands to be added to the Ribbon bar is selected in your
user role ("Maintenance/User & Preferences/Roles" screen).
A screen is displayed when you click Add. In the screen, enter a title, use the Browse button to select the exe
file, and select an icon. The screen contain the following fields and options:
Title
The name you enter in this field will be displayed when you hover the mouse pointer over the icon in the
toolbar. The default name (which is displayed when you select the exe file) is the description from the exe
file properties.
Path
This read-only field displays the path to the exe file you have selected using the Browse button.
Select Image From
Choose a icon library, or select Custom to choose a folder that contains icons. Any icons associated with
the selected exe file are displayed automatically.
Edit
This button is enabled if you select an icon that is used to launch an application (exe file) from the toolbar.
Clicking Edit allows you to edit the properties you defined using the Add button.
5
Home Menu
Alarms ("Home/Monitoring/Alarms")
General
Overview of Alarm Management
About Alarm Management
You can use the "Home/Monitoring/Alarms" screen to manage alarms routed to your computer, as set up
in the "Operation/Alarms/Routing" screen.
Alarm management is the process of viewing, acknowledging and clearing alarms that are received at this
computer. When new alarms occur, you need to make sure you understand what the alarm means and
take the appropriate action. This is the process of acknowledging the alarm.
The screen displays standard alarms and those associated with tasks set up in the
"Home/Monitoring/Tasks" screen. A task alarm can be acknowledged by starting the task that has
generated the alarm.
Once the cause has been understood and investigated, the alarm can be cleared to remove it from the
screen. Note, however, that all alarms are stored in the log, which can be reviewed using the
"Reports/History/Activity" screen.
Appearance of the Alarms Screen
You can change the appearance of the Alarms screen using the Show Combined
Alarm/Acknowledgement Screen option in the "Maintenance/User & Preferences/Client Preferences"
screen. Please click here for further information.
About the Alarms List
The alarms list displays:
What - The alarm message. If Show Card Number with Alarm/Event is selected in the
"Maintenance/User & Preferences/System Preferences" screen, the person's card number (if
known) is displayed in square brackets after the alarm/event message.
Where - The location of the alarm.
Who - Other details, such as the name of the person who caused the alarm, if known.
Chain - If the alarm has originated from a node located on a LAN, hardwired or dial-up
chain, this shows the name of the chain. This is displayed only if Show Chain Name with
Alarms has been selected in the "Maintenance/User & Preferences/Client Preferences"
screen. For intrusion systems, this displays the name of the intrusion system. The Chain
column is not displayed in the Masked Alarms tab.
Time and Date - The time and date the alarm occurred. Seconds are shown if Show
Seconds for Transactions is selected in the "Maintenance/User & Preferences/Client
Preferences" screen.
Priority - The priority of the alarm.
Masked Until - This is displayed only in the Masked Alarms tab. It shows the date and time
the alarm returns to the All Alarms tab.
You can click on a column heading to re-order the items in the list by that heading (click again to sort in
reverse order).
6
Symmetry Software Reference Manual
Alarm Order
Alarms are, by default, presented in the following order:
1. New alarms (default red).
2. Alarms that have been acknowledged, but not reset (default blue).
3. Alarms that have been acknowledged and reset (default green).
Alarms of the same category are ordered according to their priority (1 is the highest, 999 is the lowest).
You can change the alarm order by clicking a column header. You can re-apply the default alarm order by
right-clicking and selecting Default Sort Order.
Receiving New Alarms
When your PC receives an alarm, the following may occur:
Your PC may make a sound. A Silence button is provided at the bottom of the Symmetry
window to stop the sound. The sound reflects the sound associated with the latest alarm, as
defined in the "Operation/Alarms/Definitions" screen or in the "Maintenance/User &
Preferences/Client Preferences" screen.
If Enable Alarm Banner is selected in the "Maintenance/User & Preferences/Client
Preferences" screen, "Alarm!" is displayed with a red background in the Symmetry window.
7
Alarms ("Home/Monitoring/Alarms")
Your PC may print alarm/event messages on its default Windows printer. This is
enabled/disabled on a per-PC basis in the "Install/System/Clients" screen, and can be
overridden on a global basis from the "Maintenance/User & Preferences/System
Preferences" screen. The "Operation/Alarms/Reporting" screen determines which alarms
and events are printed.
You will see a flashing blue/red icon of an alarm light in the Windows System Tray (if you
can see the System Tray). The icon is replaced by an icon of a card when you have
acknowledged all alarms, then disappears when all alarms are cleared.
If Symmetry is minimized, it will be restored to its previous size automatically.
All new alarms are, by default, shown in red.
The following information is displayed in the Status Bar at the bottom of the Symmetry window:
New(red background)- Displays the number of new alarms; that is, the number of alarms
that you have not yet acknowledged. This does not include task alarms.
New(blue background)- Displays the number of unstarted task alarms.
Total - Displays the total number of alarms, excluding task alarms.
Priority - Displays the priority of the highest-priority new alarm (1 is the highest priority, 999
is the lowest).
If only the Login screen is displayed, this information is automatically added to the bottom of the Login
screen when a new alarm is received.
Note: The following can affect alarm counts and other indications of alarm conditions:
a) Restrict alarm counts to selected filters in the Alarms screen section of the "Maintenance/User &
Preferences/Roles" screen. For further information, please refer to the help for the Roles screen.
b) Alarm filter, which is accessed through the Role Filters button in the "Maintenance/User &
Preferences/Roles" screen. For further information, please refer to the help for the Roles screen.
8
Symmetry Software Reference Manual
If you are using the combined alarm/acknowledgement appearance, you can enter new comments and
review existing comments directly in the Alarms screen. In this case:
Click Select Standard Comment to add a predefined comment (as configured in the
"Operation/Alarms/Comments" screen) at the cursor position. You can use the button
several times to add more than one comment. Alternatively, type comments directly into the
Comments box.
It is mandatory to select or enter a comment before you can acknowledge or clear an alarm
if Alarm Comments Mandatory is selected in the "Maintenance/User & Preferences/Client
Preferences" screen.
The system makes available comments belonging to the company that owns the device that
is in alarm, or if the alarm is not related to a company, all comments belonging to all
companies.
You can use the right-click menu to cut, copy and paste text.
The Previous Comments panel displays any previous comments you may have entered for the alarm.
Each comment is preceded by the name of the user who entered the comment, and the date and time the
comment was added.
You may see the following comment:
Client: failed to acknowledge alarm within <X> minutes
Alarm Escalated to Client: <PC Name><Time and Date>
This indicates that the alarm was not acknowledged within a specified period of time, and therefore was
redirected to the named client PC (<PC Name>). This feature is set up in the "Operation/Alarms/Routing"
screen.
You can use the button to display the comments in a separate window. This window provides a Zoom
option. The window retains its size, location and zoom state when you close it, so that it appears the same
if you open it again.
Workflow Triggers
Opening, acknowledging or clearing an alarm can start a workflow, as set up in the
"Setup/Workflow/Workflow Designer" screen.
Alarm Icons
You may see the following icons in the left-hand column:
- This indicates that the alarm has a tagged video clip created using a Record Video command.
You can replay the clip by selecting Replay.
- This is displayed for card-related alarms and indicates that you can click the Image button to
display the card holder's image, if available. The card holder's image is retrieved from the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
- This is displayed if the device that is in alarm has associated cameras. You can right-click and
choose Associated Live Video or Associated Playback Video to view live or recorded video
associated with the device. For further information, please refer to refer to "About Camera Views and
Camera Device Associations".
Alarm Statistics and History
If the default appearance is used, the Alarms screen is able to display statistics about outstanding alarms,
including pie and bar charts. The statistics are displayed if both Enable Alarm Statistics is displayed in
the "Maintenance/User & Preferences/System Preferences" screen, and Display Alarm Statistics is
selected in the "Maintenance/User & Preferences/Client Preferences" screen.
You can change the viewing angle and size of each chart by clicking on the image and moving the mouse.
Note the following points:
9
Alarms ("Home/Monitoring/Alarms")
Alarms received since last reset shows the number of new alarms displayed in the Alarms
screen since Reset Alarm Statistics in the "Maintenance/User & Preferences/Client
Preferences" screen was last used.
Apart from Alarms received Today and Alarms received since last reset, the statistics
displayed reflect the alarms displayed in the currently selected alarm filter tab.
The pie chart includes all alarms displayed in the tab. Oldest Alarm Outstanding and
Newest Alarm Outstanding apply only to unacknowledged alarms.
About Alarm Filters
Filters can be set up using the "Setup/Configuration/Activity Filters" screen, which is also accessible by
clicking Filters in the "Home/Monitoring/Alarms" screen. Activity filters enable you to choose the types of
alarm to display. For further information, please refer to the help for the Activity Filters screen.
If an Alarm filter is selected using the Role Filters button in the "Maintenance/User & Preferences/Roles"
screen, an alarm can appear (for a user who has the role) only if it passes the filter rules. The message
"Warning role filters are applied" appears near the top of the Alarms screen if a role filter is active. For
further information, please refer to the help for the Roles screen.
Alarms Routed to this Computer
This computer can receive alarms from one or more companies. The "Operation/Alarms/Routing" screen
specifies the alarms that are routed to this computer. The alarms may be routed to different computers
depending, for example, on the time of day or day of the week.
If you are using the screen from an RDS/Citrix Client, the screen displays all alarms that belong to a
company in the your company group.
Alarms Imported from Third-Party Systems
Alarms can be automatically imported into the Symmetry database from third-party systems. These alarms
are automatically displayed in the "Home/Monitoring/Alarms" screen and can be listed in Activity reports
("Reports/History/Activity" screen) by selecting the Uncategorised checkbox in System Activity. For
further information, please refer to the Data Connect Manual.
Right-Click Menu
Options such as Print and Graphic are accessible from the right-click menu. You can use the right-click
Data option to choose the columns to display, and the Configure option to change the column order. The
Default Sort Order option applies the default sort order (see "Alarm Order" above).
Associated Live Video and Associated Playback Video are available if the alarm is from a device that
has associated cameras. You can use these options to display live or recorded video from the cameras.
For further information, please refer to "About Camera Views and Camera Device Associations".
Masked Alarms Tab
A Masked Alarms tab is displayed if the Show Masked Alarms privilege is set in your user role
("Maintenance/User & Preferences/Roles" screen). The tab allows you to view any alarms that have been
masked.
Please refer to Masking Alarms for further information.
What do the alarm messages mean ("WHAT" column)?
See Alarm/Event Messages for details of each message.
What does a RED alarm mean and what do I do?
If the alarm or the block on the left is displayed in RED, this indicates a new alarm. Acknowledge the alarm as
follows to indicate that you have seen and understood the alarm:
If you are using the default appearance for the Alarms screen, select the alarm and click OK, or
simply double-click the alarm. This displays the Acknowledge Alarm screen, which may contain
instructions on how to handle the alarm.
10
Symmetry Software Reference Manual
If you are using the combined alarm/acknowledgement appearance, simply select the alarm and
click Acknowledge. Instructions on how to handle the alarm may be displayed in the Alarm
Instruction box.
When Highlight Unacknowledged Alarms on Reset is selected in the "Maintenance/User &
Preferences/System Preferences" screen, the colored blocks for alarms that are unacknowledged but have
been reset are displayed half grayed-out:
Buttons
Icon (combined Name Meaning
appearance) (default
appearance)
N/A Mask This button is available if the Allow Alarm Masking privilege is set in your
user role ("Maintenance/User & Preferences/Roles" screen) and you are
viewing the All Alarms tab.
You can use the button to mask a selected alarm.
Please refer to Masking Alarms for further information.
N/A Clear Mask This button is available if the Show Masked Alarms privilege is set in your
user role ("Maintenance/User & Preferences/Roles" screen) and you are
viewing the Masked Alarms tab.
You can use the button to clear the mask from a selected alarm.
Please refer to Masking Alarms for further information.
Select Selecting this button displays a screen that allows you to choose the filters to
Filters use in the Alarms screen. Each filter selected creates a new tab that displays
only the alarms that pass the rules of the filter
You can choose activity filters and filters automatically created for active
maintenance zones.
Filters Selecting the button displays the Activity Filters screen, which you can use to
define activity filters for the Alarms, Activity and Virtual Matrix screens.
Print Prints the currently-selected alarms and their details to the Windows default
printer.
Graphic This button displays the highlighted alarm on a graphic. Normally, the graphic
is a plan of the building, and can be used to quickly identify the location of the
alarm.
Card This button is enabled if the selected alarm/event was caused by a person
whose card is known to the system. The button displays the following:
a) With Only Show Badge from Alarm selected in the "Maintenance/User &
Preferences/Accounts" screen - The card's badge preview is displayed.
11
Alarms ("Home/Monitoring/Alarms")
b) With Only Show Badge from Alarm not selected - The card details are
displayed.
Replay This button is enabled if the selected alarm/event has a tagged video clip
created using a Record Video command. Click the button to replay the clip.
Freeze The button text toggles between Freeze and Resume. If you choose Freeze,
Resume no new alarms are added to the Alarms screen, although the New count at
the bottom of the screen is still incremented. Choosing Resume causes the
screen to display new alarms, including any that were queued by Freeze.
Image This button is available if you have selected a card-related alarm. Clicking the
button displays the person's image, as selected in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.
N/A This button is enabled if a Call Request alarm has been generated from an
intercom connected to a Stentofon Alphacom Intercom System. You can use
Connect to make an audio link between your intercom and the intercom
making the call request.
When you select Connect, the button changes to Disconnect, which allows
you to disconnect the link. The link is automatically disconnected when you
close the Acknowledge Alarms screen.
The button is grayed out if the alarm is already being viewed in the
Acknowledge Alarm screen at another client.
For an overview of installing and using the Intercom Management software,
please refer to the Intercom Management Installation and User Guide.
N/A You can use this button to add a predefined comment, as set up in the
"Operation/Alarms/Comments" screen. You can use the button several times
to add more than one comment. Alternatively, type comments directly into the
box.
It is mandatory to select or enter a comment before you can acknowledge or
clear an alarm if Alarm Comments Mandatory is selected in the
"Maintenance/User & Preferences/Client Preferences" screen.
The system makes available comments belonging to the company that owns
the device that is in alarm, or if the alarm is not related to a company, all
comments belonging to all companies.
N/A Clicking the Command button causes the system to execute the command
associated with the selected alarm (as set up in the Alarm Commands
screen).
The command may, for example, cause the CCTV camera image at the alarm
location to be displayed on a CCTV monitor.
The Command button is grayed if the alarm has no command set up in the
Alarm Commands screen. The button is also grayed out if the alarm is a dial-
in alarm.
Clear N/A Clears the selected alarm (not available for task alarms). If you attempt to
clear an alarm that belongs to an alarm type categorized as "Acknowledge
Only" in the Alarm Processing screen, a message prompts you that you do
not have permission to clear the alarm.
If you select one alarm, clicking Clear will clear that alarm. If you click in white
space (so that no alarm is highlighted), right-clicking Clear allows all
displayed alarms to be cleared if you have permission to clear all alarms (as
specified in the "Maintenance/User & Preferences/Accounts" screen). After
selecting Clear from the right-click menu, enter a comment that indicates why
you are clearing the alarms. The message is stored in the log with the date
and time of execution.
To clear alarms that need a reset, the user's role requires Assign System
Admin Privileges to be set in the "Maintenance/User & Preferences/Roles"
screen.
If Auto Clear Alarm on Reset is selected in the "Maintenance/User &
12
Symmetry Software Reference Manual
General
Overview of this screen
This screen enables you to view system activity. That is, details of any alarms, events and system messages as
they occur, including access-control transactions. The last 1000 transactions are displayed.
13
Current Activity ("Home/Monitoring/Activity" or "Home/Video & Audio/Virtual Matrix")
The screen is available only at nominated client PCs, as set up by the installer using the
"Install/System/Clients" screen.
The screen displays:
What - The alarm message. If Show Card Number with Alarm/Event is selected in the
"Maintenance/User & Preferences/System Preferences" screen, the person's card number (if
known) is displayed in square brackets after the alarm/event message.
Where - The location of the alarm.
Who - The person who caused the alarm, if known.
Time and Date - The time and date the alarm occurred. Seconds are shown if Show Seconds for
Transactions is selected in the "Maintenance/User & Preferences/Client Preferences" screen.
You can click the above headings to change the order of the transactions displayed.
The default color for alarms is red. However, the color can be customized for alarms from selected devices.
This is set up in the "Operation/Alarms/Definitions" screen.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, the
screen displays only activity for the currently-selected company. If Filter by Company is not selected and
ActivityByCompanyGroup=1 in the ini file, the screen displays activity from all companies in your company
group. If Filter by Company is not selected and ActivityByCompanyGroup=0 in the ini file, the screen displays
activity from all companies in any company group.
Right-click menu
Options such as History and Freeze are accessible from the right-click menu. You can use the right-click Data
option to choose the columns to display, and the Configure option to change the column order.
A Show/Hide Inline Filtering option enables you to show or hide in-line filtering fields. When shown, a field
appears near the top of each column. Typing text into a field filters the report according to the text you enter.
You can clear the text by clicking the icon to the right of the field.
You can use Add Activity Comments to add comments to the alarm/event.
Associated Live Video and Associated Playback Video are available if the alarm\event is from a device that
has associated cameras. You can use these options to display live or recorded video from the cameras. For
further information, please refer to "About Camera Views and Camera Device Associations".
Alarm\event icons
You may see the following icon in the left-hand column:
- This is displayed if the alarm\event is from a device that has associated cameras. You can right-click
and choose Associated Live Video or Associated Playback Video to view live or recorded video
associated with the device. For further information, please refer to refer to "About Camera Views and
Camera Device Associations".
What do the alarm messages mean?
See Alarm/Event Messages for details of each message.
Adding comments to an alarm\event
Double-clicking an alarm\event message displays the Add Comment screen, which allows you to record
comments against the transaction.
14
Symmetry Software Reference Manual
By default, the screen displays up to 5 images. This can be increased using the No of Card Holder Activity
Images option in the "Maintenance/User & Preferences/System Preferences" screen.
Selecting an image automatically selects the associated card transaction and freezes the activity on the screen
(click Resume to unfreeze). Selecting a transaction displays the associated image at the top of the image list.
Activity type
You can choose to display only activity of a selected type. Selecting a filter clears the screen before displaying
new activity.
Filter
This lists all filters defined in the Activity Filters screen and for all active maintenance zones. Selecting a filter
causes the screen to display only alarms and events that pass the rules defined in the selected filter.
Your user role must include permissions to the "Maintenance/Maintenance Zones/Maintenance Zones" screen
for the menu to include any maintenance zones.
If you select None, the screen displays all activity except activity from nodes in an active maintenance zone.
You can view activity from a maintenance zone by selecting the appropriate maintenance zone filter in this
menu.
If an Activity filter is selected using the Role Filters button in the "Maintenance/User & Preferences/Roles"
screen, an alarm or event can appear (for a user who has the role) only if it passes the filter rules. The
message "Warning role filters are applied" appears near the top of the Activity screen if a role filter is active. For
further information, please refer to the help for the Roles screen.
Region
This is available only at the head office of a Symmetry Global Edition system. You can choose whether to
display all activity, or only activity from selected sources, such as from all regions or a selected region.
For further information about Global Edition, please refer to the Global Edition Installation and User Guide.
History
Displays the Activity History screen, which you can use to view, on a by-day basis, all alarms and events stored
in the log.
Card
This button is enabled if the selected alarm/event was caused by a person whose card is known to the system.
Click the button to display the card details in the "Home/Identity/Visitors" or "Home/Identity/Card Holders"
screen.
Freeze/Resume
Freeze prevents any further messages from being displayed in the screen. Clicking Resume displays any
messages that were waiting to be displayed, and any other messages as they arrive.
Clear
Clears the screen.
Filters
Selecting the button displays the Activity Filters screen, which you can use to define activity filters for the
Alarms, Activity and Virtual Matrix screens.
15
Graphics Screen ("Home/Monitoring/Graphics")
General
Overview of this screen
The Graphics screen provides a graphical method of controlling and monitoring Symmetry. The screen contains
a number of icons, each of which represents a particular device, group of devices or a feature of the system
you can change.
Using the Graphics screen, you can:
Acknowledge alarms
Acknowledging an alarm indicates that you have understood its meaning and have reacted to it.
Determine the current status of devices
You can, for example, determine whether a reader is currently in card-and-PIN mode, whether a door is
open or closed, or whether an auxiliary output device is currently on or off. Selecting an icon displays
the status of the device at the top of the screen. The color of the border around the icon also indicates
the status of the device. Refer to the help for the Command Center if you need information about the
meaning of the displayed status.
View live video
Right-click on a camera or camera group icon and select Live Video, or simply double-click.
For a digital video camera, you can drag and drop the camera icon into a cell of the "Home/ Video &
Audio/Virtual Matrix" screen.
Show live video from graphics in in the "Maintenance/User & Preferences/Client Preferences"
screen determines whether the live video is displayed in the Virtual Matrix or in its own window.
Control devices
By right-clicking the icon and choosing a command you can, for example, switch readers into different
modes, lock/unlock doors, connect to intercoms, switch CCTV cameras to monitors, control CCTV
ancillary devices, view live video images, control access to elevator floors and switch auxiliary output
devices.
A predefined command can be sent only by users who have one of the user roles selected in the
predefined command definition ("Operation/Commands/Predefined" screen).
Change the current threat level
To change the threat level, you right-click on the icon and select Change Threat Level. The icon
changes the threat level to the level selected in the "Setup/Graphics/Setup" screen.
If you dwell the pointer over a device icon, the name of the device is displayed next to the pointer.
You can zoom in and out of a graphic using the toolbar buttons.
A graphic can contain links to other graphics. To display a "sub-graphic", click on the link in the graphic
displayed, or use the Graphic Browser on the left side of the screen.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, the
graphic displays only those icons that are for devices belonging to the currently-selected company. If Filter by
Company is not selected, the graphic displays icons for devices belonging to any company in your company
group.
Note: The "Maintenance/User & Preferences/Roles" screen can be used to prevent commands from being sent
to specified device types, and the status of specified devices from being reported.
16
Symmetry Software Reference Manual
1. You can select an alarm in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen,
then the Graphic option. If the graphic is a plan of the building, this method can enable the operator to
locate the alarm very quickly.
If the alarm has not been acknowledged, either the highest-level or lowest-level graphic that contains the
device is displayed, depending on the setting of Display Lowest Graphic Level in the "Maintenance/User
& Preferences/Client Preferences" screen. If the highest-level graphic is displayed, the link to the sub-
graphic that contains the device flashes with a red border. If the alarm has already been acknowledged,
the graphic that contains the device is displayed.
2. You can use the Graphics option in the "Home/Monitoring" menu to display a graphic manually. You may
want to use this method to view or change the status of a device (for example, to unlock a door).
3. You can select Auto Show Graphic on any Alarm in the "Maintenance/User & Preferences/Client
Preferences" screen or Auto Show Graphic on Alarm in the "Operation/Alarms/Definitions" screen. When an
alarm occurs, the graphic that contains the device is automatically displayed in the Graphics screen, providing the
"Home/Monitoring/Alarms" screen is not open. If the "Home/Monitoring/Alarms" screen is open, the software
assumes that the user would prefer to continue to use this screen. If Auto Show Graphic on any Alarm is used,
the highest-level or lowest-level graphic that contains the device is displayed, depending on Display Lowest
Graphic Level in the "Maintenance/User & Preferences/Client Preferences" screen.
4. You can select Auto Display Graphic On Call Request in the "Maintenance/User & Preferences/Client
Preferences" screen. When an intercom call request occurs, either the highest-level or lowest-level graphic that
contains the intercom is displayed automatically in the Graphics screen (depending on Display Lowest Graphic
Level), providing the "Home/Video & Audio/Intercom Control" screen is not open.
About the icons
Click here for the meaning of each icon.
Icon borders
The color of the border of an icon indicates the status of the device. The following general color scheme is
used. Icons for intercom systems, intrusion zones, intrusion zone groups and intrusion areas use different
colors - click here for details.
Red (flashing or steady) - Device is in alarm and the alarm has not been acknowledged.
Half red (flashing or steady) - The device alarm has not been acknowledged, but the device has
been reset. This color is used only if Highlight Unacknowledged Alarms on Reset is selected in
the "Maintenance/User & Preferences/System Preferences" screen.
Blue (flashing or steady) - The device alarm has been acknowledged, but the device has not been
reset.
Green (flashing or steady) - The device alarm has been acknowledged and reset, but not cleared.
Green (when icon selected) - The device is in its normal state.
Yellow (when icon selected) - The device is disabled.
Gray or Mauve (when icon selected) - Icon selected.
If you have accessed the Graphics screen from the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen, or the graphic is displayed automatically on an alarm, the border of the icon flashes for devices
in an alarm state. If you have accessed the Graphics screen from "Home/Monitoring/Graphics", the borders of
devices already in alarm do not flash.
The name of the selected device and its status are displayed at the top of the screen.
Right-click commands
Depending on the device type, right-clicking an icon may display a list of commands that you can send to the
device.
Associated Live Video and Associated Playback Video are available if the device has associated cameras.
You can use these options to display live or recorded video from the cameras. For further information, please
refer to "About Camera Views and Camera Device Associations".
Click here for a description of other general commands.
17
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")
General
Overview of this screen
You can use this screen to:
18
Symmetry Software Reference Manual
Send manual commands to perform actions such as to unlock a selected door, make a video
recording or start a patrol tour.
To send a command, select the relevant item (for example, reader) in the tree view, choose the command
in the Available Commands area, then click Send.
Determine the current status of any item in the tree view. For example, you can determine whether a
reader is in card-only or card-and-PIN mode, or the current enabled/disabled status of a monitor
point.
To determine the status of an item, click "+" next to the item at the lowest level in the tree view. Note that
you can also view the status of devices by using the "Home/Monitoring/Graphics" screen.
The screen automatically displays any change in status of devices. However, in cases where devices are
located at different remote sites but use the same Symmetry dial-up modem, the status of only device can
be shown at a time. The same applies to devices that are located on different LAN chains but which
communicate with the same Symmetry network port.
"Timed out" is displayed if the Symmetry software cannot determine the status of a device (for example,
because a node is switched off).
Note: This screen is available by default (the non-graphical version is displayed if UseOldStatusScreen is set to
"1" in the ini file).
Note: The "Maintenance/User & Preferences/Roles" screen can be used to prevent commands from being sent
to specified device types, and the status of specified devices from being reported. The "Maintenance/User &
Preferences/Command Roles" screen specifies the commands available to each Symmetry user (through their
user role).
Screen Options
Display
You can use the Display menu to select the type of item to list in the left side of the screen.
Filter
You can use the Filter field to filter the items listed in the left side of the screen. For example, entering "Front"
and clicking the Find button to the right of the field causes only those items that contain "Front" to be listed.
Leave the field empty if you do not want to apply a filter.
Status
Selecting an option from the Status menu causes the tree view to display only those items with the selected
status.
Note: Devices such as readers, monitor points and outputs must have been previously opened in the tree for
them to be displayed by the filter.
19
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")
Devices
The Devices tree view contains a list of all the items that you can query the status of or send a command to.
The content of the tree view is dependent on the settings made for Display, Filter and Status.
Sending a command to a group (for example, reader group) sends the selected command to all devices in the
group.
Please refer to "Device Status" (below) for details of device status.
Available Commands
The box on the right-hand side of the screen displays the commands that you can send to the device(s) you
have selected in the tree view.
Click here for a description of each command.
Options
This area may display additional options, depending on the command selected in the Available Commands
area.
Send
Clicking Send sends the selected command to the selected device(s). The button flashes to indicate that the
command has been sent.
Right-Click Options
Expand
Displays the contents or status of the selected item(s) in the tree view (same as clicking "+").
Collapse
Hides the contents or status of the selected item(s) in the tree view (same as clicking "-").
Request Status
Use this right-click option on items in the tree view to obtain the status of devices. For example, you can use
the option to obtain the status of:
All devices belonging to a selected device type (for example, Readers).
All devices belonging to a selected group (for example, Reader Group 1).
A range of selected items in the tree.
Cancel Status
Use this right-click option to hide the status of selected devices (performs the reverse action to Request
Status).
Device Status
Auxiliary output status
Enabled
This indicates that the auxiliary output is functioning correctly.
Output On/Off
Output On - The auxiliary output is on.
Output Off - The auxiliary output is off.
Pulse Time
This shows the length of time the auxiliary output stays in the on state when a pulse command is sent to it.
The value is specified in the definition of the auxiliary output in the "Install/Access Control/Auxiliary Output"
screen.
20
Symmetry Software Reference Manual
21
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")
22
Symmetry Software Reference Manual
Output On
Output Off
Note: For a Siemens (Vanderbilt) panel, Symmetry cannot determine the status of an output unless the
change of status has been activated from Symmetry.
Monitor point status
Enabled/Disabled
Enabled - The monitor point operates normally.
Disabled - The monitor point is effectively ignored, with the exception of cable faults.
Normal State/Alarm State/Cable Fault/Tamper
Normal State - This indicates that the monitor point's cable or alarm is not in one of the above states.
When the above messages are alarms (rather than events), they cannot be cleared until the cable is
repaired, or the monitor point or tamper switchis reset.
Alarm State - Indicates that the monitor point has been triggered; for example, a window has been opened
without authority.
Cable Fault Open - The wires to the monitor point have been open-circuited. This status is generated only
for monitor points that have three-state, four-state or six-state supervision (as set up by the installer).
Cable Fault Short - The wires to the monitor point have been short-circuited. This status is generated only
for monitor points that have three-state, four-state or six-state supervision (as set up by the installer).
Tamper Alarm - Indicates that the monitor point tamper switch has been triggered.
Tamper and Point in Alarm - Indicates that the monitor point tamper switch has been triggered and that
the monitor point has been triggered.
Patrol tour status
Started/Held/Completed/Reset/Running
Started - The tour has been started, but the guard has not yet arrived at the first tour point.
Held - The tour has been temporarily halted by a Patrol Hold command. The patrol tour will resume
automatically when the guard clocks at the next tour point.
Completed - The tour has been completed.
Reset - The Patrol Reset command was used. This may mean that the patrol tour was abandoned or that
the "Home/Monitoring/Command Center" screen was used to acknowledge that the patrol tour was
completed.
Running - The patrol has started and the guard has been to at least one of the tour points.
Last Point Clocked
Last Point Clocked displays the name of the reader or monitor point at which the guard last clocked
during the patrol tour.
Reader Status
Note: Third-party devices may display information other than that shown below. If required, please refer to the
manufacturer's documentation.
Enabled/Disabled
Enabled - The reader is enabled and can operate normally.
Disabled - The reader is disabled. The reader will not be able to read cards or numbers entered on its
keypad (if fitted).
Card Only/Card+PIN/No Reader/Customer Code Only
Card Only - The reader is in card-only mode; that is, there is no need to enter a PIN.
23
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")
Card+PIN - The reader is in card-and-pin mode; that is, the person must enter a PIN after presenting the
card. Executive card holders, as set up in the "Home/Identity/Card Holders" screen, do not have to enter a
PIN. The reader is always in either the Card Only or Card+PIN states, even if the reader is disabled.
(However, the reader can only read cards and PINs when it is enabled.)
No Reader - Communications cannot be established with the reader (for example, it is not connected).
Customer Code Only - The reader will allow access to any card that has a customer code that is the
same as one of the customer codes stored in the reader's node. The transactions are stored in the log.
Click here for further information.
Note: A reader can be switched out of customer-code-only mode by issuing a Card Only or Card+PIN
command.
Customer Code Only - No Store is the same as Customer Code Only, except that each transaction is
not recorded in the log.
Keycard On/Off, with status of In/Out
Keycard On - The reader is operating in keycard mode, which enables a keycard holder or command to
switch the reader between keycard-in and keycard-out states (access rights permitting). A card holder
switches keycard states by presenting the card, followed by PIN with the first and last two digits swapped.
For example, this being 3412 for a PIN of 1234, or 78345612 for a PIN of 12345678. When a reader is in
keycard-out state, all cards except keycards are denied access, irrespective of access rights. When a card
reader is in keycard-in state, normal operation is resumed. Keycard mode can be useful if, for example, the
door is the point of entry for switching a burglar alarm off, and only a few people know how to switch the
alarm off. A card holder can be made a keycard holder by using the "Home/Identity/Card Holders" screen.
Keycard Off - The reader is not operating in keycard mode.
In/Out - The keycard status is either In (the reader is in keycard-in state) or Out (the reader is in keycard-
out state). The reader is always in either the In or Out status, even if keycard mode is off or if the reader is
disabled. (However, the reader can only operate as a keycard reader when keycard mode is on and the
reader is enabled.)
Card Command On/Off
Card Command On - The reader is able to issue card commands.
Card Command Off - The reader is unable to issue card commands.
About Card Commands
User Code On/Off, with status of Code Only/Code+PIN
User Code On - The reader is in user-code mode. In this mode, instead of presenting a card, a person can
gain access by pressing the # key, entering the card number, then pressing the * key.
User Code Off - The reader is not operating in user-code mode.
Code+PIN/Code Only - The user code status is either Code+PIN (people have to enter their PIN after the
card number) or Code Only (a reader does not need a PIN as well as a card number in user-code mode).
The reader is always in either the Code+PIN and Code Only state, even if user-code mode is off or the
reader is disabled. (However, the reader can only read cards and PINs when it is enabled.)
The Code+PIN and Code Only states are completely independent of the Card Only and Card+PIN states.
For example, a reader can be set for both Code Only and Card+PIN. In this case, when the person
presents the card, a PIN has to be entered, but if user-code mode is on, the person can enter the card
number without a PIN.
PC Door Control On/Off
PC Door ControlOn - In this mode, a guard must use the "Home/Identity/Verification" screen to grant or
deny access for each valid access-control transaction at the reader. Click here for further information.
PC Door Control Off - The reader is not in PC door control mode.
24
Symmetry Software Reference Manual
Door Monitor Open, Closed, Cable Fault Open or Cable Fault Short
Door Monitor - Open - The door controlled by the reader is physically open.
Door Monitor -Closed - The door controlled by the reader is physically closed.
Door Monitor -Cable FaultOpen - The wires that monitor the door's status have been open-circuited. This
state is generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Door Monitor -Cable FaultShort - The wires that monitor the door's status have been short-circuited. This
state is generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Door-Locked/Unlocked
Door - Locked - The door controlled by the reader is locked.
Door - Unlocked - The door controlled by the reader is unlocked.
Single Fingerprint, Two Fingerprints or Fingerprint Off
Single Fingerprint - The reader requires a single fingerprint during an access-control transaction, as set
up in the "Install/Access Control/Reader" screen, or by a command.
Two Fingerprints - Two different fingerprints are required.
Fingerprint Off - No fingerprints are required. In this mode, the reader can accept smart cards that do not
contain fingerprint data.
General
Overview of this screen
This screen is available only if UseOldStatusScreen is set to "1" in the ini file.
You can use this screen to view or print the current status of one or more devices, groups of devices or patrols.
For example, you can view whether a card reader is currently in card-only mode or in card-and-pin mode. You
can also send commands to the items that you are viewing; for example, to change a reader's mode of
operation, or to start, halt or reset a patrol tour.
The screen responds dynamically to any change in the status of a device. That is, the displayed status of a
device can change while you are viewing the information.
Note: You cannot use this screen for cameras, camera groups or intrusion systems.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is deselected (the
default), you can find out the current status of any item that belongs to a company in your company group. If
Filter by Company is selected, you can find out the current status of any item that belongs to the currently
selected company.
You cannot select two or more devices that are located at different remote sites but use the same dial-up
modem. Similarly, you cannot select two or more devices that are located on different LAN chains if they
communicate with the same network port.
25
Command Center Screen (Non-Graphical) ("Home/Monitoring/Command Center")
Note: You cannot use this screen for cameras or camera groups.
2. Click Find.
3. Highlight the devices you want to view.
Clicking All highlights all items listed. The All button is grayed out if the displayed list of devices includes
devices that are located at different remote sites but use the same dial-up modem.
Clicking Clear removes the highlighting from all items listed.
4. Click OK.
Click here for an overview of Selection screens and how to use them.
Device Status
Reader status
Mode/Status:
Enabled/Disabled
Enabled - The reader is enabled and can operate normally.
Disabled - The reader is disabled. The reader will not be able to read cards or numbers entered on
its keypad (if fitted).
with status of:Card Only/Card+PIN/No Reader/Storage/Customer Only
Card Only - The reader is in card-only mode; that is, there is no need to enter a PIN.
Card+PIN - The reader is in card-and-pin mode; that is, the person must enter a PIN after
presenting the card. Executive card holders, as set up in the "Home/Identity/Card Holders"
screen, do not have to enter a PIN. The reader is always in either the Card Only or Card+PIN
states, even if the reader is disabled. (However, the reader can only read cards and PINs
when it is enabled.)
No Reader - Communications cannot be established with the reader (for example, it is not
connected).
26
Symmetry Software Reference Manual
Storage - The reader will allow access to any card that has a customer code that is the same
as one of the customer codes stored in the reader's node. The transactions are stored in the
log. Click here for further information.
Note: A reader can be switched out of customer-code-only mode by issuing a Card Only or
Card+PIN command.
Customer Only is the same as Storage, except that each transaction is not recorded in the
log.
Keycard On/Off
Keycard On - The reader is operating in keycard mode, which enables a keycard holder or
command to switch the reader between keycard-in and keycard-out states (access rights permitting).
A card holder switches keycard states by presenting the card, followed by PIN with the first and last
two digits swapped. For example, this being 3412 for a PIN of 1234, or 78345612 for a PIN of
12345678. When a reader is in keycard-out state, all cards except keycards are denied access,
irrespective of access rights. When a card reader is in keycard-in state, normal operation is
resumed. Keycard mode can be useful if, for example, the door is the point of entry for switching a
burglar alarm off, and only a few people know how to switch the alarm off. A card holder can be
made a keycard holder by using the "Home/Identity/Card Holders" screen.
Keycard Off - The reader is not operating in keycard mode.
with status of:In/Out
In/Out - The keycard status is either In (the reader is in keycard-in state) or Out (the reader is
in keycard-out state). The reader is always in either the In or Out status, even if keycard mode
is off or if the reader is disabled. (However, the reader can only operate as a keycard reader
when keycard mode is on and the reader is enabled.)
Card Command On/Off
Card Command On - The reader is able to issue card commands.
Card Command Off - The reader is unable to issue card commands.
About Card Commands
User Code On/Off
User Code On - The reader is in user-code mode. In this mode, instead of presenting a card, a
person can gain access by pressing the # key, entering the card number, then pressing the * key.
User Code Off - The reader is not operating in user-code mode.
with status of:Code Only/Code+PIN
Code+PIN/Code Only - The user code status is either Code+PIN (people have to enter their
PIN after the card number) or Code Only (a reader does not need a PIN as well as a card
number in user-code mode).
The reader is always in either the Code+PIN and Code Only state, even if user-code mode is
off or the reader is disabled. (However, the reader can only read cards and PINs when it is
enabled.)
The Code+PIN and Code Only states are completely independent of the Card Only and
Card+PIN states. For example, a reader can be set for both Code Only and Card+PIN. In this
case, when the person presents the card, a PIN has to be entered, but if user-code mode is
on, the person can enter the card number without a PIN.
PC Door Control On/Off
PC Door ControlOn - In this mode, a guard must use the "Home/Identity/Verification" screen to
grant or deny access for each valid access-control transaction at the reader. Click here for further
information.
PC Door Control Off - The reader is not in PC door control mode.
27
Command Center Screen (Non-Graphical) ("Home/Monitoring/Command Center")
Timed Out
The Symmetry software cannot communicate with the device that the reader is connected to.
Single Fingerprint, Two Fingerprints or Fingerprint Off
Single Fingerprint - The reader requires a single fingerprint during an access-control transaction, as set
up in the "Install/Access Control/Reader" screen, or by a command.
Two Fingerprints - Two different fingerprints are required.
Fingerprint Off - No fingerprints are required. In this mode, the reader can accept smart cards that do not
contain fingerprint data.
Monitor:
Open, Closed, Cable Fault Open or Cable Fault Short
Open - The door controlled by the reader is physically open.
Closed - The door controlled by the reader is physically closed.
Cable FaultOpen - The wires that monitor the door's status have been open-circuited. This state is
generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Cable FaultShort - The wires that monitor the door's status have been short-circuited. This state is
generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Lock:
Locked/Unlocked
Locked - The door controlled by the reader is locked.
Unlocked - The door controlled by the reader is unlocked.
Monitor point status
Mode:
Enabled/Disabled
Enabled - The monitor point operates normally.
Disabled - The monitor point is effectively ignored, with the exception of cable faults.
Timed Out
The Symmetry software cannot communicate with the device that the monitor point is connected to.
State:
Normal State/Alarm State/Cable Fault/Tamper
Normal State - This indicates that the monitor point's cable or alarm is not in one of the above
states. When the above messages are alarms (rather than events), they cannot be cleared until the
cable is repaired, or the monitor point or tamper switchis reset.
Alarm State - Indicates that the monitor point has been triggered; for example, a window has been
opened without authority.
Cable Fault Open - The wires to the monitor point have been open-circuited. This status is
generated only for monitor points that have three-state, four-state or six-state supervision (as set up
by the installer).
Cable Fault Short - The wires to the monitor point have been short-circuited. This status is
generated only for monitor points that have three-state, four-state or six-state supervision (as set up
by the installer).
Tamper Alarm - Indicates that the monitor point tamper switch has been triggered.
Tamper and Point in Alarm - Indicates that the monitor point tamper switch has been triggered and
that the monitor point has been triggered.
28
Symmetry Software Reference Manual
29
Change Company Screen ("Home/Monitoring/Change Company")
If the selected threat level requires authentication (as set up in the "Setup/Configuration/Threat Levels" screen), a
"Confirm Threat Level Change" box is displayed. Two people who have the Authorize Change of Threat Level
user privilege ("Maintenance/User & Preferences/Accounts" screen) must enter their username and password
before the current threat level can be changed to be the selected level.
Warning - changing the threat level can significantly affect system operation:
Cards with a Deactivate at Level value that is less than or equal to the selected level are made
inactive. Deactivate at Level is set in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
Cards with a Deactivate at Level value that is greater than the selected level are made active, if
previously made inactive due to the current threat level.
Scheduled and trigger commands may be deactivated/activated.
Any commands associated with the threat level (in the "Setup/Configuration/Threat Levels" screen)
are executed.
Note: Changing the threat level can cause a lot of information to be downloaded to the access-control nodes
(which control readers and other security management equipment). The download can take a large amount of
time to complete.
You can also change threat level using a Change Threat Level trigger command.
For an overview of threat level management, please refer to the Threat Level Manager Installation and User Guide.
Note: If your company group is changed to contain more than one company, you need to log out, then in to
obtain the Change Company option.
General
Overview of this screen
The "Home/Monitoring/Controls" screen is available only with the Commend Controls license and only at a
client PC that is connected to a CCTV switcher unit.
The screen enables you to control equipment at "control points" around the site. A control point is either a
defined access point to the site (such as a vehicular or public entrance), or a location where equipment such as
lights need to be switched on or off.
In a typical application, you would use the screen to answer an incoming intercom call from a person at an
access point, verify the person's identity using an intercom link and CCTV camera, then open/close a barrier
and/or operate a traffic light, as appropriate.
You can use the screen to manage several calls at the same time, to review any barriers that are currently open
and to operate any equipment at any control point.
When you first display the "Home/Monitoring/Controls" screen, it displays:
A pull-down menu, which by default shows All Control Centers. If you are using a multi-user
Commend Controls systems, the menu displays all control centers defined in the
30
Symmetry Software Reference Manual
"Operation/Controls/Control Centers" screen. The control center you choose determines the
control groups that are made available to you.
Note: You can access only those control centers belonging to companies in your company group. The
Filter by Company setting in the "Maintenance/User & Preferences/Client Preferences" screen is
ignored.
Select Call, Select Open and Select Any near the top-left corner of the screen, which provide three
different modes of using the screen. The content of the box below these options depends on the
mode used.
Up to four panels along the bottom of the screen, one per control point, and each belonging to the
same control group. Each panel contains buttons to control the equipment at the control point, and
each panel may show different buttons, depending on the equipment installed at the control point.
An area on the right-hand side of the screen, which displays an image from a selected CCTV
camera. The image always relates to the control point in the panel at the bottom-left corner of the
screen.
You can expand the camera image to cover more of the screen area by double-clicking on the image or
pressing the F5 key on your keyboard. If you do this, only the panel in the bottom-left corner of the screen
will be visible (the one that always relates to the image displayed on the screen). Double-clicking or
pressing F5 again returns the screen to its normal view, with up to four panels displayed along the bottom
of the screen.
All actions you take, for example to open/close barriers, are logged in the user activity log, which can be viewed
by using the "Reports/History/Activity" or "Reports/History/Predefined Reports/Activity" screen.
If you minimize the "Home/Monitoring/Controls" screen, the screen is maximized automatically when a new call
is received, irrespective of the currently-selected mode.
Using the screen in Select Call mode
Purpose of the Select Call Option
The Select Call option in the "Home/Monitoring/Controls" screen enables a guard to respond to incoming
intercom messages.
When a caller generates a call request at a remote intercom belonging to the selected control center (or to
any control center if All Control Centers is selected), the name of the control point that the intercom
belongs to (such as "South Entrance Gate") is added to the Call Requests box and a sound is made.
Each control point may give a different sound. At busy periods of the day, the Call Requests box may
display the names of several control points, each for a different intercom. The control points are ordered in
the Call Requests box by call priority, as set up in the "Operation/Controls/Control Points" screen.
The option enables you to control the equipment at a selected control point or at any other control point
belonging to the same control group.
Responding to a Call
To respond to a call, double-click on the appropriate name in the Call Requests box, or single-click and
choose Select. The following occurs:
1. Buttons to operate, for example, the barrier or intercom at the control point are displayed in a panel
in the bottom-left corner of the screen.
2. The sound associated with the call is cancelled. Note that the sound made corresponds to the call
at the top of the Call Requests box. Therefore, after responding to a call, a sound may continue.
3. If the intercom has been set up in Duplex mode, ("Install/Video & Audio/CCTV/Control Intercom"
screen), the audio link between your master intercom and the intercom at the control point is
automatically opened. This is indicated by the control point's microphone button being in the
"pressed" (highlighted green) position. You can now talk with the caller. Alternatively, if the
intercom has been set up in Simplex mode, you need to press the microphone button to speak with
the caller.
31
Controls Screen ("Home/Monitoring/Controls")
4. If the control point has a camera, the image from the camera is displayed in the
"Home/Monitoring/Controls" screen. If the camera has pan and tilt controls, the camera
automatically moves to its preset 1 position, as set up by the installer.
5. Up to three other control-point panels may be displayed along the bottom of the screen. These
belong to the same group of control points as the one you selected. The name of each control point
is displayed at the top of each panel. You can use the buttons in these panels to control, for
example, the barriers or cameras at these other control points.
Up to two of these control points may each have an associated camera. If the control point in the second
panel from the left has a camera, its image is displayed on CCTV monitor 2. Likewise, if the control point in
the third panel from the left has a camera, its image is displayed on CCTV monitor 3.
Clearing a Call
Once you have answered the caller, then used the relevant buttons to open/close the barriers/gates, you
can select Clear to remove the selected call from the Call Requests box.
Using the screen in Select Open mode
Purpose of the Select Open Option
Selecting Select Open lists all control points at which the controlled device (normally a gate or barrier) is
open. Only control points in the selected control center are included.
The option enables you to control the equipment at a selected open control point or at any other control
point belonging to the same group of control points as the one you selected.
Selecting a Control Point
When you double-click on a control point listed in the Control Points box (or single-click and choose
Select), the following occurs:
1. Buttons to operate, for example, the barrier or intercom at each of the control points in the same
group as the selected control point are displayed in panels along the bottom of the screen.
2. If the control point in the bottom-left corner of the screen has a camera, its image is displayed in the
"Home/Monitoring/Controls" screen. If the camera has pan and tilt controls, the camera
automatically moves to its preset 1 position, as set up by the installer.
If the control point in the second panel from the left has a camera, its image is displayed on CCTV monitor
2. Likewise, if the control point in the third panel from the left has a camera, its image is displayed on
CCTV monitor 3.
Refreshing the List
Selecting Clear refreshes the list of open control points.
Using the screen in Select Any mode
Purpose of the Select Any Option
Selecting Select Any lists all control groups, in the selected control center (if All Control Centers is
displayed, all control groups are listed, as set up in the "Operation/Controls/Control Groups" screen).
The option enables you to control the equipment at any control point in the selected group.
An asterisk (*) to the left of a control group name indicates that an access point within this group has a call
request. If necessary, use Select Call mode to respond to the call.
Selecting a Control Group
When you double-click on a group listed in the Control Groups box (or single-click and choose Select),
the following occurs:
1. Buttons to operate, for example, the barrier or intercom at each of the control points in the group
are displayed in panels along the bottom of the screen.
32
Symmetry Software Reference Manual
2. If the control point in the bottom-left corner of the screen has a camera, its image is displayed in the
"Home/Monitoring/Controls" screen. If the camera has pan and tilt controls, the camera
automatically moves to its preset 1 position, as set up by the installer.
If the control point in the second panel from the left has a camera, its image is displayed on CCTV monitor
2. Likewise, if the control point in the third panel from the left has a camera, its image is displayed on
CCTV monitor 3.
Order of Listed Control Groups
The control groups are ordered in the Control Groups box by call priority, as set up in the
"Operation/Controls/Control Points" screen. The group containing the access point with the highest call
priority is listed first. Groups that have the same priority are listed in alphabetical order. Any groups that
have an access point with call request (that is, those listed in Select Call mode) are highlighted with an
asterisk (*) and are displayed at the top of the list.
Order of Control Points
The control points shown in the boxes along the bottom the screen are, by default, shown in the order as
defined in the control group. However, if an access point has a call request, this is shown in the box in the
bottom-left corner. If there is more than one access point with a call request, the access points are ordered
by priority.
General Options
Comment
Choose this button if you want to select or enter a comment (for example, "Visitor for Mr Smith allowed access
to parking lot 2"). The comment will be stored in the History User log, with the date and time, and can be viewed
later by using the "Reports/History/User Audit" screen.
You can select any comment belonging to any company in your company group. You do not have to have a
control point or control group selected.
The comment is logged against the company currently selected for the Admin options.
Select
You can access the controls for a control point by clicking on the name of the control point or group, then
choosing Select or pressing the F12 key on your keyboard.
Clear
If you are in Select Call mode, this option removes the selected call from the list.
In all modes, Clear also resets the panels along the bottom of the screen. If a default control group has been
selected ("Operation/Controls/Control Groups" screen), the panels will show the control points for the default
group. As normal, the CCTV image for the control point in the bottom-left corner of the screen will be shown in
the "Home/Monitoring/Controls" screen, the CCTV image for the second panel will be displayed on monitor 2,
and the CCTV image for the third panel on monitor 3. If there is no default control group, the panels and
monitors will be blank.
Clear also closes any open intercom link.
You can choose Clear either by selecting the Clear button or by pressing the Esc key on your keyboard.
Control-Point Buttons
Open, Close and STOP (button text may vary)
(Button text may vary.) These buttons are typically configured to open/close/stop a barrier at the control point,
but the buttons may have been named and set up for some other purpose (such as to switch a light on/off or
grant access at a reader).
The STOP button is typically configured to override the Open/Close button press to stop a barrier while it is in
motion. A second press of the STOP button cancels the "stop".
33
Tasks Screen ("Home/Monitoring/Tasks")
The Close button can be set up to be selected automatically by setting up an auto close time: right-click in any
non-button area of the control-point panel, and enter the close date/time in the dialog displayed.
Status indicators may be displayed above the buttons. A green indicator is lit above the Open button when the
barrier or other device it controls is opened/switched. A red indicator is lit above the Closed button when the
barrier or other device it controls is closed/switched. If sensors are fitted to the device, the indicators may show
the actual status of the device; alternatively, the indicators may simply show whether you last selected the
Open/Closed button (this is set up in the "Operation/Controls/Control Points" screen). If the device has an in-
motion sensor, a yellow indicator is lit while the device is moving. If no in-motion sensor is fitted, the yellow
indicator is lit only if you have selected the STOP button.
Microphone button
If you press and hold the left mouse button on a microphone button, an audio link is established between your
intercom and the intercom at the corresponding control point while you keep the button pressed. Right-click on
the button if you want the audio link to remain open when you release the mouse button. Selecting a
microphone button that is already selected switches off the intercom link.
Right-clicking on a microphone button also causes the CCTV image from the camera at that control point to be
displayed on the "Home/Monitoring/Controls" screen, with the buttons displayed to control pan, tilt, zoom and
focus, and to move the camera to preset positions. The control point's panel moves to the bottom-left corner of
the screen (if it was not already there). The image that was displayed on the screen is switched to (the now
available) monitor 2 or 3.
Traffic light button
This is normally configured to operate a traffic light. Selecting the button when the green traffic light icon is
displayed will cause the icon and lights to change to red, and vice versa.
Camera button
Selecting this button enables you to control the camera at the control point. Depending on camera model,
buttons to control pan, tilt, zoom, focus are displayed, and buttons to move the camera to preset positions.
If not already done, the camera image at the control point is automatically displayed on the screen. The image
that was displayed on the screen is switched to (the now available) monitor 2 or 3.
Note: When you select a Camera button, the control point's panel moves to the bottom-left corner of the screen
(if it's not already in that position).
Selecting the green-highlighted Camera button again (which is always in the panel at the bottom-left corner of
the screen) returns to displaying the Select Call, Select Open or Select Any list.
On and Off buttons (button text may vary)
Selecting these buttons causes a device to switch on/off. If the device is currently on, a yellow indicator is lit
above the On button, and vice versa.
General
Overview of this screen
This screen allows you to list, view, process and create tasks, depending on your user privileges.
A task defines an action that must be completed by a specified user, or by any user that has a specified user
role. Each task has a due date and time; if the task is not completed on time, its status automatically changes to
"overdue".
34
Symmetry Software Reference Manual
35
Tasks Screen ("Home/Monitoring/Tasks")
36
Symmetry Software Reference Manual
For example, entering M* allows all tasks that have a subject starting with "M" to be listed.
You can use the Print button in the Selection screen to create a report of the tasks listed in the Selection
screen.
Note: The settings in the Selection screen persist when you close the screen. When you re-open the screen,
the same settings are automatically selected.
37
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")
Comments
Use this tab to view or specify any comments about the task as it progresses. Previous comments are
listed on the right-hand side of the tab, with the date and name of the user who added the comment.
Recurrence
This tab defines the recurrence period for the task.
When a task is completed, a new instance of the task is created automatically. The due date and time of
the new instance are set according to the defined recurrence period, the date of completion and the due
date and time of the previous instance.
Example 1:
1. A task is due on 12th October at 12:00.
2. The task is completed any time on 12th October (early or late).
3. The recurrence period is daily (Daily and Every weekday selected).
4. New instance of task is set with a due date of 13th October at 12:00.
Example 2:
1. A task is due on 12th October at 12:00.
2. The task is completed on 16th October at 10:00 (late).
3. The recurrence period is daily (Daily and Every weekday selected).
4. New instance of task is set with a due date of 17th October at 12:00. The task was not carried out
on the 13th, 14th and 15th, and no additional task is scheduled for 16th October at 12:00.
If No Recurrence is selected, the task does not recur.
The Range of recurrence options specify the number of occurrences of the task, or the period over which
it must be carried out.
Attachments
This tab lists any files attached to the task, such as pictures or diagrams.
You can use Add File to add an attachment, Open File to open a selected attachment, and Delete File to
delete a selected attachment.
Copy/Delete/Started/Complete/Save/Close
You can click Started or Completed to indicate that you have started or completed the task. Once clicked,
Started changes to Not Started, which allows you to reverse the status.
Completing a task removes it from the "Home/Monitoring/Alarms" screen and generates a new task, depending
on the settings in the Recurrence tab.
The other buttons are common to many Definition screens. Click here for details of these options.
General
Purpose of the Virtual Matrix Screen
The Virtual Matrix screen is available if a Symmetry camera license is installed. It enables you to view live
pictures simultaneously from up to 36 digital video cameras or Web pages. You can have up to two Virtual
Matrix screens open at the same time on the same PC.
Each image is displayed in a "cell" located on the right-hand side of the screen. You can change the number of
cells and their positions using the Change Layout option.
38
Symmetry Software Reference Manual
Options in the screen enable you to record video, replay recorded video, start camera sequencing, view alarms
and view current activity.
About Cells
The cells on the right-hand side of the screen display live images from cameras and Web pages.
To display live video or a Web page in a cell, find the camera, camera group or Web page in the Cameras and
Multimedia tree view located on the left side of the screen, then drag and drop it into a cell. Alternatively, select
the cell, right-click on the camera, camera group or Web page and select Add to View.
If you add a camera group to a cell, a camera tour is started for all cameras in the group (you can start and stop
the tour from the Options panel).
You can also drag and drop images from one cell to another.
Double-clicking
Double-clicking a cell performs one of the following actions, depending on the setting of Expand Cell on
Double Click in the "Maintenance/User & Preferences/Client Preferences" screen:
If Expand Cell on Double Click is not selected, double-clicking swaps the image with the
image in the lowest-numbered cell that is physically larger than the one selected (for
example, cell 1). This feature can be used to switch the image in a small cell to larger "spot
monitor".
If Expand Cell on Double Click is selected, double-clicking changes the layout to a single
cell and displays the image in that cell. Double-clicking again reverts to the previous layout.
This is the same as the right-click Expand Cell option.
Cell Title Bars
By default, each cell has a title bar containing the cell number and the name of the camera or URL of the Web
page. You can hide or display the title bar by right-clicking in the cell and selecting/deselecting Captions. You
can hide or display the cell number by right-clicking in the cell and selecting/deselecting Cell Numbers.
The following icons are located in the top-left corner of each cell:
Record Video. Click to record video from the camera (same as selecting Record Video from the right-
click menu).
Mute/Unmute. Click to mute/unmute audio from the camera. The audio icon is available only if the
camera supports audio and audio is enabled in the camera definition screen.
Analog pan/tilt/zoom enabled. Click to swap to digital pan/tilt/zoom mode. While in analog
pan/tilt/zoom mode:
To zoom in or out, use the mouse wheel.
To pan, click the central icon, hold the mouse pointer down and move the mouse - the
pointer projecting from the center of the picture shows the direction of pan and speed
(stretch the pointer to increase speed).
Digital pan/tilt/zoom enabled. If analog pan/tilt/zoom is available, click the icon to swap to analog
pan/tilt/zoom mode. If analog pan/tilt/zoom is not available, click the icon to disable digital pan/tilt/zoom
(removes the central icon).
While in digital pan/tilt/zoom mode:
To zoom in or out, use the mouse wheel. The central icon shows the center of the
zoom. Note: zooming in/out does not change the zoom level at the camera; it zooms
in/out of the picture provided from the camera.
To pan, click the central icon, hold the mouse pointer down and move the mouse - the
elongated pointer projecting from the center of the picture shows the direction of pan
and speed (stretch the pointer to increase speed).
Digital Zoom Active. This indicates that the image shown in the video cell is currently digitally
zoomed. If analog pan/tilt/zoom is available, click the icon to swap to analog pan/tilt/zoom mode. If
analog pan/tilt/zoom is not available, click the icon to disable digital pan/tilt/zoom (removes the central
icon).
39
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")
Digital pan/tilt/zoom disabled (default). Click to swap to digital pan/tilt/zoom enabled. You may wish
to disable digital pan/tilt/zoom to remove the icon from the center of the cell.
Select preset. Click to select one of the camera's preset positions to view. For 360-degree cameras,
the available presets may be dependent on the Camera View, which you can select from the cell's
right-click menu.
About Views
Once you have decided which cameras, camera groups and/or Web pages to view, and have moved each into
a cell, you can save the configuration as a "view" using the Save button in the Matrix panel. The next time you
open the Virtual Matrix screen, you can select the view from the pull-down menu, which automatically displays
the Web pages and camera images in that view.
Recording and Replaying Video
Right-clicking on a video image and selecting Record Video (or clicking the button in the top-left corner of the
title bar) enables you to record the video images being displayed. This produces a user recording.
You can replay video by right-clicking on a video image and selecting Instant Replay.
About the Panels
The screen contains the following panels along the left side of the screen:
Matrix - Contains options mainly for selecting, creating and deleting views.
Controls - If the currently selected view is from a camera, you can use this to zoom in/out, focus,
pan and tilt and activate presets. Only those controls that the camera supports are available, as
set up in the camera definition screen.
Options - Provides various options that affect the appearance and operation of the screen.
Cameras and Multimedia - Displays all the cameras, camera groups and Web pages you can
display, and allows you to add new links to Web pages.
Displaying and Hiding Panels
The title bar of each panel contains an button, which can be in one of the following two states:
On the right-hand side of the panel area, you will see a button that can be in one of the following two states:
Click this to hide the entire left side of the screen.
Click this to re-display the left side of the screen.
Matrix Panel
View pull-down menu
You can use this menu to:
Display any view you have previously saved.
Select (New View) to configure a new view, which you can save using the Save button.
Refresh
Refreshes the content of the cells currently being viewed. You may want to use this option if, for example, a
Web page displayed in a cell is not being displayed correctly.
Save
Enables you to save the current view.
40
Symmetry Software Reference Manual
Delete
Deletes the current view.
Playback
Displays the "Home/Video & Audio/Video Playback" screen (if you have permissions to use this screen).
Change Layout
Change Layout enables you to choose the number of cells to display, and their positions.
The colored borders are relevant only if you are using 360-degree cameras such as Oncam Grandeye or
CompleteView cameras. If you drop a 360-degree camera into a cell, the other empty cells of the same color
will, by default, display views from the same camera to form the full 360 degrees. For example a layout of one
panoramic call and two standard aspect cells of the same color will display a 180-degree panoramic view, and
two views covering the remaining 180 degrees.
For the auto-population of 360-degree camera views to work, please ensure that:
No other cells of the same color already contain a camera image, unless you drag and drop the 360-
degree camera into the only populated cell of the same color.
The camera supports all of the view types associated with cells in the layout group.
Controls Panel
About this panel
The graphic in the Controls panel enables you to change a selected camera's pan, tilt, zoom, focus or preset
positions, and start/stop tours, depending on whether the camera supports these operations. Clicking the
relevant part of the graphic changes the camera position, etc.
The camera definition screen (in "Install/Video & Audio/Digital Video") specifies the controls that are available
for each camera. The graphic provides only those controls that the camera supports.
If required, pan, tilt and zoom can be controlled by a supported joystick.
For 360-degree cameras, the available presets may be dependent on the Camera View, which you can select
from the cell's right-click menu.
Variable pan and tilt
The graphic allows variable control of pan, tilt and zoom for cameras that support this feature. To use this
feature, press and hold the mouse button when the pointer is in the center of the graphic or on a pan/tilt control.
The camera will then follow the direction the mouse pointer is moved. Moving the pointer nearer or further away
from the center changes the speed of the pan/tilt action. The graphic appears as follows:
You can zoom in or out by pressing the CTRL keyboard button and moving the mouse wheel.
Start/Stop/Show All Preset Tours
The three buttons near the bottom-right corner of the graphic are for cameras that have preset tours set up (as
configured via the "Install/Video & Audio/Digital Video" screen).
Start Preset Tour - This starts the preset tour marked as the default in the camera definition screen.
Stop Preset Tour - This stops the currently-running preset tour.
41
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")
Show All Preset Tours - This shows all preset tours set up for the camera in the camera definition screen. You
can select a tour to start.
Note: "Camera Group" tours are different and can be started from the Options panel.
Options Panel
Start Sequence / Stop Sequence
This is used to start and stop the sequencing of pictures to the largest cell(s) in the matrix.
Selecting Start Sequence causes the system to display each image in turn in the largest cell in the matrix. For
example, if cell 1 is the largest cell, each image will be displayed in cell 1 for a specified length of time. You are
prompted for the time period when you select Start Sequence. You can start a sequence only if there is at
least one cell that is larger than the others.
If two or more cells of equal size are larger than the others, the system will switch multiple images at the same
time. For example, if cells 1 and 2 are of equal size and are larger than the others, the system will switch cells 3
and 4 into 1 and 2, then 5 and 6, etc.
Note: The largest cell(s) should be empty before you select Start Sequence. If they are not empty, the images
in these cells will not be included in the sequence. Start Sequence is not available for views that contain wide-
screen cells.
The current sequence status (stopped or started) and the sequence time period are saved when you save the
view.
Show Alarms / Hide Alarms
Selecting Show Alarms displays any alarm information routed to this computer, as set up in the
"Operation/Alarms/Routing" screen. Selecting Hide Alarms removes the information from the screen.
You can double-click an alarm to open the Acknowledge Alarms screen.
Right-clicking an alarm displays options that are similar to those available in the "Home/Monitoring/Alarms"
screen.
Note: You require permissions to use the "Home/Monitoring/Alarms" screen to display alarms.
Note: You require permissions to use the "Home/Monitoring/Activity" screen to display activity.
42
Symmetry Software Reference Manual
If you stop a camera tour, you can right-click the cell and choose options to display the previous camera,
display the next camera or change the length of time that each camera image is displayed (Camera Tour
Time).
Note: "Preset Tours" are different and can be started and stopped from the Controls panel.
Note: If the camera group includes DVR cameras, all DVR cameras in the group stream video at all times. For
example, if the group contains eight DVR cameras, all eight cameras are continuously streaming video. This
will have an impact on the CPU load and may affect system and network performance. You can use the CPU
indicator at the bottom of the Symmetry window to monitor the effect that a camera tour is having on CPU
usage.
43
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")
44
Symmetry Software Reference Manual
General
About the Video Playback Screen
The Video Playback screen enables you to replay recordings stored by devices such as the Symmetry Network
Video Recorder (NVR) and other third-party Digital Video Recorders (DVRs). Up to four recordings can be
replayed simultaneously.
The screen is available only if a Symmetry camera license is installed.
If the recording was made by an IP camera, the system obtains the recording from a Symmetry NVR repository
(storage folder).
If the recording was made by a Digital Video Recorder (DVR), the recording is obtained from the hard disk of
the DVR.
About Cells
Each image is displayed in a "cell" located on the right-hand side of the screen. You can swap between
displaying one and four cells by right-clicking on a cell and selecting/deselecting Expand Cell.
Cell Title Bars
By default, each cell has a title bar containing the cell number and the name of the camera. You can hide or
display the title bar by right-clicking in the cell and selecting/deselecting Captions. You can hide or display the
cell number by right-clicking in the cell and selecting/deselecting Cell Numbers.
The following icons are located in the top-left corner of each cell:
Mute/Unmute. Click to mute/unmute audio from the camera. The audio icon is available only if the
camera supports audio and audio is enabled in the camera definition screen.
Digital pan/tilt/zoom enabled. Click the icon to disable digital pan/tilt/zoom (removes the central icon).
While in digital pan/tilt/zoom mode:
To zoom in or out, use the mouse wheel. The central icon shows the center of the
zoom. Note: zooming in/out does not change the zoom level at the camera; it zooms
in/out of the picture provided from the camera.
To pan, click the central icon, hold the mouse pointer down and move the mouse - the
elongated pointer projecting from the center of the picture shows the direction of pan
and speed (stretch the pointer to increase speed).
Digital Zoom Active. This indicates that the image shown in the video cell is currently digitally
zoomed. Click the icon to disable digital pan/tilt/zoom (removes the central icon).
Digital pan/tilt/zoom disabled (default). Click to swap to digital pan/tilt/zoom enabled. You may wish
to disable digital pan/tilt/zoom to remove the icon from the center of the cell.
Select preset. This option is available for Onvif Oncam Grandeye 360 cameras (not for CompleteView
360 or other cameras). Click to select one of the camera's preset positions to view. The available
45
Video Playback Screen ("Home/Video & Audio/Video Playback")
presets can be dependent on the Camera View, which you can select from the cell's right-click menu.
46
Symmetry Software Reference Manual
Screen Options
Using the tree view
The tree view lists the cameras you can choose for video playback.
The tree view has an All Cameras section. This contains a Cameras section listing each camera individually,
and a Camera Groups section listing the cameras in each defined camera group ("Setup/Device
Groups/Cameras" screen). There is also a My Folders section, which contains the folders and cameras
selected in the Virtual Matrix.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, the tree
view lists only those cameras and groups belonging to the currently-selected company. If Filter by Company is
not selected, the tree view lists cameras and groups belonging to any company in your company group.
Include
Use this menu to choose the types of recordings to list in the Results area:
All Video - Lists all types of recordings.
Video by Alarm - Lists only tagged recordings associated with an alarm; that is, generated by a
Record Video trigger command, triggered by an alarm message.
Video by Alarm & Event - Lists tagged recordings created using a Record Video trigger command,
triggered by an alarm or event message. For example, video tagged by events actioned by a
Symmetry NVR are listed when you choose this option.
Video by Bookmark - Lists only bookmarked recordings.
Video by User Recording - Lists user recordings.
Time Zone
This option is displayed if cameras are in different time zones. Select the time zone in which you are located.
The system will return all video clips relative to the time zone in which you are located. For example, if you
select GMT +01:00, and time range of 19:00-21:00, devices located in the GMT time zone will return video clips
from 18:00-20:00.
Date and Time (From, To, For)
Use the From and To fields to specify the date and time range of the recordings to find.
When you click the Find button, the Results panel lists recordings that include any part of the time period
specified by the From and To fields.
The For field indicates the number of minutes between the From date and time, and the To date and time.
Changing the value in this field changes the From date and or time.
Search menu
Three search options are available:
Search All - Returns all video that matches the other criteria.
Search Symmetry NVR - Returns all video that matches the other criteria and is stored in a
Symmetry NVR.
Search Encoder/DVR - Returns all video that matches the other criteria and is stored on a device
that has its own storage (such as a DVR).
The currently-selected option is displayed in bold. The default option is specified in the "Maintenance/User &
Preferences/Client Preferences" screen.
Playback buttons
47
Intercom Screen ("Home/Video & Audio/Intercom")
Cell Numbers
Hides or displays the cell number in the title bar of each cell.
The cell number is used, for example, to determine the cell used when you double-click a recording listed in the
Results panel. In this case, the lowest-numbered unoccupied cell is used to replay the recording.
Lock Aspect Ratio
Determines whether or not to maintain the aspect ratio of the camera image in each cell.
Changing this option from unchecked (unticked) to checked (ticked) causes the camera image to be
immediately resized to the correct aspect ratio.
When the option is checked, the aspect ratio of the image is maintained if you resize or change the layout of the
screen.
Camera View
This option is available for 360-degree cameras that support dewarping, such as CompleteView cameras. Use
the menu to select the dewarped camera view to display.
For Onvif Oncam Grandeye cameras, the camera view can affect the available presets, since each view can
have different presets (as configured in the camera definition screen in Symmetry).
Expand Cell
Toggles the screen between displaying just one cell or four cells.
When four cells are displayed, right-clicking and selecting Expand Cell causes the selected cell to expand.
Double-clicking a cell has the same effect.
Remove
Removes the camera image from the cell. Clicking the Close button in the top-right corner of the cell's title bar
has the same effect.
General
Purpose of the Intercom Screen
The "Home/Video & Audio/Intercom" screen is used to manage intercom calls from a Zenitel Pulse intercom
system. If you are using a Stentofon Alphacom intercom system, use the "Home/Video & Audio/Intercom
Control" screen instead.
You can use the "Home/Video & Audio/Intercom" screen to:
Answer calls from intercoms. A call is made when a call request button is pressed at an intercom,
typically by visitors or other personnel who require access to the building. When a call is received,
you can choose to answer the call using the intercom located at your PC. After speaking with the
caller, you can press a Command button to perform an action such as opening a door or barrier.
Open a line between the intercom located at your PC and any other intercom. You can do this even
if no call request has been received.
View video from cameras associated with the intercoms.
The screen can be used only if the installer has used the "Install/Video & Audio/Intercom/Clients" screen to set
up your PC as an Intercom client.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Note: You can manage only those intercoms that belong to the currently selected company.
48
Symmetry Software Reference Manual
Note: All calls from an intercom are routed to a specific Symmetry intercom client. It is not possible to use
different Symmetry intercom clients to manage calls from the same intercom.
2. To answer the call, click the icon shown above, or right-click the call in the Call Log and select Connect.
The icon changes to:
If cameras are associated with the intercom, live video from each camera is displayed in a separate cell on
the right-hand side of the screen.
3. You can now speak with the person at the intercom.
4. If the intercom has been associated with a command (in the "Install/Video & Audio/Intercom/Stations"
screen), the Command icon is enabled at the bottom of the intercom panel, which can have one of two
appearances:
Icon Meaning/Purpose
Click to issue a predefined command to operate an auxiliary output device (such as a light
or other barrier).
The icons change to their default state, and the Call Log is updated.
Calling Other Intercoms
You can open a line to any intercom simply by clicking the button associated with the intercom you want to
connect to, even if no call request has been received.
If you have been in a call with an intercom or missed a call, you can right-click the entry in the Call Log and
choose Call Back.
49
Intercom Screen ("Home/Video & Audio/Intercom")
If there are more intercom panels than can fit on the screen at any one time, you can display others by using
the page controls located in the bottom bar of the screen.
Intercom Names
To the left of the large icon near the top-right corner is displayed the station number and name of the intercom
that the panel is for (e.g. "104", "Main Gate"), and under this is the name of the intercom that is it attempting to
communicate with (e.g. "Reception").
"Unavailable" is displayed for the name of the intercom that is calling if the intercom is connected to a different
Zenitel Pulse server.
Call Icon
The Call icon in the top-left corner can have any of the following states. Note: The icon is grayed out for your
intercom client.
Icon Meaning/Purpose
You are in a conversation. You can click to place the call on hold (click again to resume).
Status
The current status of the intercom is given near the center of the panel (e.g. "Online", "Calling" or "Ringing").
"Unavailable" is displayed if the intercom uses a different Pulse server from the one your intercom client is
using - you cannot communicate with these intercoms.
Mute Icon
50
Symmetry Software Reference Manual
Clicking (located near the top-right corner) mutes the call sound. Clicking again does not re-enable the
sound. The icon is enabled if the panel is from an intercom station (not an intercom client), the status is
"Calling" and an associated sound has been defined in the "Install/Video & Audio/Intercom/Stations" screen.
The sound and mute button are automatically enabled on the next incoming call from any intercom.
Favorites Icon
Clicking (located in the top-right corner) marks the intercom as a favorite. You can display only favorites by
clicking the same icon located in the bottom bar of the screen.
Search
You can use this field to search for an intercom by name. Enter any part of its name.
Page Size
You can choose the number of intercom panels to display on the same page.
Page Controls
You can use the icons to the right of the Page Size menu to choose to display a different page of intercom
panels.
Favorites
Click to display only favorites. You can choose an intercom to be a favorite by clicking the icon in the top-
right corner of the intercom panel. Favorites can be different for each Symmetry user on each intercom client
(so the same user can have different favorites on different intercom clients).
Using the Call Log
The Call Log is the area in the center of the screen that list all call operations that have taken place. You can
scroll up and down the Call Log (maximum 100 entries). The most recent entry is at the top of the list.
51
Intercom Screen ("Home/Video & Audio/Intercom")
Right-Click Menu
Right-clicking an entry in the Call Log can display icons for the following options:
Connect - Answers an incoming call from the intercom.
Disconnect - Disconnects the call you are currently having with the intercom.
CallBack - Allows you to call the intercom back. This is available if the log entry is for an answered
or missed call.
Camera Icon
If cameras are associated with the intercom and the cameras have recorded video, you can click the icon
to replay video from the time of the call.
Using the Video Layout Controls
You can use the controls in the top-right corner of the screen to choose the number of camera images to
display at any one time, and their layout:
Note: Double-clicking in a video cell causes the cell to expand to occupy the right side of the screen. Double-
clicking again returns the right side of the screen to its previous appearance. If you do not double-click again
within 30 seconds, the other video feeds are closed to save network bandwidth.
52
Symmetry Software Reference Manual
Clicking when viewing live video. You can choose to start playback from 1, 5, 10, 30 or 60
minutes before the current time (if available). The cell changes to display recorded, rather than
live, video.
Clicking in the Call Log. This displays the recordings from all cameras (if available). Playback
begins from the time the call was answered.
Note: Symmetry tags video recordings when the call is started, answered, finished and forwarded. These tags
can make it easier to locate events of interest in the "Home/Video & Audio/Video Playback" screen.
General
Overview of this screen
Note: Symmetry does not currently support CCTV switchers, and therefore this screen.
This screen is available only if the CCTV license has been installed.
The screen enables you to control a selected camera's pan, tilt, zoom, focus and position (camera type
permitting) and to display the live pictures from the camera on the selected monitor. In the Selection screen,
53
CCTV Cameras Screen ("Home/Video & Audio/CCTV Cameras")
select the monitor, then click Find. Cameras connected to the same CCTV switcher as the monitor are listed.
Choose the camera, then click Open.
Note: the CCTV Cameras screen always displays the pictures from the monitor that is hardwired to your PC.
This monitor may be different from the monitor you select in the Selection screen.
You can select only those cameras or monitors that belongs to a company in your company group.
Click here for an overview of CCTV switching.
Using the Selection screen
The Selection screen is displayed when you select CCTV Cameras from "Home/Video & Audio". You can use
the Selection screen to select a monitor and camera. Click here for an overview of Selection screens and how
to use them.
The following options are specific to this Selection screen:
Select a Monitor
Before selecting Find, choose the monitor that the camera is to be switched to.
Camera Description
This option determines the cameras listed when you select Find. If the box is blank, all cameras connected
to the same switcher unit as the monitor are listed. If you want to narrow the search, type the camera
name in the box. You can find a range of cameras by using wildcards.
Note: the CCTV Cameras screen always displays the pictures from the monitor that is hardwired to your PC.
This monitor may be different from the monitor you selected in the Selection screen.
54
Symmetry Software Reference Manual
Print
This prints the screen, including the CCTV image. This button is enabled when you select Freeze.
General
Purpose of the Intercom Control Screen
The "Home/Video & Audio/Intercom Control" screen is used to manage intercom calls from a Stentofon
Alphacom intercom system. If you are using a Zenitel Pulse intercom system, use the "Home/Video &
Audio/Intercom" screen instead.
You can use the "Home/Video & Audio/Intercom Control" screen to:
Answer call requests. A call request is created when a call request button is pressed at an intercom,
typically by visitors or other personnel who require access to the building. When a call request is
received, you can choose to open a line between the intercom located at your PC and the intercom
from which the call request was made. After speaking with the caller, you can press a Command
button, which can perform an action such as opening a door or barrier.
Open a line between the intercom located at your PC and any other intercom. This allows you to
speak with people at other intercoms around the building, even if no call request has been
received.
The screen can be used only if the installer has used the "Install/Video & Audio/Intercom/Clients" screen to set
up your PC as a Stentofon Alphacom Intercom client.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Displaying the Required Buttons
The main area of the screen shows the following button for each intercom:
You can use the Intercom Group menu to display buttons for All Intercoms, or for only those in a selected
group (as defined in the "Setup/Device Groups/Intercoms" screen).
If there are more buttons than can fit on the screen at any one time, you can use the arrow buttons to display
the remaining buttons.
Note: You can display buttons for only those intercoms belonging to the currently selected company.
The Requests area can list multiple call requests. The call requests are listed in order of receipt, with the oldest
at the top. Arrow buttons are provided for scrolling up/down the list. Each intercom can be associated with a
different sound, and the sound played is always the one associated with the call request at the top of the list.
If you minimize the "Home/Video & Audio/Intercom Control" screen, the screen is maximized automatically
when a new call request is received.
55
Intercom Control Screen ("Home/Video & Audio/Intercom Control")
3. When a successful connection is made, the button changes to the following (orange border):
If the intercom has been associated with a command, the Command button is enabled while you are
connected to the intercom.
You can terminate the call simply by clicking the button again (or another button).
Note: Any two intercoms currently communicating are indicated with the above button icon. This enables you to
determine which intercoms are currently in use.
Silencing Sounds
Clicking the Silence button silences the sound until a new call request is received.
Clearing Call Requests
You can clear any call request listed in the Requests area by selecting the call request and clicking the Clear
button. The button representing the intercom from which the call request was made returns to its default state.
Using the Stations List
Clicking the Stations button displays a list of intercoms. All intercoms are listed if Intercom Group is set to All
Intercoms; otherwise, only those in the selected group are listed.
You can use the list of intercoms in the same way as the intercom buttons to answer a call request from a
selected intercom, or to call a different intercom.
The button text changes to Requests; clicking the button returns the list to displaying outstanding call requests.
56
Symmetry Software Reference Manual
General Options
Graphic
If an intercom's location has been specified on a graphic using the "Setup/Graphics/Setup" screen, you can
display the graphic by selecting the intercom in the Requests area, followed by the Graphic button.
General
You can use this screen to view the current status of:
Symmetry NVRs
Cameras
CompleteView video servers (NVRs) and their cameras
Note: The screen may take some time to obtain all video status results. A progress bar near the center of the
screen indicates approximate percentage completion.
57
Card Holders Screen ("Home/Identity/Card Holders")
Screen Options
Filter Report By / Description
Filter Report By allows you to list only those cameras with a selected status. Description allows you to filter
the results further by camera name. For example, if you select Cameras Recording from Filter Report By,
and enter "North" in the Description field, only cameras that are recording whose name includes "North" are
listed.
After entering text in the Description field, press Enter or click to action the filter.
Leaving the Description field empty means "match all".
Analyze
You can refresh the screen by clicking Analyze.
Settings
This gives access to settings for the Video Status screen, such as the Auto-Update Interval and Camera Not
Recording Warning settings.
Clear
Clears the current "Test Report Details". Click Analyze to refresh the report details.
Save
Clicking Save allows you to save the report to txt files (SystemInfo.txt and DiagnosticLog.txt). Windows Event
Viewer log files are also created. The file names are prefixed with the current date and time.
Print
Clicking Print prints a Video Diagnostic Report.
General
Overview of this screen
You can use the Card Holders screen to create, find, view, modify, copy or delete card holders and their details.
A card holder is a standard employee or official of your organization.
A card holder's details can include their card number, PIN, access rights, biometric information and any special
options that the card holder may have, such as being an executive or keycard holder. You can also use the
screen to assign badges and view a card's last 25 transactions.
Note: You may have no access to some card holders, tabs or options, depending on your permissions.
Permissions to tabs and options are set up in the "Maintenance/User & Preferences/Roles" screen.
Permissions to access a specific card holder are set up using the Permissions button when defining the card
holder.
Click here for information about adding and editing card details.
Using the Selection screen
The Selection screen is displayed when you select Card Holders from "Home/Identity". You can use the
Selection screen to create a new card holder or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
58
Symmetry Software Reference Manual
If you have made any changes, you are prompted to save those changes before the previous or next record is
displayed.
Card Details Tab
Card Number
Active Date
Inactive Date\Time
Employee Ref
Approving Official
Badge Design
Company Name
PIN Code
IDS Code
Card Issue Level
59
Card Holders Screen ("Home/Identity/Card Holders")
Facility/Customer Code
Live
Import
Clear
Export
Card Status:
Badge Expires
Usage Remaining
Deactivate at Level
Card Format
Icon:
Active
Inactive
Expired
New
Not Yet Valid
Stop
Vacation
Force Cardholder Inactive
Force Card Inactive
Stop
Set for Batch Printing
Card Lost
Additional Options:
Area Occupancy Card
Card Watch
Command Card Holder
Conditional Card
Executive Card (and exemptions)
Extended Door Times
Keycard Holder
Patrol Card
Visitor Escort
Allow Double Present Toggle Mode Activation
Assa DSR:
Passage / Double Swipe Mode
Deadbolt Override
Access Rights Tab
Click here for general information about this tab.
Page View/Normal View
Show All
Expand
Collapse
Listing
60
Symmetry Software Reference Manual
Assign
Remove
Dates
Threat
Reset
Personal Tab
About the Personal Tab
Visitor Management Login:
Allow Visitor Management Login for this Cardholder
User Name
Password
Locator Tab
Locating a Card Holder
Reset Passback
Visitors Tab
The Visitors tab is displayed if Visitor Escort has been selected, the card holder has a card number and the
card status is New or Active.
The upper area of the Visitors tab lists the visitors that the card holder has been assigned to escort. The lower
area lists those visitors who have not yet been assigned an escort. Date Assigned is the date the visitor was
assigned to the escort.
You can select one or more visitors and click Remove (to remove them from the upper area) or Assign (to add
them to the upper area) as appropriate.
Visitors can be added or their details changed using the "Home/Identity/Visitors" screen.
Note: You might not have access to the Visitors tab, depending on your user permissions, as set up in the
"Maintenance/User & Preferences/Roles" screen.
Biometrics Tab
About the Biometrics Tab
The Biometrics tab allows you to capture and store the person's signature (to print on a badge) and to
enroll biometric data, such as a fingerprint from a fingerprint enrollment reader.
You can encode smart cards by using the Encode button or from the enrollment dialog displayed by
selecting Capture S813 (if S81x enrollment readers are being used).
Overview of Fingerprint Readers
Note: You may have no access to some tabs and buttons, depending on your user permissions, as set
up in the "Maintenance/User & Preferences/Roles" screen.
61
Card Holders Screen ("Home/Identity/Card Holders")
62
Symmetry Software Reference Manual
Note: You can select multiple dates by pressing Shift or Ctrl between clicks, or by clicking and dragging
the mouse (standard Windows techniques). If the dates have different hours definitions assigned, the
menu displays "Multiple Hours Selected".
Copy
Move
Badge
Encode
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
63
Visitors Screen ("Home/Identity/Visitors")
General
Overview of this screen
You can use the "Home/Identity/Visitors" screen to create, find, view, modify, copy or delete visitor details.
Click here for information about adding and editing card details.
Click here for general information about visitor management.
Using the Selection screen
The Selection screen is displayed when you select Visitors from "Home/Identity". You can use the Selection
screen to create a new visitor or to find an existing one to edit. Click here for an overview of Selection screens
and how to use them.
The following options are specific to this Selection screen:
Filter By
(other options are displayed below Filter By, depending on the option you choose)
Card Format
Today's Visitors
Visitor Card Name
Visitor Card Number
Visitor Data Title
Visitor Visiting
Arriving and Departing
Select By Status
(other filter options on the screen may affect the number of visitors listed when you select Find.)
Active
All
Expired
Force Cardholder Inactive
Inactive
Lost
Not Issued
Not Yet Valid
Stopped
Visitor Active
Visitor Closed
Visitor Pending
Auto Update and Minutes
64
Symmetry Software Reference Manual
Visiting
Contact Number
Visitor Escort
Badge Design
Badge Expires
Set for Batch Printing
Message
History
Visitor Status:
Pending
Active
Closed
Stop
Stop
Sign In
Sign Out
Close
Live
Import
Clear
Export
Visitor's Business Card:
Scan
Import
Export
View
Card Details Tab
Card Number
Active Date
Inactive Date\Time
Approving Official
Company Name
PIN Code
Card Issue Level
Facility/Customer Code
Card Status:
Badge Expires
Usage Remaining
Deactivate at Level
Card Format
Icon:
Active
Inactive
Expired
65
Visitors Screen ("Home/Identity/Visitors")
New
Not Yet Valid
Force Cardholder Inactive
Card Lost
Additional Options:
Area Occupancy Card
Card Watch
Extended Door Times
Executive Card (and Exemptions)
Access Rights Tab
Click here for general information about this tab.
Page View/Normal View
Show All
Expand
Collapse
Listing
Assign
Remove
Dates
Threat
Reset
Personal Tab
About the Personal Tab
Locator Tab
Locating a Card Holder
Reset Passback
Biometrics Tab
About the Biometrics Tab
The Biometrics tab allows you to capture and store the person's signature (to print on a badge) and to
enroll biometric data, such as a fingerprint from a fingerprint enrollment reader.
You can encode smart cards by using the Encode button or from the enrollment dialog displayed by
selecting Capture S813 (if S81x enrollment readers are being used).
Overview of Fingerprint Readers
Note: You may have no access to some tabs and buttons, depending on your user permissions, as set
up in the "Maintenance/User & Preferences/Roles" screen.
66
Symmetry Software Reference Manual
67
Identity Verification Screen ("Home/Identity/Verification")
Introduction
Purpose of this screen
Note: To use this screen, Identity Verification must have been selected in the Symmetry Device Integrations
screen during the installation of Symmetry, as described in the Symmetry Software Installation Manual.
This screen enables you to monitor the identity of people at "entry points" to the site and control access at
those entry points. An entry point is a reader at a door, barrier, turnstile or other device that controls access. Up
to 27 entry points can be monitored simultaneously.
Normally, the screen is configured to display live video at each entry point.
When a card holder or visitor performs an access-control transaction, the screen automatically displays the
stored image of the card holder or visitor, providing that person is known to Symmetry. This allows you to check
the person's stored image against the live video image.
Optionally, the screen can be set up in manual verification mode (otherwise known as PC Door Control mode).
In this mode, you are required to choose whether to allow or deny access for each valid access-control
transaction.
The entry points displayed at any one time are defined in a "view", as set up in the "Setup/Identity
Verification/View" screen. If more than one view has been set up, you can choose to display a different view by
clicking the following icon located near the top-right corner of the screen:
You can select any view set up for a company in your company group. The name of the view you are currently
displaying is shown at the top of the screen. The next time you open the screen, the last view you used is
automatically displayed.
Information displayed
The screen displays a cell for each entry point in the view. Each cell contains the following (from left to right):
Live video image(s) at the entry point, if cameras have been associated with the entry point in the
"Setup/Identity Verification/Entry Point" screen. If the camera view allows Pan-Tilt-Zoom (PTZ),
you can use the mouse for PTZ movements.
An area for the stored image of a card holder/visitor. An image is displayed in this area when a card
known to Symmetry is used at the entry point, or when you select a card using the Lookup Card
Holder button.
An area for buttons such as Grant Access, Deny Access, Unlock, Pause, etc.
An area that shows:
o The last transaction (alarm/event) at the entry point, such as "Door Forced" or "Granted
Access". The alarm/event text is displayed in the color defined in the
"Operation/Alarms/Definitions" screen. For details of the meaning of alarms/events, please
refer to Alarm/Event Messages.
o The date and time of the alarm/event.
o Any card or personal details of the card holder/visitor who caused the alarm/event (if
known). The card and personal details to include are specified in the "Setup/Identity
Verification/Data Titles" screen.
Note: Your user role may restrict the views, video images and commands you can use. This is controlled by the
Permissions button in the appropriate screens. For example, the Permissions button in the
"Operation/Commands/Predefined" screen may limit the predefined commands that are available to your user
role.
68
Symmetry Software Reference Manual
Note: The Auto Clear After option in the "Setup/Identity Verification/Data Titles" screen specifies the length of
time the stored image and card/personal details are displayed following a grant/deny access transaction.
The Video Verification screen can also display previous transactions if the current view contains only one entry
point and Rotate View is set in the "Setup/Identity Verification/View" screen. The number of previous
transactions displayed is specified by Entry Point History Limit, also configured in the "Setup/Identity
Verification/View" screen. When Rotate View is set, the top cell of the screen displays the standard live
information. The remaining cells display the previous transactions, including still video image(s) taken at the
time of each transaction.
Using manual and automatic verification modes
An entry point can be in one of the following two modes, as selected by the Enable Manual Verification or
Enable Automatic Verification button:
Manual verification mode
If an entry point is in manual verification mode (PC Door Control mode on), you must choose whether to
grant or deny access after each valid access-control transaction. You can do this using the Grant Access
or Deny Access button.
When using manual verification mode, a sound can be made when there is a transaction at the reader.
The sound is configured in the "Setup/Identity Verification/Entry Point" screen.
Automatic verification mode
If an entry point is in automatic verification mode (PC Door Control mode off), the system automatically
grants or denies access depending on access rights. In addition, if Card Alarm Notification is set in the
"Setup/Identity Verification/Entry Point" screen, a card alarm (such as "At Wrong Door") prompts the user
of the "Home/Identity/Verification" screen to choose whether to grant or deny access.
In automatic verification mode, the Grant Access button is also permanently available. This enables you
to grant access at any time, without a card transaction taking place at the reader. However, if the person
requiring access is a card holder in the database, it is recommended that you use the Lookup Card
Holder button to locate the card holder in the database, then click Grant Access or Deny Access. This
allows the card holder's antipassback status to be maintained (if used), the card holder to be located using
the "Home/Identity/Locator" screen, and the grant/deny access selection to be logged. See below for other
important information about Lookup Card Holder.
Note: Any action you take to, for example, grant or deny access is logged in the User Audit log
("Reports/History/User Audit"), with the card number, if known.
Note: The Lookup Card Holder, Grant Access and Deny Access buttons are available only if enabled in the
"Setup/Identity/Entry Point" screen.
About the side bar
The side bar contains a button for each entry point in the view. A button is highlighted in red if there is a
transaction at the entry point that needs you attention, such as an incoming intercom call. Clicking the button
brings the entry point into view if it is not currently displayed. The title bar of the entry point is pulsed if attention
is required. The text (tag name) displayed in each button is defined in the "Setup/Identity Verification/Entry
Point" screen.
The side bar also contains standard scroll-up and scroll-down buttons.
Clicking the following button displays the entry point that you should service first (that is, has been outstanding
the longest):
You can move the side bar to the opposite side using the following:
69
Identity Verification Screen ("Home/Identity/Verification")
Buttons
The following buttons are available for each entry point:
Grant Access (icon set in the "Setup/Identity Verification/Entry
Point" screen) - Click to grant access.
The button is available if Allow Grant Access is selected in the
"Setup/Identity Verification/Entry Point" screen and one of the
following is true:
You have used the Lookup Card Holder button to
locate a card holder in the database.
The entry point is in manual verification mode and
there has been a valid access-control transaction,
as determined by the person's access rights. The
button is made available only for a limited period.
The entry point is in automatic verification mode.
You can grant access at ant time. See Using
manual and automatic verification modes, above.
The door will automatically re-lock after a pre-defined period (as set
up in the "Install/Access Control/Reader" screen).
Deny Access (icon set in the "Setup/Identity Verification/Entry
Point" screen) - Click to deny access.
The button is available if Allow Deny Access is selected in the
"Setup/Identity Verification/Entry Point" screen and one of the
following listed above is true.
Unlock/Lock - Click to unlock or lock the entry point. The icon
indicates the current state.
70
Symmetry Software Reference Manual
General
Overview of this screen
This screen helps you to determine the current location of one or more card owners. It shows, for each selected
person, the name of the reader the person used.
Click Find to list the locations of everyone who matches the search criteria.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is deselected (the
default), you can find the location of any person who is associated with a company in your company group. If
Filter by Company is selected, you can find the location of any person who is associated with the currently
selected company.
Screen Options
Company Name
Select the Symmetry company that the person you wish to locate is associated with.
Filter By
The Filter By option enables you to reduce the number of people listed in the screen when you select Find.
Filter By can make it easier for you to locate an existing card holder.
Once you have selected an option from the Filter By pull-down list, other fields are displayed that enable you to
be even more selective about the card holders to list.
The following Filter By options are available:
Card Data Title
Card Name
Card Number
Visitor Card Name
71
Bulk Card Amendments Screen ("Home/Identity/Bulk Card Amendments")
General
About the Bulk Card Amendments Screen
You can use the Bulk Card Amendments screen to change the details of multiple card holders or visitors in one
operation. The changes you make are applied to all the selected people.
You can change information such as the active/inactive date, badge design, inactive status, access rights and
personal data.
Note: You may have no access to some card holders, visitors, tabs or buttons, depending on your permissions.
Permissions to tabs and buttons are set up in the "Maintenance/User & Preferences/Roles" screen.
Permissions to access a specific visitor or card holder are set up using the Permissions button when defining
the visitor or card holder. Also, note that you are not given access to the details of card holders or visitors
whose details are already being edited by another user logged in.
3. Click Find. The people matching Filter By and Company (if applicable) are listed in the left-hand area of
the screen.
4. In the left-hand area of the screen, select the card holders or visitors you want to amend, then click the >>
button.
Note: If you select a card holder or visitor who does not belong to the currently-selected company, you
can make changes only in the Access Rights tab. The options in the Card Details and Personal Details
tabs are grayed out to prevent you from making changes in those tabs.
5. If required, repeat steps 1 to 4 using different filter options to select other card holders or visitors.
6. Amend the details in the appropriate tabs, then click OK.
Screen Options
Selection Tab
Filter By
(Other options are displayed below Filter By, depending on the option you choose.)
Note: When you select a filter such as Card Holders Associated with a Reader Group, the secondary
menu (in this case, Reader Group) lists only those items that belong to the currently-selected company.
This reflects the behavior of the Access Rights tab, which allows you to assign access rights only to
reader groups, etc. that belong to the currently-selected company.
72
Symmetry Software Reference Manual
73
Bulk Card Amendments Screen ("Home/Identity/Bulk Card Amendments")
Note: You may not be able to select certain access codes, readers, reader groups, floor groups and
shared floor/reader groups, depending on the permissions assigned to those items when they were
defined (using the Permissions button).
74
Symmetry Software Reference Manual
Reset
Personal Details Tab
You can use the Personal Details tab to amend the personal details of all selected card holders or visitors.
Existing personal data is not shown in the screen.
Personal data you enter or choose in a field overwrites any existing personal data in that field for all selected
card holders or visitors. No changes are applied to those fields that you leave unchanged.
The "Setup/Identity/Personal Data/Card Holder Titles" screen and "Setup/Identity/Personal Data/Visitor Titles"
screen can specify fields to be mandatory or "List Only". These restrictions are ignored when defining personal
data in the Bulk Card Amendments screen.
Selecting a Remove option will remove any personal data specified for that title for all selected card holders or
visitors.
Note: Your user permissions ("Maintenance/User & Preferences/Roles" screen) may stop you from accessing
groups of personal data titles in this screen.
Note: Click here for further details.
Find
This button, which is available only when the Selection tab is displayed, lists the people who match the Filter
By selections.
The button is grayed out if there any records listed in the right-hand area of the screen (to prevent the same
person from being selected more than once).
Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Overview of this screen
You can use this screen to print one or a series of badges in one operation.
Use the Selection screen to select the badges you wish to print, then select Open to display the Print Badges
screen. You can use the Print Badges screen to change the badge design, encoding options and printer setup,
and to start the printing process.
Note: If a card holder has more than one card defined in the "Home/Identity/Card Holders" screen (not
applicable at Central Card Handler clients), the badge is printed using the card number of the first card.
You can print badges only for people who are associated with the currently selected company.
If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System
Preferences" screen, the same card credentials cannot be encoded onto more than one card. For further
details, please refer to the help for Prevent Duplicate Credential Encoding in the System Preference screen.
Using the Selection screen
The Selection screen is displayed when you select Print Badges from "Home/Identity". You can use the
Selection screen to select the badges to print. Click here for an overview of Selection screens and how to use
them.
The following option is specific to this Selection screen:
75
Print Badges Screen ("Home/Identity/Print Badges")
Filter By
The Filter By option in the Print Badges screen enables you to reduce the number of people listed in the
Selection screen when you select Find. Filter By can make it easier for you to find an existing badge for
printing.
Once you have selected an option from the Filter By pull-down list, other fields are displayed that enable
you to be even more selective about the people to list.
The following Filter By options are available:
Badges Flagged for Batch Printing
Card Data Title
Card Number
Last Name
Visitor Data Title
Visitor Last Name
(Other options are displayed below Filter By, depending on the option you choose.)
Screen Options
Setup
Click this button to set up the printer options. Click here for details.
Print
Select this button if you want to print (and optionally encode) the card.
You may not have access to this button, depending on your user permissions, as set up in the
"Maintenance/User & Preferences/Roles" screen.
Reset
Choose this button to clear the Set for Batch Printing option in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen for everyone selected in the Selection screen. You can use this option without
having to print the badges.
Badge Design
Select Card Holder Assigned if you wish to use the badge design previously selected in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
The badge design determines the appearance of the badge, as set up using the "Setup/Identity/Badge
Designer" screen.
You can select an alternative badge design if you wish to override the badge design assigned in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Encoder Format
Select Card Holder Assigned if you wish to use the encoder format previously selected using the Badge
button in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
You can select an alternative format if you wish to override the format assigned in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.
Select None if you do not want to encode the badge, or if the printer does not support encoding.
Track
If the badge printer allows you to encode the badge, select the track number to use (cards may have more than
one magnetic track).
The installer can set up the default track in an ini file.
This option is not available if you have selected Card Holder Assigned for the Encoder Format, since the
track number is controlled by the Badge option in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
76
Symmetry Software Reference Manual
bpi
If the badge printer allows you to encode the badge, select the bpi (bits per inch) setting. Micromax always uses
75bpi. This option is not available if you have selected Card Holder Assigned for the Encoder Format, since
the bpi setting is controlled by the Badge option in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
Print Selection
Displays the number of badges to be printed.
Smartcard Format
DES Fire Encoding
Select Sector to use
Site number
Note: If Lock Position is selected in the "Maintenance/User & Preferences/Home Screens" screen, you are not
able to close, adjust the size or change the position of the home screens.
Full Screen - Displays the window in full-screen mode. Full-screen mode displays the window at its maximum size,
with the ribbon bar, title bar and status area removed. F11 can be used to switch full-screen mode off or on.
You can use the remaining View options to rearrange the positions of the open screens.
77
Operation Menu
General
Overview of this screen
"Hours definitions" are used in:
Time codes ("Operation/Times/Time Codes"), which in turn, are used in the definitions of:
Access rights (such as in the "Home/Identity/Card Holders" screen).
Scheduled commands ("Operation/Commands/Scheduled" screen).
Trigger commands ("Operation/Commands/Trigger" screen).
M2150 intrusion area arm/disarm warnings ("Setup/Device Groups/Intrusion Areas" screen).
The specification of vacation hours in the Vacation tab of the "Home/Identity/Card Holders" screen.
The Category option determines the end use of the hours to be one of the above. Hours that use the General
category can be used for any of the above except vacation times.
Note: Vacation hours have a resolution of one hour; all others have a resolution of one minute.
Note: If you edit an existing hours definition for vacation hours, a message warns you that the change will
update the relevant card holder states within one hour. The change actually takes place at the start of the next
hour (for example, if the time is currently 09:30, the change will affect card holders at 10:00). Selecting "Don't
show this message again" hides the message only for your Symmetry username.
An hours definition consists of a series of time intervals within a 24-hour period. There can be up to ten
intervals in an hours definition.
When an hours definition is used in access rights, each time interval determines the times when people will be
able to gain access. When used for commands, the intervals determine when commands take place. When
used for M2150 intrusion area arm/disarm warnings, the intervals determine the times when an area is
expected to be armed and disarmed.
Defining the intervals
There can be up to ten time intervals in an hours definition.
You can use the button to the right of the bar to choose the color in which to display the time intervals. This
allows different hours definitions to be displayed in different colors in a time code (which is of particular benefit
when using the Calendar Overview tab in the Time Code Definition screen).
To add an interval graphically
Click on any part of the bar, then drag the mouse to define the interval. The interval's start and end times
are shown on the right-hand side of the bar. The start and end times snap to the nearest hour or half hour.
To move an interval graphically
Click on the interval, then drag it to its new position. Overlapping intervals are merged automatically.
To change an interval's times graphically
Click on the interval, then click on and drag the left-hand or right-hand edge to its new position.
78
Symmetry Software Reference Manual
Note: You can select more than one interval to delete, cut or copy by holding down the Ctrl key and left-clicking
on each interval.
79
Time Codes Screen ("Operation/Times/Time Codes")
General
Overview of this screen
Time codes are used when setting up the following:
Access rights (such as in the "Home/Identity/Card Holders" screen).
Scheduled commands ("Operation/Commands/Scheduled" screen).
Trigger commands ("Operation/Commands/Trigger" screen).
M2150 intrusion area arm/disarm warnings ("Setup/Device Groups/Intrusion Areas" screen).
When creating a new time code, you specify which of these purposes the time code will be used for. If, for
example, you choose the time code to be used with scheduled commands, it cannot be used for trigger
commands.
When used for access rights, the time code determines the times during which people will be able to gain
access. When used for commands, the time code determines when the commands will take place. When used
for M2150 intrusion arm/disarm warnings, the time code determines the times when an area is expected to be
armed and disarmed.
The time codes you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Time Codes from "Operation/Times". You can use the
Selection screen to create a new time code or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
The following option is specific to this Selection screen:
Time Code Category - Use this option to specify the purpose of the time code to find or create. Choose
All Categories to list all time codes. Choose General to list those that have been defined for any use.
80
Symmetry Software Reference Manual
The Ref column shows the unique number of the hours definition. This was automatically assigned by
Symmetry when the hours definition was created in the "Operation/Times/Hours" screen.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of hours definitions listed. A message at a bottom of the list
indicates when there are unlisted hours definitions available that match Filter Hours.
2. Click:
(next to a day of the week) - To assign the selected hours definition to the day.
Alternatively:
Drag and drop the hours definition to the day, or
Double-click to assign to the next unassigned day, or
Enter the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
Everyday - To assign the selected hours definition to every day of the week.
Weekdays - To assign the selected hours definition to weekdays (Monday to Friday).
Weekends - To assign the selected hours definition to Saturday and Sunday.
3. Each time interval in the hours definition is shown graphically as a solid block of color in the time line. The
color is chosen in the "Operation/Times/Hours" screen. Hovering the pointer over an interval shows the start and
end time of that interval in a popup.
To assign no hours to any day, simply do not assign an hours definition to that day.
Other Options:
(next to a day of the week) - Removes the hours definition from that day. Alternatively:
Drag and drop the hours definition from the day to the Hours box, or
Delete the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
Clear All - Clears the hours definition from every day.
Modify (displayed only if you have sufficient permissions) - Allows you to edit the selected hours definition.
View (displayed only if Modify is not displayed) - Allows you to view the selected hours definition.
New - Allows you to create a new hours definition.
Using the Holiday Hours Tab
To Define the Hours to use for a specific Holiday:
1. In the Hours box, select an "hours definition" from the list. Hours definitions are defined using the
"Operation/Times/Hours" screen. If required, you can use the Filter Hours field (see below) to reduce the
number of hours definitions listed in the Hours box.
The Ref column shows the unique number of the hours definition. This was automatically assigned by
Symmetry when the hours definition was created in the "Operation/Times/Hours" screen.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of hours definitions listed. A message at a bottom of the list
indicates when there are unlisted hours definitions available that match Filter Hours.
2. Click:
(next to a holiday) - To assign the selected hours definition to the holiday. Note: Rows
where the holiday name is "Unused" should be ignored. Alternatively:
Drag and drop the hours definition to the holiday, or
Double-click to assign to the next unassigned holiday, or
Enter the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
Everyday - To assign the selected hours definition to every day of the week.
81
Time Codes Screen ("Operation/Times/Time Codes")
3. Each time interval in the hours definition is shown graphically as a solid block of color in the time line. The
color is chosen in the "Operation/Times/Hours" screen. Hovering the pointer over an interval shows the start and
end time of that interval in a popup.
To assign no hours to any holiday, simply do not assign an hours definition to that holiday.
Other Options:
(next to a holiday) - Removes the hours definition from the holiday. Alternatively:
Drag and drop the hours definition from the holiday to the Hours box, or
Delete the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
Clear All - Clears the hours definition from every holiday.
Modify (displayed only if you have sufficient permissions) - Allows you to edit the selected hours definition.
View (displayed only if Modify is not displayed) - Allows you to view the selected hours definition.
New - Allows you to create a new hours definition.
Using the Calendar Overview Tab
This tab shows the hours that will be used on each day over the next year.
By default, the tab reflects the information set up in the Standard Weekly Hours and Holiday Hours tabs.
However, it is possible to use the Calendar Overview tab to override the hours used for any day that is not a
holiday.
Each date indicates the number of the hours definition used on that date. For example, if May 27th shows "2",
then hours definition number 2 is used on that date. If the number is in italic, the date is a holiday.
A holiday that has no hours definition assigned is shown with an italic "0". This shows that the time code will not
operate on this date.
The color shown in each day of the calendar depends on the color assigned to the hours definition in the
"Operation/Times/Hours" screen.
Hovering the cursor over any non-holiday displays the name of the hours definition used on that date. Hovering
the cursor over any holiday also displays the name of the holiday type.
The bar near the bottom of the dialog shows the intervals in the hours definition assigned to the currently
selected date. The menu to the left of the bar shows the name of the hours definition. Right-clicking in the bar
displays Edit (to edit the hours definition) and New (to create a new hours definition for the selected date).
These options are repeated in the menu (<Create New> and <Edit Existing>).
To override the hours definition used on a selected date, click on the date, choose the hours definition (using
the menu or field near the bottom-left corner of the dialog), then click Assign. Assign operates only for dates
that are not holidays.
Note: You can select multiple dates by pressing Shift or Ctrl between clicks, or by clicking and dragging the
mouse (standard Windows techniques). If the dates have different hours definitions assigned, the menu
displays "Multiple Hours Selected".
If you want to remove an override made from the Calendar Overview tab, select the date(s), then click
Remove.
82
Symmetry Software Reference Manual
"Area Warning" is used for M2150 intrusion systems to define the required armed and disarmed periods in the
"Setup/Device Groups/Intrusion Areas" screen.
Filter Hours
The Filter Hours field appears only if the number of hours definitions exceeds the value of Selection List
Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen.
You can use the Filter Hours field to list only those hours definitions whose name includes the text you enter.
For example, the hours definition named "ABC123" is listed if you enter "C1", or "AB", etc. After entering the
text, press Enter or click to action the filter.
Leave the Filter Hours box empty if you do not want to use a filter.
Type sub filter here
You can use this field to list only those hours definitions whose name includes the text you enter.
If Filter Hours is also displayed, Type sub filter here operates only on the results of the Filter Hours filter.
Copy/Delete/Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Introduction
This screen enables you to specify your organization's holiday dates, such as public holidays and site shutdown
periods. You need to define the holiday dates if you want access rights, command operation or alarm routing to
be different on holidays. The holidays set up in this screen are available to all companies on the system.
Each holiday date must be assigned to at least one holiday type. For example, you may have the holiday types
named "Christmas Shutdown" and "Public Holidays" and decide to assign December 25th to both. You can
name the holiday types in the lower area of the screen.
It is the holiday types, rather than the holiday dates, that are used in other screens. Holiday types are used in
time codes ("Operation/Times/Time Codes") and by the installer to set up alarm routing
("Operation/Alarms/Routing").
Holiday types make it easy for you to set up access rights, command operation or alarm routing for holidays.
For example, in the "Operation/Times/Time Codes" screen, simply selecting the hours for a holiday type
allocates the hours to every holiday in that holiday type.
Note: Older node types (prior to the multiNODE-2) are able to use only four holiday types.
83
Access Codes Screen ("Operation/Times/Access Codes")
The colored box to the left of each text field shows the color that will represent the holiday type in the
calendar.
2. Select the date(s) that you want to allocate to a holiday type.
You can drag the mouse, use shift-click or ctrl-click to select multiple dates. You can use the scroll bar to
access dates in following years.
3. Click Assign.
4. In the dialog that is displayed, choose the holiday types that you want the dates to belong to.
5. Click anywhere in the calendar. The dates are now colored to indicate the holiday type(s) they belong to. If
a date belongs to more than one holiday type, it is displayed in a mustard color (hover the cursor over the date to
see the holiday types assigned to that date).
You can select one or more dates then Remove to remove the dates from all holiday types.
Screen Options
Clear
Removes all dates from all holiday types.
Holiday Check 7 Days Prior
If you select this option, a Holiday Check dialog is automatically displayed when a user logs in to Symmetry at
any time during the 7-day period prior to a holiday date. The dialog is displayed only when logging in at the
client PC specified by Route Holiday/Advance/Retard Checks to in the "Maintenance/User &
Preferences/System Preferences" screen.
The Holiday Check dialog enables the user to check that the holiday date is correct before it occurs. The dialog
has OK and Cancel buttons. Selecting OK prevents the message from being displayed again for the holiday
date (details of the user who selects OK are saved in the History log). Selecting Cancel causes the message to
be displayed again at the next login.
In order for the Holiday Check dialog to be displayed, the Symmetry services at the server must be running
across midnight at the beginning of the first day that the message is due. This will be the case if Symmetry has
been installed correctly.
Clear
Clears the screen.
Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Overview of this screen
An access code is a pre-defined set of access rights that allow access to any of the following:
Reader groups
Readers
Floor groups
M2150 intrusion areas
84
Symmetry Software Reference Manual
Access codes are used to set up access rights in, for example, the "Home/Identity/Card Holders" screen.
The access rights are displayed in a graphical tree view. You can expand the branches of the tree to view their
contents in the normal way.
The access codes you set up in this screen can be used only for a card holder or visitor who is associated with
the currently-selected Symmetry company. You can use the Change Company option in the
"Home/Monitoring" menu to change the company that you are administering.
Note: The Access Codes Definition screen alerts you if you attempt to create two access codes containing the
same access right assignments. This is to prevent the system from becoming 'cluttered' with unnecessary
access codes.
Note: You may not be able to select certain access codes, readers, reader groups, floor groups, shared
floor/reader groups or intrusion areas, depending on the permissions assigned to those items when they were
defined (using the Permissions button).
85
Access Codes Screen ("Operation/Times/Access Codes")
Note: If A schedule override exists is displayed at the top of the tab, the access code is disabled on certain
days, as defined in the Schedule tab.
Note: The active/inactive status of an access code on a specified date is relevant only if the access code is
being used on that date. Please be aware that advanced access rights (e.g. set up in the "Home/Identity/Card
Holders" screen) may cause an alternative access code to be used during specific periods of the year, rather
than the access code that you have chosen to disable on selected dates.
Note: The schedule covers the current year and the next four years. After this period, all days are, by default,
enabled. It is therefore advisable to set up a task every year or two (using the "Home/Monitoring/Tasks" screen)
to configure the new, as yet unconfigured, years in the schedule.
When an access code is inactive on the current day (either by being forced inactive or through the Schedule
tab), the access code icon is grayed out in the Access Rights tree (e.g. in the "Home/Identity/Card Holders"
screen).
86
Symmetry Software Reference Manual
General
Overview of this screen
A scheduled command causes a start command, then a stop command, to be executed, typically at a device or
group of devices, such as readers, monitor points and auxiliary outputs. A scheduled command could, for
example, switch lights on and off at specific times.
The start command is executed at every start time in a time code. The stop command is executed at every end
time in the time code.
For a new scheduled command, make sure that appropriate time codes have been set up
("Operation/Times/Time Codes" screen).
You are able to set up scheduled commands only for the devices or groups assigned to the currently selected
company. The installer defines the devices that are assigned to each company.
You cannot send commands to individual auxiliary outputs or monitor points that are used to control and
monitor an elevator panel. Use the Floor Groups selection type to control access to elevator floor buttons.
Note: You must close the Selection screen before the system actions any new or changed scheduled
commands.
Troubleshooting Note: If a node is not actioning scheduled commands correctly, you may need to
synchronize the node with the database by selecting Sync Scheduled Commands Now, then OK in the
"Maintenance/Time/System Time" screen.
87
Scheduled Commands Screen ("Operation/Commands/Scheduled")
Note: If you select Door or Door Group, you can create a command only to disable or enable certain
"door" alarms (e.g. Door Held Open). In all other respects a door is the same as a reader, and a door
group is the same as a reader group. Click here for further information.
Find By Location
Use this field if you want to reduce the number of entries listed when you select Find. If the option is blank,
all entries are listed (if no other filtering options are set in the screen).
Find by Location is a filter on the name of the device or item that the command applies to. Only those
commands that apply to the named device or item are listed when you select Find. Find by Location is
different from Description, which is a filter on the name of the command.
You can use wildcards if required.
Active and Inactive Date
Enter or select a date if you want to list only those commands that have a validity period (as specified in
the Definition screen) for one or more dates on or between the Active Date and Inactive Date.
If Active Date is blank, it means "any date up to the Inactive Date". If Inactive Date is blank, it means
"any date after the Active Date".
Select by Status
Select All if you want to list all commands, irrespective of status. Otherwise, choose:
Active - to list only those commands that have a status of "Active"; that is, can operate
normally.
Expired - to list only those commands that have expired (that is, where the current date is
after the To date shown in the Definition screen).
Inactive - to list only those commands that are inactive (as determined by the Force
Inactive or Threat Level options in the Definition screen).
Not Yet Valid - to list only commands that are not yet valid (that is, where the current date is
before the From date shown in the Definition screen).
88
Symmetry Software Reference Manual
Location
Choose the specific device or item that the command applies to. The items in this menu depends on what
you have selected in Device.
If you require any further details about the meaning of Location, refer to the description of the appropriate
command. For example, refer to the command descriptions if you want to set up a "Disable All Door
Alarms" command, but the door is not listed in the Location menu.
Start Command and Stop Command
When you select a start command the opposite command is inserted automatically in the Stop Command
box, if appropriate (although you are still able to select a different stop command). If you do not want a
start or stop command, select None.
Meaning of each command
When
Select the time code to be used from the Time Codes box, then click ">". The start command is executed
at each start time in the time code, and the stop command is executed at each end time. Alternatively,
double-click the time code, or drag and drop it to the right-hand area.
The area to the right gives a graphical representation of the time intervals defined by the time code. You
can use Modify/View to modify or view the selected time code (the option displayed depends on your
permissions), or New to create a new time code.
The start command is executed immediately you select OK if Sync Command on Close is selected in the
Options tab and the time code is currently in an ON period.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of time codes listed. An information message indicates when
there are unlisted time codes available that match Filter Time Codes (see below).
To remove the time code used, click "<" or drag and drop the time code to the Time Codes box.
Filter Time Codes
The Filter Time Codes field appears only if the number of time codes exceeds the value of
Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen.
You can use the Filter Time Codes field to list only those time codes whose name includes the text
you enter. For example, the time code named "ABC123" is listed if you enter "C1", or "AB", etc.
Enter the text and click to action the filter. Leave the field empty if you do not want to use a filter.
Type sub filter here
You can use this field to list only those time codes whose name includes the text you enter.
If Filter Time Codes is also displayed, Type sub filter here operates only on the results of the
Filter Time Codes filter.
Override Tab
Purpose of this tab
This tab allows you to override the start time, stop time, start and stop time, or time code assigned to the
scheduled command, or to disable the scheduled command entirely. The override applies between the
specified dates.
You may want to use this feature to change the operation of the scheduled command during, for example,
a site shutdown period.
Setting up the override
To set up the override:
1. Choose the required option from the Override menu.
2. Specify the Start Time, Stop Time or Time Code as applicable. If necessary, please refer to the
help for the Configuration tab for details of selecting a time code.
89
Scheduled Commands Screen ("Operation/Commands/Scheduled")
If you override the start or stop time, the new specified time overrides all start/stop times in the time
code.
Example of changing start or stop time
For example, if the time code is defined as follows:
Start = 09:00, Stop = 12:00, Start = 14:00, Stop = 17:00
Overriding the stop time with a time of 18:00 results in the following:
Start = 09:00, Start = 14:00, Stop = 18:00
3. Use the calendar buttons to specify the start date and end date of the override.
4. Save the changes.
5. If Reason Required for Scheduled Command Override is selected in the "Maintenance/User &
Preferences/System Preferences" screen, enter the reason for the override. The reason, the date of the
change and the user's name is recorded in the command's notes, which you can view by clicking the Item
Notes button:
Note: Setting up an override automatically selects Sync Command on Close in the Options tab.
Options Tab
From/To
The scheduled command will be executed on and between the From and To dates only (subject to the
on/off periods defined in the selected time code). The day after the To date, the command will no longer
operate and its status changes to Expired. If you leave the To date blank, the command will operate for all
dates from the From date.
Note: If you select a To date, do not use a time code that stops at midnight. If you do, the last stop
command in the date range will not be executed. If you require the stop command to be executed, use a
end time of 23:59.
Force Inactive
Stops the command from being executed at all.
Activate at Threat Level
Select the threat level at which you want the command to become active.
Click here for examples and details of how this option operates with Deactivate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Deactivate at Threat Level
Select the threat level at which you want the command to deactivate.
Click here for examples and details of how this option operates with Activate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Report As
Determines whether the Scheduled Operation' message generated when the command is executed should
be reported as an alarm, event or not at all.
An event simply records the message in the log file. You can use the "Home/Monitoring/Activity" screen to
view the contents of the log file.
An alarm displays the message in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screens, and also adds the message to the log file.
90
Symmetry Software Reference Manual
Note: The system may have been set up in the "Operation/Alarms/Routing" screen to prevent node or
system alarms from being displayed in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen.
91
Predefined Command Screen ("Operation/Commands/Predefined")
General
Introduction
This screen enables you to set up commands that will be available only to users who have a nominated user
role. User roles are set up in the "Maintenance/User & Preferences/Roles" screen.
Predefined commands are available for use in, for example, the following screens:
"Home/Monitoring/Command Center" (a separate branch in the tree is provided for predefined
commands)
"Home/Monitoring/Graphics" (separate icons are provided for predefined commands)
"Setup/Workflow/Workflow Designer"
These screens allow users to send predefined commands that are assigned to the user's role.
If Send Predefined Commands Only is selected in the "Home/Monitoring/Graphics" section of a user role,
users with that role are able to send only predefined commands from the "Home/Monitoring/Graphics" screen
(standard commands cannot be sent).
Predefined commands are associated with a user role, not a company. This allows users to execute a
predefined command for a device that does not belong to a company in the user's company group.
Using the Selection screen
The Selection screen is displayed when you select Predefined from "Operation/Commands". You can use the
Selection screen to create a new predefined command or to find an existing predefined command to edit. Click
here for an overview of Selection screens and how to use them.
92
Symmetry Software Reference Manual
General
Overview of this screen
A trigger command (otherwise known as a conditional command) causes a command to be executed at a
device or group of devices if an alarm/event message is received from another device within an on period of a
specified time code. A trigger command could, for example, switch a video camera on when a monitor point is
activated at certain times of the day. A trigger command can also be used to run a specified exe file (set the
Then device to Server and choose the Run Command Line command).
There are three parts to a trigger command:
"If" - Specifies the message that will trigger the trigger command.
"Then" - Defines the command that will be sent. You can define more than one "Then" part for the
same trigger command - this allows the same "If" condition to trigger more than one command.
"When" - Specifies the time code that determines when the trigger command can be generated.
For a new trigger command, make sure that appropriate time codes have been set up ("Operation/Times/Time
Codes" screen). You can create groups of devices from the appropriate screen in "Setup/Device Groups".
You are able to set up trigger commands only for cards, devices, groups, and other items assigned to the
currently selected company. The installer defines the items that are assigned to each company.
You cannot send commands to individual auxiliary outputs or monitor points that are used to control and
monitor an elevator panel. Use the Floor Groups selection type to control access to elevator floor buttons.
Note: You must close the Selection screen before the system actions any new or changed trigger commands.
Troubleshooting
If you are not able to get a trigger command working, try the following:
In the trigger command definition, make sure that the time code is valid for the times you
want the trigger command to operate.
In the Options tab, make sure that command has not been disabled by the Validity Period
or Force Inactive.
Some alarms/events are not generated if the device is disabled (such as Monitor Point in
Alarm). Use the "Home/Monitoring/Command Center" screen to determine whether the
device is disabled.
If applicable, try changing the setting of Force action at in the Options tab of the trigger
command definition to specify whether to action the command at the node or Symmetry
server. If this corrects the problem, please contact your Technical Support Representative.
Monitor the "Home/Monitoring/Activity" or "Reports/History/Activity" screen to find out
whether the alarm/event that triggers the command is being generated.
Note: The alarm/event message may be disabled in the device definition screen (such
"Install/Access Control/Readers") or in the "Operation/Alarms/Definitions" screen. Either setting will
prevent the alarm/event message from being displayed in the Activity screen or in reports. If the
trigger command is actioned at the Symmetry server, the command should trigger successfully
irrespective of the setting in the"Operation/Alarms/Definitions" screen; it will not trigger if disabled in
the device definition screen. If the trigger command is actioned at the node, the command should
trigger successfully irrespective of the setting in the device definition screen.
Using the Selection screen
The Selection screen is displayed when you select Trigger from "Operation/Commands". You can use the
Selection screen to create a new trigger command or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
93
Trigger Commands Screen ("Operation/Commands/Trigger")
94
Symmetry Software Reference Manual
= Add Command
= Delete Command
When
Select the time code to be used from the Time Codes box, then click ">". The THEN command is
executed only when the IF message occurs between any pair of start and end times in the time code.
Alternatively, double-click the time code, or drag and drop it to the right-hand area.
The Type sub filter here field allows you to filter the items listed.
The area to the right gives a graphical representation of the time intervals defined by the time code. You
can use Modify/View to modify or view the selected time code (the option displayed depends on your
permissions), or New to create a new time code.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of time codes listed. An information message indicates when
there are unlisted time codes available that match Filter Time Codes (see below).
To remove the time code used, click "<" or drag and drop the time code to the Time Codes box.
Filter Time Codes
The Filter Time Codes field appears only if the number of time codes exceeds the value of
Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen.
95
Trigger Commands Screen ("Operation/Commands/Trigger")
You can use the Filter Time Codes field to list only those time codes whose name includes the text
you enter. For example, the time code named "ABC123" is listed if you enter "C1", or "AB", etc.
Enter the text and click to action the filter. Leave the field empty if you do not want to use a filter.
Type sub filter here
You can use this field to list only those time codes whose name includes the text you enter.
If Filter Time Codes is also displayed, Type sub filter here operates only on the results of the
Filter Time Codes filter.
Options Tab
From/To
The trigger command will be executed on and between the From and To dates only (subject to the on/off
periods defined in the selected time code). The day after the To date, the command will no longer operate
and its status changes to Expired. If you leave the To date blank, the command will operate for all dates
from the From date.
Force Inactive
Stops the command from being executed at all.
Activate at Threat Level
Select the threat level at which you want the command to become active.
Click here for examples and details of how this option operates with Deactivate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Deactivate at Threat Level
Select the threat level at which you want the command to deactivate.
Click here for examples and details of how this option operates with Activate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Report As
Determines whether the 'Trigger Operation' message generated when the command is executed should be
reported as an alarm, event or not at all.
An event simply records the message in the log file. You can use the "Home/Monitoring/Activity" screen to
view the contents of the log file.
An alarm displays the message in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screens, and also adds the message to the log file.
Note: The system may have been set up in the "Operation/Alarms/Routing" screen to prevent node or
system alarms from being displayed in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen.
96
Symmetry Software Reference Manual
Default
Selecting Default causes the command to be actioned from its normal location, which for commands
that affect access control equipment, is normally an access control node.
Server
Selecting Server causes the command to be stored and actioned from the Symmetry server. You
may want to select this option if, for example, you want a command to be actioned according to the
time at the server rather than the time in a node located on a LAN or dial-up chain.
The command is always executed from the server if, for example:
The "If" alarm/event message in a trigger command can be generated at a node that is
different from the node connected to the "Then" device.
The command (or the "If" message in a trigger command) relates to a reader group,
monitor group or auxiliary-output group.
The command relates to the use of a CCTV switcher unit. That is, if the command type
is Switcher Video, Switcher Ancillary or Switcher Alarm.
The IF alarm/event message is Duress.
The command relates to a door group to disable or enable door alarms.
Status
Shows the current status of the command, as determined by the Validity Period settings.
Actioned By
This shows where the command will be stored and actioned.
Copy/Delete/Notes/Apply/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Overview of this screen
An alarm instruction contains instructional information, such as "Call Duty Supervisor". You can use up to five
alarm instructions when using the "Operation/Alarms/Definitions" screen to specify what an operator should do
when acknowledging an alarm.
Each alarm instruction can be used in more than one alarm definition. This allows general alarm instructions
such as "Call Duty Supervisor" or "Call Police" to be used in many alarm definitions.
The instructions you set up in this screen are available when you are using the "Operation/Alarms/Definitions"
and "Operation/Alarms/Reporting" screens for the currently selected company.
You can format the text as required using the options in the toolbar. You can also insert tables and import files
(which can include text and graphics).
Using the Selection screen
The Selection screen is displayed when you select Instructions from "Operation/Alarms". You can use the
Selection screen to create a new alarm instruction or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
97
Alarm Instructions Screen ("Operation/Alarms/Instructions")
Font
Point size
Bold
Italic
Underline
Left justify
Right justify
Center justify
Bulleted list
Numbered list
Magnification
Highlight color
Text color
Right-click menu
The right-click menu allows you to:
Cut, copy and paste text, when text is selected.
Insert a table, when no text is selected (see "Table tools" below).
Modify or format a table, when the cursor is in a table (see "Table tools" below).
Insert or modify hyperlinks (see "Using hyperlinks" below).
Table tools
You can insert a table by right-clicking when no text is selected, and choosing Insert, Table. A dialog prompts
you to specify the number of columns, rows and other settings.
Right-clicking when the cursor is in a table and selecting Format Table displays a Table Properties dialog,
which provides options to configure properties such as line color, margins and cell height.
The Table Properties dialog also includes a Formulas tab. If the cursor is in a single cell, you can use the
Formulas tab to insert a formula into the cell. For example, the formula "SUM(A1 + A2)" would display the sum
of the cells A1 and A2 in the selected cell.
The table right-click menu also provides options for inserting and deleting rows and columns. You can even
insert a table into a table cell.
Note: The table options provided are similar to those available in Microsoft Word. For further information,
please refer to help available on the internet.
Using hyperlinks
If Create Hyperlink is selected in your user role (as configured in the Options branch of the "Maintenance/User
& Preferences/Roles" screen), you can use the Add a Hyperlink button to insert a hyperlink.
If Activate Hyperlink is selected in your user role (as configured in the Options branch of the
"Maintenance/User & Preferences/Roles" screen), you can activate hyperlinks in this screen. Users who
process alarms, such as in the "Home/Monitoring/Alarms" screen must have the same privilege to activate
hyperlinks in alarm instructions.
Import File
You can import the following file types:
.doc or .docx (Microsoft Word)
.txt (plain text file)
.htm or .html (HTML)
.rtf (Rich Text Format)
98
Symmetry Software Reference Manual
Note: Complex formatting may be lost when you save the alarm instruction.
Copy/Delete/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Overview of this screen
An alarm comment is one or more lines of text, such as "Intruder Apprehended". When acknowledging or
clearing an alarm, a user can select one of these standard comments or type a different comment using the
keyboard.
A comment can also be selected when:
Using the "Home/Monitoring/Controls" screen (available only with the Controls license).
Double-clicking an alarm\event message in the "Home\Monitoring\Activity" or
"Home\Identity\Verification" screen.
The comments you create will belong to the currently selected company.
When acknowledging a single alarm, the system makes available for selection only those comments that
belong to the same company that owns the device in alarm. The installer defines the devices that are assigned
to each company. If the alarm is not related to a device belonging to a specific company, all comments from all
companies will be displayed.
When acknowledging multiple alarms, the system makes available for selection all comments belonging to the
currently selected company.
When using the "Home/Monitoring/Controls" screen, you can use any comment that belongs to any company in
your company group.
If Alarm Comments Mandatory is selected in the "Maintenance/User & Preferences/Client Preferences"
screen, it is mandatory to select or enter a comment when acknowledging or clearing an alarm.
Using the Selection screen
The Selection screen is displayed when you select Comments from "Operation/Alarms". You can use the
Selection screen to create a new alarm comment or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
General
Overview of this screen
This screen enables you to associate a command with items such as monitor points, readers, intrusion areas
and intrusion transactions (as set up in the "Install/Intrusion/Intrusion/Device Configuration" screen). If the item
99
Alarm Commands Screen("Operation/Alarms/Commands")
generates an alarm, you can execute the associated command by clicking the Command button when
acknowledging the alarm.
You may, for example, want to associate a command that switches on the reception lights when there is an
alarm in an intrusion area named "Reception".
The screen enables you to access only those items assigned to the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Instructions from "Operations/Alarms". You can use the
Selection screen to create a new alarm instruction or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
The following option is specific to this Selection screen:
Select Alarm Type - Use this pull-down list before selecting Find. It allows you to choose the type of device
that you wish to find.
100
Symmetry Software Reference Manual
101
Alarm Routing ("Operation/Alarms/Routing")
Note: You can select more than one interval to delete, cut or copy by holding down the Ctrl key and left-clicking
on each interval.
102
Symmetry Software Reference Manual
Note: Priority 1 is the highest priority, and priority 999 the lowest. Therefore if, for example, you enter 15 in the
Priority field, alarms with a priority of 14 or below will be routed to the nominated destination.
Once an alarm has been sent to a nominated Symmetry client, it can be acknowledged at that client, or at any
other client that the alarm was previously sent to.
An alarm comment alarm is attached to any alarm routed by this feature. The comment reads as follows:
Client: <Client Name> failed to acknowledge alarm within <X> minutes
Alarm Escalated to Client: <Client Name><Time and Date>
The time and date show when the alarm was routed to the nominated destination.
Setup Tab
Use the Setup tab to specify the times to send alarms to the specified client.
Alarm Types Tab
You can use the Alarm Types tab to specify the types of alarms to send to the client. Each alarm has an alarm
type, as set in the "Operation/Alarms/Definitions" screen.
General
Overview of this screen
This screen enables you to configure settings for a device and alarm/event combination chosen in the Selection
screen. The settings include, for example, the reporting type (alarm/event/ignore) and alarm instructions.
You can configure settings differently for each device and alarm/event combination. For example, "Reader 1"
and "Reader 2" could have different settings for the same "At Wrong Door" alarm.
Overview of Settings
This screen enables you to specify the following for the device and alarm/event combination you have chosen
in the Selection screen:
Attributes such as the priority, color, sound and reporting type (alarm/event/ignore). The priority of an
alarm affects its order in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screen. You can configure default attributes in the "Operation/Alarms/Reporting" screen.
Note: Once you have chosen a device and alarm/event combination in the Selection screen, and
selected OK in the Definition screen, any changes you make to the default settings in the
"Operation/Alarms/Reporting" screen will have no effect on the settings for that device and alarm/event
combination. You can remove this override using the Reset button (see below).
103
Alarm Definitions Screen ("Operation/Alarms/Definitions")
screen are shown blank, since each setting may already have a different value for each item. If you enter a new
setting, it will be used for all of the items you have selected when you save changes.
This Selection screen lists those items that belong to the currently selected company and those that belong to
no company. The installer defines the items that are assigned to each company.
The following options are specific to this Selection screen. For details of general Selection options, click here.
Alarm Category
Choose the source of the alarm you want to set up.
The content of this menu depends on the licenses installed.
Alarm Type
Select the type of alarm to set up.
If Alarm Category is <Standard Alarms>, selecting Monitor Point Alarms or Reader Alarms enables
you to set up an alarm definition for a monitor point or reader alarm.
If you have the dial-out/dial-in alarms reporting license, the pull-down list includes Monitor Point Alarms
Dial Out and Reader Alarms Dial Out options. These enable you to set up an alarm definition for an
alarm displayed at an alarms-receiving (dial-in) site. If, for example, a reader generates an alarm, the
alarm definition created using the Reader Alarms option is used when displaying the alarm in your own
security management. The alarm definition created using the Reader Alarms Dial Out option is used
when displaying the alarm at an alarms-receiving site.
Alarm Condition Message
After using Alarm Type, use this pull-down list to select the alarm message, then select Find.
Click here for details of each message.
104
Symmetry Software Reference Manual
105
Alarm Reporting ("Operation/Alarms/Reporting")
If a graphic hierarchy has been defined, Display Lowest Graphic Level in the "Maintenance/User &
Preferences/Client Preferences" screen determines whether the highest-level or lowest-level graphic
containing the device is displayed.
Note: Selecting Show Graphic on any Alarm in the "Maintenance/User & Preferences/Client
Preferences" screen provides an alternative method of displaying the graphic when the device goes into
alarm. The Show Graphic on any Alarm option applies to all devices and overrides Display Graphic on
Alarm.
Send to communications receiver
This field is relevant only if a communications receiver is set up in the "Maintenance/User &
Preferences/System Preferences" screen.
For each message you want to send to the communications receiver, select Send to communications
receiver.
Instructions Tab
You can specify up to five lines of instructions for the alarm. Select the required instructions from the pull-down
lists. The instructions that appear in these pull-down lists are defined by the "Operation/Alarms/Instructions"
screen.
Email Tab
Use this tab if you want details of the alarm to be sent by email to a selected email recipient. The tab is also
available from the "Operation/Alarms/Reporting" screen. Click here for further information.
Reset
This button is displayed only if you have previously opened the selected device and alarm/event combination
and clicked OK (even if you made no changes). The presence of this button indicates that the settings in this
screen override the default settings configured in the "Operation/Alarms/Reporting" screen. Any changes you
make in the "Operation/Alarms/Reporting" screen will have no effect.
Clicking the Reset button removes the override and makes the settings the same as in the
"Operation/Alarms/Reporting" screen.
Note: Once you have selected a device and alarm combination in the "Operation/Alarms/Definitions"
screen, then selected OK in the Definition screen, any changes you make to the alarm type in the
"Operation/Alarms/Reporting" screen will have no effect on the settings for the device and alarm
combination in the "Operation/Alarms/Definitions" screen. You can remove this override by selecting the
device and alarm combination in the "Operation/Alarms/Definitions" screen and clicking the Reset option
near the bottom of the screen.
Specify whether messages are to be reported by the server as alarms, events or not at all and
whether they are to be printed in real time.
Alter the standard alarm/event messages displayed to the guard.
Specify guard instructions for node and system alarms.
106
Symmetry Software Reference Manual
Prerequisites
The Default Alarm Instructions must have already been created by using the "Operation/Alarms/Instructions"
screen.
Using the Screen
1. Using the Select Alarm Type pull-down list in the Selection screen, choose the type of message.
2. Select Find. A list of all alarm/event messages is displayed.
3. Select the message that you want to edit.
4. If required, use Previous and Next to move through the list of messages.
5. Make changes, as required.
6. Select OK to save any changes that you have made; otherwise, Cancel. If you do not select OK before
selecting Previous or Next, any changes you have made are lost.
What do the messages mean?
Click here for details of each message.
General Options
Type Selected
This is a display-only field, which shows the message type selected in the Selection screen.
Note: Communications Receiver transactions are for messages received from an intrusion communications
receiver. A communications receiver can relay messages to the Symmetry software for centralized alarm/event
reporting. Please refer to the Intrusion Management Installation and User Guide for further information.
Alarm Definition Selected
This is a display-only field, which shows the message selected in the Selection screen. You can press
Previous or Next to choose a different message, but any changes you have made are thrown away (select OK
to save the changes).
Current Alarm Condition Message
This is the text that appears to a guard instead of the text shown in Alarm Definition Selected. By default, the
two are the same.
Do not change the messages unless it is absolutely necessary, otherwise they will not match the messages
used in the online help.
You cannot change the message text for alarms/events relating to intrusion transactions (this can be carried out
from the "Install/Intrusion/Intrusion/Device Configuration" screen instead).
Tabs
Alarm Attributes Tab
Default Priority
This is the priority of an alarm. When using the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen, alarms of the same color (that is, status) are ordered according to their priority (1 is the
highest, 999 is the lowest). The value specified is a default for the priority set in the
"Operation/Alarms/Definitions" screen, and is appropriate only if the selected message is reported as an
alarm.
Note that in the "Operation/Alarms/Definitions" screen, you have the added flexibility of setting the alarm
priority of each individual monitor point used on this system.
Output to Printer
Select this option if you wish the alarm/event message to be printed in real time.
The alarms/events printed at a client depend on alarm routing, as set up in the "Operation/Alarms/Routing"
screen. If real-time printing is required at a client, Output Alarms/Events to printer must also be selected
107
Alarm Reporting ("Operation/Alarms/Reporting")
in the "Install/System/Clients" screen, and Enable Printing of Alarms/Events option must also be
enabled in the "Maintenance/User & Preferences/System Preferences" screen. Each client uses its default
Windows printer. Only those alarms/events set up for printing in the "Operation/Alarms/Reporting" screen
are printed in real time.
The printer used for real-time printing should be the dot-matrix type. Laser printers are unsuitable due to
their inability to use continuous stationery.
The account used by the "SymmetryServices" service must have permission to print. This can be tested by
logging in as the account, adding the printer in the Control Panel, and checking that you can print a
document from this account.
Color
This pull-down list enables you to choose the color of new alarms originating from the selected device, as
displayed in the "Home/Monitoring/Alarms", "Home/Monitoring/Activity", "Home/Video & Audio/Virtual
Matrix" and Acknowledge Alarm screens.
Selecting Automatic causes the default colors to be used, which are as follows:
Red = New alarm.
Blue = Acknowledged, but the device or condition has not been reset.
Green = Acknowledged, reset, but not cleared.
Changing the color does not affect the color of existing alarms displayed in the Symmetry screens.
Note that selecting a color will not affect the displayed time and date of an alarm displayed in the
"Home/Monitoring/Alarms", "Home/Video & Audio/Virtual Matrix" or Acknowledge Alarm screen. The time
and date are always displayed in the default color to enable the status of the alarms to be easily
determined.
The default colors of dial-out alarms cannot be changed.
Alarm Sound
Clicking on the Browse button enables you to select a sound (media wave file) for the alarm. The sound is
made when an alarm occurs at the specified device. If a media wave file has already been selected for the
alarm, its filename is displayed in the Alarm Sound box.
The sound you specify in this field is a default, which can be overridden for specific devices (such as
readers) in the "Operation/Alarms/Definitions" screen. If you do not select a media wave file, a client
default sound is used, if selected in the "Maintenance/User & Preferences/Client Preferences" screen.
Sounds for node and system alarms cannot be defined in the "Operation/Alarms/Definitions" screen.
Therefore, define sounds for node and system alarms here.
There are some useful "wav" files in the Program Data\Security Management System\Sounds folder.
The sound is stored in the database, but the Symmetry software also maintains a local copy in the
Program Data\Security Management System\Sounds folder, which it uses for performance benefits.
System to Report As
This specifies whether the message is to be reported as an alarm, event or not at all.
The "Install/Access Control/Reader", "Install/Access Control/Node" and "Install/Access Control/Monitor
Point" screens define whether each message is to be reported as an alarm, event or not at all at the
appropriate node. However, in this screen, you may define that the message is to be reported differently by
the server. For example, if it is important for a message to be sent immediately from a remote node to the
server, you would set up the message as an alarm at the node level (only alarms are sent immediately).
However, at the server level, you may want to report the message as an event only.
Note that the "Operation/Alarms/Routing" screen specifies the name of the client that alarms are sent to
and at what times.
Alarm Type
This option is available only if System To Report As is Alarm. You can use the menu to enter or select an
alarm type.
108
Symmetry Software Reference Manual
109
Custom Alarm Emails Screen ("Operation/Alarms/Custom Alarm Emails")
General
Overview of this screen
Note: This screen is available only if the CustomAlarmEmailsEnabled setting is set to 1 in multimax.ini (as
described in the Symmetry Software Installation Manual) and only if your role ("Maintenance/User &
Preferences/Roles" screen) allows access to this screen.
Use this screen if you want alarms that are imported into Symmetry to be automatically emailed to selected
recipients.
Alarms can be imported into Symmetry using the TxnImportTable, as described in the Data Connect Manual.
The Custom Alarm Emails screen acts only on records imported into TxnImportTable that have the "Alarm" field
set to 1 (to indicate an alarm).
If the details you set up in the screen (What, Where, First Name and Last Name) match the details in the
imported alarm, an email is sent to the recipient defined in the selected Email Profile. You can use the *
wildcard in the What and Where fields. Leaving a field empty means "match all" (the same as the * wildcard).
The fields are not case-sensitive.
Note: Symmetry can send emails only if you set up the "Operation/Alarms/Routing" screen to route email
alarms (that is, To Client is set to E-Mail Alarms). You can also configure the screen so that emails are sent
only on specified days or between specified times.
110
Symmetry Software Reference Manual
General
Note: This help topic is for the standard Data Import screen, which may not be available at all clients. If you are
importing Lucent\Avaya data, select the Help button in the Import screen to obtain help.
Note: This screen is not used to import alarm transactions from the import database. Alarm transactions are
automatically imported into the Symmetry transaction database.
SQL/Text Data
The import data can be provided in a text file or in a Microsoft SQL Server database, depending on the setting
of DataImportEnabled in the multimax.ini file. If you are using a Microsoft SQL database, Current Import File
and Current Visitor File will be grayed out, and Import Database Scan Period will be ungrayed. The reverse
is true if you are using a text file.
If a text file is being used, the data may have been generated from a third-party system or from the
"Operation/Data/Data Export" screen of another installation of Symmetry. In the latter case, both systems must
be running the same version of Symmetry. Different files are used for card holder and visitors (by default,
named Import.txt and VisitorImport.txt).
111
Data Import Screen ("Operation/Data/Data Import")
Note: The default location of a text file is in the Import subdirectory of the database components folder (by
default Program Data\Security Management System) on the server. You may notice other files in this folder,
such as Reader.txt and AccessCd.txt. These are automatically generated by the Symmetry software when you
add new readers or other data, and are read by the external system in order to populate Import.txt and
VisitorImport.txt with the correct information. These files are not read when you import data.
Screen Options
Immediate
Choose this option if you want to import the contents of the database immediately. The next automatic import (if
applicable) takes place after the period specified in Import Database Scan Period.
When you choose OK, a Status screen is displayed that shows the progress of the import process. If this is not
displayed, check Number of records to process.
Number of records to process
This shows the number of records in the SQL Server database or text file.
Current Import File
This is applicable only if the import data is in a text file. If you want to import card holders, use Browse to select
the file that contains the card holder details to import (for example, Import.txt).
Current Visitor File
This is applicable only if the import data is in a text file. If you want to import visitors, use Browse to select the
file that contains the visitor details to import (for example, VisitorImport.txt).
Import Database Scan Period
This is applicable only if the import data is a Microsoft SQL Server database. The option allows the data import
to be carried out automatically at regular intervals.
The time you specify is the time to the next automatic import and the time period between subsequent imports.
If you restart the Symmetry services running at the server (for example, by restarting the server itself), or start
an immediate import, the next automatic import takes place after the time period specified here.
A value of zero disables automatic imports.
112
Symmetry Software Reference Manual
General
About this Screen
This screen is available if you have purchased the Data Connect license. The screen enables you to export
details of card holders (excluding visitors) to an SQL Server database or text file, depending on the setting of
DataExportEnabled in the multimax.ini file.
Typically, SQL format is used to transfer card details to a third-party system. The text format is typically used to
transfer card details from one Symmetry system to another, provided Symmetry software is the same version
on both systems. Exported data in text format can be imported using the "Operation/Data/Data Import" screen.
The format of the exported data is fully detailed in the Data Connect Manual.
If the Data Connect option is installed, a new record is automatically added to the SQL database or text file
whenever a card holder is added, modified (in any way) or deleted. For a text file, Enable Export to Another
System must also be selected. Existing records in the SQL database or text file are not affected when exports
take place automatically.
You can export the details of all card holders manually by selecting Export All Records, then OK. This
overwrites the existing contents of the export database or text file.
All card holders are exported, irrespective of card status (active, inactive, expired or not yet valid), as specified
in the "Home/Identity/Card Holders" screen.
File created by text data export
If you export data using this method without specifying your own export filename, CreateImport.txt is
populated. If you specify the name of the export file in the "Operation/Data/Data Export" screen, both
CreateImport.txt and the specified file are populated.
Screen Options
Data To Export
Choose the details to export. The export data will contain a null field for any data item that has No selected.
Selecting No does not prevent a card-holder's details from being automatically exported if that information is
changed in the "Home/Identity/Card Holders" screen.
113
Archive Screen ("Operation/Data/Archive")
Note: A new record is exported automatically whenever a card-holder's details are modified in any way. For
example, setting Command Card Holder in a card holder's details will cause that card holders details to be
exported, even though the Command Card Holder setting is not included in the exported data and is not one
of the Data To Export options.
The Exempt checkboxes relate to are the executive card exemption options, as selected in the
"Home/Identity/Card Holders" screen.
Export All Records
Choose this option if you want to export the details of all card holders now. The existing contents of the SQL
database or text file are overwritten. The format of the export data is specified in the Data Connect Manual.
Delete All Export Records
Select this option, then OK if you wish to delete ALL records in the SQL database or text file now.
If you have selected Export All Records and Delete All Export Records , the deletion takes place first.
Extended Support
This option is available only if Multiple Cards is set in the "Maintenance/User & Preferences/System
Preferences" screen.
Choose this option if you want the RecordRequest field in the exported data to be set to 72 for any card holder
addition or modification. This allows card data to be imported more easily into a different system when card
holders can have multiple cards.
If the option is not set, values 0 and 1 are used for RecordRequest, as documented in the Data Connect
manual, and only the primary card is exported (the card shown first in the "Home/Identity/Card Holders"
screen).
Enable Export to Another System
If you want to enable automatic exports to a text file, select Enable Export To Another System. Deselecting
this option has no effect on being able to export details manually using Export All Records.
The specified file name is used for both automatic and manual exports to a text file. You can change the name
and location of the file by clicking on the button to the right of the text box and using the standard Windows
Save As dialog that is displayed.
Face and signature files used by a card holder's record are copied to the "Faces" and "Sigs" folders, which are
located in the same folder as the ASCII file created.
The option is available only if text exports have been selected during software installation.
Note: Data export is carried out by a background process. The file you specify may take a few minutes to
appear in the specified folder.
General
Introduction
An archive is a copy of the historical transaction data from the Symmetry database; that is, card transactions,
alarms, events, tasks and user activity. The archive is stored in bak file stored in a specified location.
Producing archives may be necessary to save important data, since data that is older than a specified number
of days is deleted automatically, as specified by Purge Daily Logs After in the "Maintenance/User &
Preferences/System Preferences" screen.
When producing a report, such as in the "Reports/History/Activity" screen, you can choose an archive as the
reporting source.
114
Symmetry Software Reference Manual
Depending on your requirements, archiving may not be required at all; old data may not be of any interest.
Using the Archive Screen
The Windows account used for the Symmetry services must have read and write permissions to the folder in
which the archive file is to be stored, and to the SQL Server backup folder, such as "Program Files
(x86)\Microsoft SQL Server\<instance name>\MSSQL\Backup". If you do not have access to the SQL Server
backup folder, the archive will not be saved to Archive Location.
The file copied to the archive location has the current date and time appended to its filename.
Screen Options
Archive Location
Choose the folder in which to store the archive. This must be a network drive. If you want to use a folder on the
current PC, select the folder under Network.
Period to Archive
This specifies the amount of the log that is to be archived. All information in the log that is dated between
Earliest Un-Archived Log and Archive Log End Date (inclusive) will be archived. Earliest Un-Archived Log
displays the earliest date in the log that has not been archived.
Normally, the interval between archives should be slightly less than the Purge Daily Logs After value set in
the "Maintenance/User & Preferences/System Preferences" screen. For example, if Purge Daily Logs is set to
90 days, archives should be taken every 89 days.
General
Introduction
The Backup screen allows you to take a backup of the data stored in the Symmetry Multimax, MultimaxTxn and
MultimaxTxnOps databases. The backup takes the form of a series of SQL "bak" files that include all
configuration settings, card details, card transactions, alarms, events, tasks and user activity stored in the
Symmetry database. The backup also takes a copy of multimax.ini in the ProgramData\Security Management
System folder.
The bak and ini files can be backed up to an external device using any appropriate third-party backup software.
In the unlikely event of a disk failure or other major problem, the bak files enable the Symmetry databases to be
restored, as described in the Symmetry Software Upgrade Guide.
Backups are also used when upgrading the Symmetry software.
Note: If you are using a Symmetry NVR, you must back up the NVR configuration folder separately and, if
required, the video repositories. There is a separate configuration folder for each NVR, the location of which
was specified during the installation of the NVR software. By default, the folder is located in
"ProgramData\Symmetry\NVR", but you can find out the path by opening the properties of one of the
"Symmetry NVR" services – the path to the configuration folder is shown as a parameter in the command line..
115
Directory Link Screen ("Operation/Data/Directory Link")
Note: All files in the Backup Location folder are deleted prior to the backup. This is to ensure that the disk
does not become full. If required, save the previous backup files to another drive before starting the backup.
Use the Immediate option to start the backup process immediately, or use the options in the Timed Backup
area to set up the backup to occur at a specified time on selected days.
The files copied to the backup location have the current date and time appended to their filenames.
If you are having difficulties with getting backups to run, it is likely that your permissions or system is not set up
correctly. Please refer to the Symmetry Software installation Manual for details.
Backup Recommendations
It is absolutely essential that backups are taken regularly. The recommendation is that the Timed Backup
option is selected, with the backup time set to 04:00. This will give enough time for processes that occur at
midnight to be completed, and for any remote sites (if applicable) to dial-in with the previous day's data. The
backup will then have a complete record of the activity up to the previous day. It is best to avoid a backup time
of 02:00, otherwise confusion may arise when the time is advanced or retarded according to the daylight-saving
dates.
Screen Options
Backup Location
Choose the folder in which to store the backup. This must be a network drive. If you want to use a folder on the
current PC, select the folder under Network.
Immediate
Select Immediate to start a backup when you select OK.
Timed Backup
Select Enabled if you want automatic backups to take place daily at a specified time on selected days.
General
Introduction
This screen is available only if a license for the "Directory/LDAP Authentication Module" is installed. The screen
allows you to:
Enable the module.
Specify details of a directory server and authentication.
Specify the method to be used to log on to the Symmetry software.
Screen Options
Enable
You can use this option to enable or disable the Directory/LDAP Authentication Module.
Enabling the module allows a user to log on to the Symmetry software using a Windows username and
password authenticated by a directory server. If Auto logon using Directory Single Sign On is selected, a
logon can occur automatically.
Active Directory Connection
116
Symmetry Software Reference Manual
General
Overview of this screen
This screen is available only if you have the Control Centers and Commend Control licenses. The enables you
to set up control centers for a multi-user Commend control system. A control center is a collection of one or
more control groups.
117
Control Group Screen ("Operation/Controls/Control Groups")
When you open the "Home/Monitoring/Controls" screen, you select the control center to monitor. This
determines the control groups that are being monitored, and hence the control (access) points.
Click here for an overview of setting up a Commend Control System.
Click here for an overview of multi-user Commend Control Systems.
Using the Selection screen
The Selection screen is displayed when you select Control Centers from "Operation/Controls". You can use
the Selection screen to create a new control center or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
General
Overview of this screen
A control group specifies a group of control points. Often, the control points in a control group have some
common purpose. For example, a control group may contain the following control points:
One named "South Entrance Gate" to open/close the main barrier/gate at the south entrance to the
site. Depending on company policy, this may be left permanently open during the day, and closed
only at night.
One named "Entry Barrier South Gate" to open/close an entry barrier at the south entrance to the
site. Depending on company policy, guard may decide to open or close this barrier for each
vehicle, following identity verification via an intercom and CCTV camera.
One named "Exit Barrier South Gate" to open/close an exit barrier at the south entrance to the site.
This may also be opened or closed for each vehicle.
One named "South Gate Lights" to switch lights on or off at the south entrance to the site.
When a guard selects a control point in the "Home/Monitoring/Controls" screen, the screen automatically
displays a control panel not only for the selected control point, but also for every other control point in the same
group. This gives the guard an immediate view of the status of every control point in the same group.
Each control point must belong to a control group. There can be up to four control points in the same control
group. A control point cannot belong to more than one control group. A control group belongs to the company
selected when the group is defined.
Click here for an overview of setting up a Commend Control System.
118
Symmetry Software Reference Manual
Note: You can use Default Monitor to specify the default positions of the control points in the
"Home/Monitoring/Controls" screen, even if the control point does not have a CCTV camera.
119
Control Point Definition Screen ("Operation/Controls/Control Points")
Introduction
Overview of this screen
This screen is available only with the Controls license. The screen enables you to set up the control points to
display in the "Home/Monitoring/Controls" screen.
A control point can be either an access point or an output point, as selected by Select Control Point Typein
the Selection screen.
An access point definition specifies the buttons to control, where applicable, a barrier (or other device), traffic
light, intercom and CCTV camera at the control point.
An output point definition specifies buttons to switch a device, such as a light, on and off at the control point.
The control points you set up in this screen can be used only for the currently selected company.
Click here for an overview of setting up a Commend Control System.
Using the Selection screen
The Selection screen is displayed when you select Control Points from "Operation/Controls". You can use the
Selection screen to create a new control point or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
The following option is specific to this Selection screen:
Select Control Point Type - Select whether you want to find/create an Access Point or Output Point.
120
Symmetry Software Reference Manual
Audio Control Inputs - If the inputs are provided by the control inputs on an I/O card of the
Commend Intercom System.
Access Control Inputs - If the inputs are provided by monitor points of an access-control node.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
121
Reports Menu
General
Overview of this screen
Use this screen to produce an activity report. An activity report contains details of previous events and alarms
stored in the log. Click Run when you are ready to produce the report.
Report Contents
If you choose to send the report to the screen (Destination is Screen), you can click an item listed
in the report to display further details about it in the lower area of the screen.
The report will display a Replay button if you select an alarm/event that has a tagged video clip
created using a Record Video command. You can select the button to replay the video clip. The
playback starts and ends a specified period of time before and after the time of the alarm/event.
In printed reports, the font size can be changed using the ActivityReportTxnFontSize setting in
multimax.ini.
The default maximum number of transactions displayed is 200,000. This can be reduced using the
ActivityHistoryMaxTransactions setting in multimax.ini (do not increase above 200,000).
When running the report to the screen, the report shows the last comment entered for each
alarm/event. Clicking the button displays all comments.
Associated Live and Associated Playback buttons are available if the alarm\event is from a device
that has associated cameras. You can use these options to display live or recorded video from the
cameras. For further information, please refer to "About Camera Views and Camera Device
Associations".
122
Symmetry Software Reference Manual
General
Overview of this screen
Use this screen to specify the information to include in the User Audit report. The report will contain details of
user actions within the screens of Symmetry. Select Run when you are ready to produce the report.
Note: If you are using a Central Card Handler client, the report contains details of user actions made from
Central Card Handler clients only. If you are using another type of client, the report excludes actions from
Central Card Handler clients, since the Card Handler database is separate from the normal regional database.
General
Overview of this screen
The report will contain details of the amount of time that card holders have spent on site. Use this screen to
specify the information to include in the Onsite Times report. Select Run when you are ready to produce the
report.
123
History Card Holders On Site Screen ("Reports/History/Cardholders Onsite")
General
Overview of this screen
You can use this screen to produce a report that will contain details of card holders or visitors whose last
successfully-used reader is in the selected reader group. Click OK when you are ready to produce the report.
General
Overview of this screen
Use this screen to specify the information to include in the patrol tours report. The report will contain details of
when patrol tours were started and completed and any infringements of the rules. Select Run when you are
ready to produce the report.
124
Symmetry Software Reference Manual
This screen is available only if the Guard Patrol Manager software is installed.
General
Overview of this screen
This report is for engineer use only, and enables the content of the system log to be examined. Select Run
when you are ready to produce the report.
Screen Options
Date and Time
Filter Each Day to Include
Include
Source
Destination
Clear
Run
Cancel
General
Overview of this screen
This report displays the date and time of each recording made by a Symmetry NVR.
Screen Options
By Company Group or By Company
Include
Destination
Clear
Run
Close
125
Global Status Report
General
Overview of this screen
This report is available only if a Symmetry Global Edition Head Office or Region license has been installed at
the Symmetry system you are using.
The report allows you to determine whether data set up locally has been synchronized successfully with the
head office/regions. You can use the report to determine what has been uploaded/downloaded and what is still
outstanding.
When generated at the head office, you can use the report to show details of any failed, outstanding and
successful card holder downloads to regions.
When generated at a region, you can use the report to show details of any failed, outstanding and successful
access code uploads to the head office.
Please refer to the Global Edition Installation and User Guide for an introduction to Global Edition.
Screen Options
Region (available only at the head office)
Select the region you want to report on, or select <All> to report on all regions.
Filter By (available only at the head office)
Card Number
Select this option if you want to choose the cards to include in the report by card number.
Leave the card number empty to report on all cards, or type a card number in the box. You can use
wildcards to report on a range of cards.
Card Name
Select this option if you want to choose the cards to include in the report by name.
Leave Last Name and First Name empty to report on all cards. If you want to be selective about the card
holders to include, type the last name and/or first name in the box. For example, if you want to find all card
holders who have a last name of Clarke, type Clarke in the Last Name box.
You can use wildcards if required.
Employee Reference
Select this option if you want to choose the cards to include in the report by employee reference.
Leave Employee Reference empty to report on all cards, or type an employee reference in the box. For
example, if you want to include all card holders who have an employee reference of Emp25, type Emp25
in the box.
You can use wildcards if required.
(Other options are displayed below Filter By, depending on the option you choose.)
Failed/Outstanding/Synchronized Items
Failed Items - Select to include items that Symmetry has failed to synchronize with the appropriate
regions/head office. A failed item may occur if, for example:
A card holder set up at the head office has personal data fields configured, but the personal data
titles have not been configured at the region.
A card holder is given multiple cards at the head office, but Multiple Cards is not selected in the
"Maintenance/User & Preferences/System Preferences" screen at the region.
Outstanding Items - Select to include items that Symmetry is yet to synchronize with the appropriate
regions/head office. This may be caused by a temporary loss of communications.
126
Symmetry Software Reference Manual
Synchronized Items - Select to include items that Symmetry has successfully synchronized with the
appropriate regions/head office.
Show Cards on Report (available only at the head office)
Select this option if you want to include the card number (as well as name) in the report.
General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.
Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.
Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.
127
Predefined Reports ("Reports/History/Predefined Reports")
There is no requirement for the PC that runs the report to have Symmetry Advanced
Reporting installed.
Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..
Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.
Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
128
Symmetry Software Reference Manual
If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able
to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.
129
Predefined Reports ("Reports/History/Predefined Reports")
The Report Run/End Time has no effect on other dates included in the report. The report will include
entries up to the report definition To Time for all other dates.
Example
Repeat Reporting Days
This specifies the reporting interval. If, for example, it is set to 7, the second report is generated 7 days
after the first, the third report is generated after another 7 days, etc. Specify a value of zero if you only
want the report to be generated once.
Deleting the report in the appropriate "Reports/Configuration/Predefined Reports" screen removes the
report from the system, which means that it can no longer be generated.
Include Previous Days
This determines the number of days that are included in the report. If, for example, it is set to 10, the report
will include the date that the report is generated and the previous 10 days. A value of 0 causes only the
date on which the report is generated to be included.
Start Time
Use this to specify the time of the earliest entry to include in the report for the earliest date in the report.
Example
Options:
Reporting Client
TheReporting Client pull-down list is available if you are setting up a scheduled report (that is, the
Scheduled Report Enable option is selected, and the Immediate Reporting Period Select option is not
selected). Select the client PC at which to run the scheduled report.
If you are producing an immediate report, it is sent to the screen that you are using, assuming that the
report destination is to the screen.
The Symmetry Client service must be running at the specified client for a scheduled report to be produced.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
Destination
Choose where to send the report. If you choose to send a scheduled report to the screen, it will be
displayed only on the specified client's screen.
If you send the report to a file, the Browse button becomes available, which enables you to choose the
report destination and file name.
A printer used for scheduled reports must be available to your Windows user account and to the account
running the client services. Log into Windows using the client services account and use the Control Panel
to add the printer, then do the same for your user account.
Email
If you have chosen to send the report by email, select the email profile that defines the destination email
addresses, as configured in the "Setup/Configuration/Email Profiles" screen. Only profiles that have a
default recipient are listed.
A single email profile can include a number of separate email addresses.
When you choose an email profile, the Format menu becomes available. For advanced reports, the report
format can be Adobe PDF, Microsoft XPS, HTML, Microsoft Word or Microsoft Excel. For activity and user-
audit reports, the report format can be TXT or CSV. For other reports, the format can be TXT only.
130
Symmetry Software Reference Manual
Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.
General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.
Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.
Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.
131
Predefined Reports ("Reports/History/Predefined Reports")
Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..
Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.
Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able
132
Symmetry Software Reference Manual
to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.
133
Predefined Reports ("Reports/History/Predefined Reports")
Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.
134
Symmetry Software Reference Manual
General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.
Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.
Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.
135
Predefined Reports ("Reports/History/Predefined Reports")
Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..
Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.
Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able
136
Symmetry Software Reference Manual
to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.
137
Predefined Reports ("Reports/History/Predefined Reports")
Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.
138
Symmetry Software Reference Manual
General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.
Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.
Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.
139
Predefined Reports ("Reports/History/Predefined Reports")
Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..
Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.
Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able
140
Symmetry Software Reference Manual
to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.
141
Predefined Reports ("Reports/History/Predefined Reports")
Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.
142
Symmetry Software Reference Manual
General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.
Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.
Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.
143
Predefined Reports ("Reports/History/Predefined Reports")
Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..
Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.
Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able
144
Symmetry Software Reference Manual
to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.
145
Predefined Reports ("Reports/History/Predefined Reports")
Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.
146
Symmetry Software Reference Manual
General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.
Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.
Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.
147
Predefined Reports ("Reports/History/Predefined Reports")
Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..
Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.
Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able
148
Symmetry Software Reference Manual
to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.
149
Predefined Reports ("Reports/History/Predefined Reports")
Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.
150
Symmetry Software Reference Manual
General
Overview of this screen
Use this screen to list the details of one or more cards.
You can choose to list all cards, or only those that satisfy a chosen filter (Filter By) and status (Select By
Status). The options in the scrollable areas in lower half of the screen enable you to specify the amount of
information to include in the listing.
You are able to produce listings only for the cards assigned to the currently selected company.
151
Access Listing Selection Screen ("Reports/Identity Reports/Access")
Card Active
Card Inactive
Card Lost
Card Expired
Advanced
Not Yet Valid
Options
Select each item that you want to include in the listing. Selecting/deselecting Include All selects/deselects all
items.
The PIN Code and IDS Code options are displayed only if Card Holder Show PIN Code is selected in your
user permissions, as set up in the "Maintenance/User & Preferences/Roles" screen.
Output to
Using the pull-down list, choose whether to send the report to:
The screen.
A file. A dialog is displayed when you run the report, which enables you to specify the report file
name and format. You can save the file as a text file or as a CSV file for use in applications such
as Microsoft Excel.
A printer.
One or more email addresses. The report is sent as a CSV file, which can be opened in applications
such as Microsoft Excel. A dialog is displayed when you run the report, which enables you to
specify the destination addresses, email subject and text. The email server settings can configured
using the "Setup/Configuration/Email Profiles" screen.
General
Overview of this screen
Use this screen to produce different types of access-rights listings.
If Card Holders by Company is selected in the "Maintenance/User & Preferences/System Preferences"
screen, you are able to produce listings of only those card holders, visitors, readers and groups that are
assigned to the currently selected company. If Card Holders by Company is not selected, the reports that list
card holders associated with a device or group will include card holders from all companies.
152
Symmetry Software Reference Manual
specify the destination addresses, email subject and text. The email server settings can configured
using the "Setup/Configuration/Email Profiles" screen.
Filter By
The Filter By menu enables you to select the range of people listed when you select Run. The following Filter
By options are available (other options are displayed below Filter By, depending on the option you choose):
Card Holders Who Can Access This Door
Cards Holders Associated with a Floor/Output Group
Cards Holders Associated with a Reader Group
Cards Holders Associated with a Timecode
Cards Holders Associated with an Access Code
Card Holders Associated with an Area
Cards Expiring Between Badge Date
Cards Expiring Between Inactive Date
Cards Unused For This Number of Days Prior to Today
Doors Which Can Be Accessed By This Card
Inc Advanced Rights
Set this option if you want the report to consider or include any advanced access rights.
Include Inactive Cards
Set this option if you want to list all cards, whether or not they are active (as defined in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen).
Visitor Cards
Select this option if you want to include visitor cards in the listing, as set up in the "Home/Identity/Visitors"
screen.
General
Overview of this screen
Use this screen to produce a report of current, previous or future visitors. You may, for example, want to run a
report that shows all the visitors expected today.
Visitors are set up in the "Home/Identity/Visitors" screen.
153
Global Access Report Screen ("Reports/Identity Reports/Global Access")
specify the destination addresses, email subject and text. The email server settings can configured
using the "Setup/Configuration/Email Profiles" screen.
Visitor Status
Today's Visitors
Pending Visitors
Active Visitors
Closed Visitors
All Visitors
Arriving and Departing
Use these options to list visitors whose possible dates on site (as specified by the arrival and departure dates in
the "Home/Identity/Visitors" Definition screen) include a date within the period defined by Arriving and
Departing.
If Arriving is blank, it means "any date up to the Departing date". If Departing is blank, it means "any date
after the Arriving date".
Sign In Date
Choose a date to list only those visitors who signed in on the specified date.
Sign Out Date
Choose a date to list only those visitors who signed out on the specified date.
Last Name and First Name
You can use these fields to be selective about the visitors to list. For example, if you want to find all visitors who
have a last name of Smith, enter Smith in the box before clicking Run.
You can use wildcards if required.
General
This screen allows you to find out information about Symmetry and how it has been set up. You can find out
information such as:
The operating system you are using, and the installed service pack level.
Supported Configuration - The number of clients, companies and readers your system supports.
Current Configuration - The number of readers, auxiliary outputs and other devices defined, the
date of the last backup and other useful information.
Clients - The devices attached to or controlled by each client.
Server - Database and other information relating to the server.
154
Symmetry Software Reference Manual
Screen Options
Expand
This button fully expands all contents of the currently-selected item in the tree view.
Collapse
This button fully collapses the currently-selected item in the tree view.
Info
When this button is pressed in, additional information about items is displayed in the tree. These items are
marked using the icon. For example, with the button pressed in, expanding a client in the tree displays the
client type and network name.
When the button is not pressed in, the additional information is not displayed in the tree.
Save
Click this button to save the information displayed in a text file. You are prompted to specify the filename and
folder in which to store the data.
Print
Select this button to print the currently displayed tree view.
General
Use this screen to produce a report of how a particular part of the system has been set up.
155
Predefined Activity Report ("Reports/Configuration/Predefined Reports/Predefined Activity")
General
Overview of this screen
(Click here to display the Selection screen help topic.)
General
Overview of this screen
(Click here to display the Selection screen help topic.)
156
Symmetry Software Reference Manual
General
Overview of this screen
(Click here to display the Selection screen help topic.)
General
Overview of this screen
(Click here to display the Selection screen help topic.)
General
Overview of this screen
(Click here to display the Selection screen help topic.)
157
Predefined Video Archive Audit Report ("Reports/Configuration/Predefined Reports/Video Archive Audit")
General
Overview of this screen
You can use this screen to define Video Archive Audit reports, which can be run from the
"Reports/History/Predefined Reports" menu. You can run the reports on an ad-hoc basis or automatically at
scheduled times and dates.
(Click here to display the Selection screen help topic.)
General
Overview of this screen
You can use this screen to produce a report of card holders who are or have been on site longer than a
specified period of time. You can configure the report to print automatically at a regular interval, such as every
hour.
The report lists all card holders who have been granted access by one of the readers in the Entrance Reader
Group and have not had a corresponding transaction within the specified time at one of the readers in the Exit
Reader Group.
Note: A report is not produced immediately you click OK. The earliest you can obtain a report is by setting
Report Interval to 0:30 - in this case, a report is generated at the next half past the hour, or on the next full
hour, whichever is the earliest.
The report is designed to be printed on a physical printer; it cannot be printed to Microsoft XPS Document
Writer.
By default, the report excludes card holders who have not been granted access for more than 30 days. This
period can be changed using the OnSiteBeyondLimitMaxDays setting in multimax.ini.
158
Symmetry Software Reference Manual
Note: The Symmetry services must run in a named account that has access to the printer. This can be tested
by logging into Windows as the account, adding the printer and checking that a document can be printed from
this account.
159
Setup Menu
General
Overview of this screen
A camera group is a group of one or more digital video cameras. Setting up camera groups is useful if, for
example, you want to be able to set up or send a command to several cameras in one operation, such as to
start recording at 06:00 and finish at 18:00.
Camera groups can be used in various screens where a single digital video camera can be selected. For
example:
"Home/Monitoring/Command Center"
"Operation/Commands/Scheduled"
"Operation/Commands/Trigger"
"Operation/Commands/Predefined"
"Setup/Graphics/Setup"
"Home/Monitoring/Graphics"
"Setup/Configuration/Threat Levels"
You can access only those camera groups that belong to the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Cameras from "Setup/Device Groups". You can use the
Selection screen to create a new camera group or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
Available Cameras
This box lists all of the digital video cameras that are owned by the currently selected company.
160
Symmetry Software Reference Manual
General
Overview of this screen
A reader group is a group of one or more card readers. They are used when defining access rights (such as in
the "Home/Identity/Card Holders" screen), and can be useful if you want to be able send a single command to
several readers at the same time.
The groups you set up in this screen can be used only for the currently selected company.
Note: The Permissions button in the "Install/Access Control/Reader" screen may have been used to prevent
you from accessing a reader. Similarly, the Permissions button may have been used when defining a reader
group to prevent you from accessing it.
161
Auxiliary Output Groups Screen ("Setup/Device Groups/Auxiliary Outputs")
General
Overview of this screen
An auxiliary group is a group of one or more auxiliary outputs. Such a group is useful if you want to be able
send a single command to several auxiliary outputs at the same time.
The groups you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Auxiliary Outputs from "Setup/Device Groups". You can
use the Selection screen to create a new auxiliary output group or to find an existing one to edit. Click here for
an overview of Selection screens and how to use them.
162
Symmetry Software Reference Manual
General
Overview of this screen
A monitor group is a group of one or more monitor points. A monitor group is useful if you want to be able send
a single command to several monitor points at the same time.
The groups you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Monitor Points from "Setup/Device Groups". You can use
the Selection screen to create a new monitor group or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
163
Intrusion Areas Screen ("Setup/Device Groups/Intrusion Areas")
General
Overview of this screen
This screen is used to set up intrusion areas for M2150 intrusion systems.
Note: You can use the Permissions button to allow only selected user roles to arm and/or disarm the area
from the Symmetry software. You can assign separate arm and disarm privileges for each user role.
Note: A card holder with valid area and reader access rights can disarm the area that the reader belongs to
and gain access simply by presenting the card to the reader.
Using the Selection screen
The Selection screen is displayed when you select "Setup/Device Groups/Intrusion Areas". You can use the
Selection screen to create a new intrusion area or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
164
Symmetry Software Reference Manual
165
Intrusion Areas Screen ("Setup/Device Groups/Intrusion Areas")
Options Tab
Entry/Exit Timer Running
The selected auxiliary output is on when:
The entry timer is running.
The exit timer is running.
Area Armed
The selected auxiliary output is:
On when the area is armed and all zones are in their normal state.
Flashing when the area is armed and at least one zone has been disabled or
bypassed.
Off when the area is not armed.
Area in Alarm
The selected auxiliary output operates when the area has an "Area in Alarm" alarm. The auxiliary
output returns to its normal state when you send a "Reset Area To Normal" command from the
"Home/Monitoring/Command Center" screen or when you disarm the area.
Note: A zone tamper causes an alarm when the area is armed.
Area Pre-arm
When enabled, all arming/disarming readers in the area emit a sound during the pre-arm period of a
scheduled auto-arm of the area.
Optionally, you can also choose an auxiliary output to switch on during the pre-arm period.
The Warning Time field specifies the duration of the selected area's pre-arm period.
Sub Graphic to Display
You can associate a graphic with the area.
Associating a graphic with the area causes the Symmetry software to display the graphic when you
double-click the area icon one level higher in the graphic hierarchy.
Arm/Disarm Warnings Tab
You can use this tab to specify the periods when the intrusion system is expected to have a disarmed
state. The start time of the selected time code determines the time when the area should be disarmed. The
end time determines the time when the area should be armed.
The purpose of the tab is to enable the alarm/event messages selected in the lower area of the tab to be
generated automatically if the system is not in the expected armed/disarmed state.
The area below the menu gives a graphical representation of the time intervals defined by the time code.
You can use Edit/View to view or modify the selected time code, or New to create a new time code.
Late to Disarm
Generates the Area Late to Disarm alarm/event message if the area is disarmed too late. A period of
grace is allowed, in which the area can be disarmed after the specified time. This period is given
under the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in the
"Maintenance/User & Preferences/System Preferences" screen.
Late to Arm
Generates the Area Late to Arm alarm/event message if the area is armed too late. A period of
grace is allowed, in which the area can be armed after the specified time. This period is given under
the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in the "Maintenance/User &
Preferences/System Preferences" screen.
166
Symmetry Software Reference Manual
Armed Early
Generates the Area Armed Early alarm/event message if the area is armed too early. A period of
grace is allowed, in which the area can be armed before the next specified time. This period is given
under the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in the
"Maintenance/User & Preferences/System Preferences" screen.
Disarmed outside normal period
Generates the Area Disarmed Outside Schedule alarm/event message if the area is disarmed too
early. A period of grace is allowed, in which the area can be disarmed before the next specified time.
This period is given under the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in
the "Maintenance/User & Preferences/System Preferences" screen.
Common Areas Tab
You can use this tab to define a common area, such as a lobby or other part of the building that people can
use to access several other areas.
By selecting areas in this tab, you are declaring that the area you are defining is a common area serving
the selected areas.
A common area is automatically armed when the last area that is accessed through the common area is
armed.
Reporting Tab
This tab specifies whether each message causes an alarm, event or is not reported at all at the node.
Note: Alarms are reported as events when the intrusion node is in maintenance mode.
This specification is at the node level, not at the server level. Therefore, although you may define a
message as an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the
message is to be reported as an event by the server. Such an approach may be needed if it is important
for a node on a remote site to communicate the message to the server immediately (only alarms are sent
immediately to the server).
In addition, note that the "Operation/Alarms/Routing" screen may block node alarms from being displayed.
See Alarm/Event Messages for details of each message.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Please refer to the overview of this screen for additional information about the Permissions button.
Report
Selecting this button enables you to generate an intrusion areas report. Click here for further information.
General
You can use this screen to create floor groups and output groups.
Note: The groups you set up in this screen can be used only for the currently selected company.
167
Intercom Group Screen ("Setup/Device Groups/Intercoms")
Note: M2100 elevator nodes can be used to control more than one cab, and there is one elevator reader per
cab. If the reader you choose is connected to an M2100 elevator node, the reader is for cab 1. Additional
reader menus are displayed for cabs 2, 3 and 4 (if applicable).
For an output group, select the card-relay reader; that is, the reader from which the auxiliary outputs will be
activated.
Only those readers that have been assigned to the currently selected company are available (as defined by the
installer).
Available Floors
This box lists the available floors or outputsthat are not yet in the group. A floor or outputcan be in more than
one group. Each floor corresponds to an auxiliary output that enables the appropriate floor-selection button at
the elevator control panel.
Only those floors and outputsthat have been assigned to the currently selected company are available (as
defined by the installer).
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500).
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Assigned Floors
This box lists the floors or outputsthat are in the group. Each floor corresponds to an auxiliary output that
enables the appropriate floor-selection button at the elevator control panel.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Overview of this screen
This screen is used when setting up a Zenitel Pulse or Stentofon Alphacom intercom system.
The screen enables you to define groups of intercoms. The groups can be used in:
The "Home/Video & Audio/Intercom Control" screen (for Stentofon Alphacom) or "Home/Video &
Audio/Intercom" screen (for Zenitel Pulse) to display intercom buttons for only those intercoms in a
selected group, rather than all intercoms.
The "Reports/History/Activity" and "Reports/Configuration/Predefined Reports/Predefined Activity"
screens to report alarms/events from only those intercoms in a selected group.
168
Symmetry Software Reference Manual
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Using the Selection screen
The Selection screen is displayed when you select Intercom from "Setup/Device Groups". You can use the
Selection screen to create a new intercom group or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
General
Overview of this screen
A shared reader group is a group of one or more readers that a company is allowed to use, but does not own.
Shared reader groups are used in the same way as reader groups to define access rights (such as in the
"Home/Identity/Card Holders" screen).
You can access only those shared reader groups that belong to the currently selected company.
169
Shared Reader Group Screen ("Setup/Device Groups/Shared/Shared Readers")
When creating a shared reader group, it can include only those readers that belong to the currently-selected
company.
Note: The Permissions button in the "Install/Access Control/Reader" screen may have been used to prevent
you from accessing a reader. Similarly, the Permissions button may have been used when defining a shared
reader group to prevent you from accessing it.
170
Symmetry Software Reference Manual
General
Overview of this screen
When setting up access rights (such as in the "Home/Identity/Card Holders" screen), there may be a
requirement to include access to floors belonging to another company. In this case, the company that owns the
floors must create a shared floor group. The shared floor group specifies the floors that the owning company is
allowing another specified company to access. Once the shared floor group has been set up, it can be included
in the access rights of anyone belonging to the nominated company.
Click here for an introduction to floor groups.
You can use this screen to access only those shared floor groups that belong to the currently selected
company.
When creating a shared floor group, it can include only those floors that belong to the currently-selected
company.
Note: The Permissions button may have been used when defining a shared floor group to prevent you from
accessing it.
Note: M2100 elevator nodes can be used to control more than one cab, and there is one elevator reader per
cab. If the reader you choose is connected to an M2100 elevator node, the reader is for cab 1. Additional
reader menus are displayed for cabs 2, 3 and 4 (if applicable).
All elevator readers belonging to the currently selected company are included in the pull-down list.
Available Floors
This box lists all of the floors that are not yet in the shared group.
Initially, the box lists all floors that are attached to the same node as the Associated Reader and belong to the
currently selected company.
The same floor can be in more than one shared group.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
171
Badge Designer Screen ("Setup/Identity/Badge Designer")
Assigned Floors
This box lists the floors that are in the shared group.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Purpose of Badge Designs
A badge design specifies the type of information to include on a badge and where to position this information.
For example, it could specify where to position the card holder's name, expiry date, company logo and card
holder's picture on badges that may be used for identity or access control purposes. If required, you can create
badge designs for badges that have graphics and/or text on both sides.
A badge design can specify the location of a magstripe or chip. You can encode a badge using a suitable
magstripe encoder or a combined printer and magstripe encoder.
A badge design can also specify default normal access rights. These are automatically assigned to anyone who
is given the badge design in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Badge designs are either for use in the "Home/Identity/Visitors" screen or in the "Home/Identity/Card Holders"
screen, depending on the setting of the Visitor Badge option.
The badge designs you set up in this screen can be used only for the selected company.
Using a Badge Design
The Badge option in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen allows you to specify
the particular badge design to use for the person, then to print the badge on the badge printer. If you are using
magstripe cards and your printer also has a built-in encoder, you can also encode the card number and other
data onto the badge. Alternatively, you can encode the badge separately. You can encode a smart card using
the Encode button in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
You can print (and optionally encode) a series of badges in one operation by using the "Home/Identity/Print
Badges" screen.
When you print the badge, database information such as the person's name and card number, is automatically
inserted into the appropriate locations on the badge as specified by the badge design.
Tools Options
The Tools options of the Badge Designer allow you to draw or place down objects, such as rectangles, text and
pictures, on the badge.
The Card Data tool is the tool you use to define the position of text that varies for each person, such as the
person's name. This variable information is inserted automatically when you print the badge.
Double-Sided Badge Designs
You can toggle between designing the top and bottom sides of the badge by selecting View/Change Side.
Note: Your printer must support double-sided printing if you want to use double-sided badge designs.
172
Symmetry Software Reference Manual
Note: The correct paper size must be set up in the printer settings to ensure that the printer does not apply the
clear overlay over the chip or magstripe. This should have been set up during software installation, but can be
changed by using the Print/Print Setup option (for a temporary change) or from the printer settings in the
Windows Control Panel (for a permanent change). For further details, please refer to the help for the Print
Setup screen.
Selection Screen
Using the Selection screen
You can use the Selection screen to create a new badge design or to find an existing badge design to edit.
Click here for an overview of Selection screens and how to use them.
173
Badge Designer Screen ("Setup/Identity/Badge Designer")
When you copy a badge design to a different company, all personal data associations are mapped according
their order. For example, consider a system that has two companies, where the first field in the
"Setup/Identity/Personal Data/Card Holder Titles" screen is Car Reg for Company1 and First Name for
Company2. If you copy a badge design from Company1 to Company2, any Car Reg fields in the badge will
hold First Name data for Company2.
Badge Expiration
Choose the expiry period. When the badge design is allocated to a card holder or visitor (using the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen), the card will remain valid for the specified
period of time from the card's Active date.
Once expired, a card cannot be used to gain access, irrespective of access rights.
Use the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen to view the date on which a card
expires.
Default Badge
Select this option if you want the badge design to be used as the default badge design.
A different default can be set up for visitors ("Home/Identity/Visitors" screen) and card holders
("Home/Identity/Card Holders" screen). If both Default Badge and Visitor Badge are selected, the badge
design is used as the default for all new visitors. If you select Default Badge and Visitor Badge is not
selected, the badge design is used as the default for all new card holders.
There can be only one default badge design for visitors and one for card holders. Selecting Default Badge
causes the setting to be automatically removed from any other badge design of the same type.
Visitor Badge
If you select this option, the badge design will be for use only in the "Home/Identity/Visitors" screen. If the
option is not selected, the badge design will be for use only in the "Home/Identity/Card Holders" screen.
This option is grayed out if the badge design has already been used in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
Default Printer
Specify the default printer to be used for the badge design. This allows different badge designs to be easily
printed on different printers. All printers set up in Windows for your PC are displayed in the menu.
You can override the default when printing a badge.
174
Symmetry Software Reference Manual
Tools
Select
This option allows you to select an option (you should not normally need to use this option).
Card Data
Add Field
Use this option to specify the position of textual information that will be inserted automatically when
the badge is printed.
1. Select Tools/Card Data/Add Field.
2. You must first create a rectangular frame to enclose the text. At one of the required corner
points of the frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button.
5. <Undefined> is displayed in the frame. To choose the type of data to include, use the Visitor
Details, Card Details or Personal Details option, which are accessible from the Tools/Card
Data menu or from the frame's right-click menu.
Card Details
Use the Card Details option to specify the type of card information to include in a selected database
field object. The information is added on a per-person basis when you print the badge. The
information is obtained from the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Personal Data/Details
Use this option to specify the type of card-holder personal information to include in a selected
database field object. The information is added on a per-card holder basis when you print the badge
from the "Home/Identity/Card Holders" or "Home/Identity/Print Badges" screen. The personal data
titles shown are defined in the "Setup/Identity/Personal Data/Card Holder Titles" screen.
The option is grayed out if no titles have been specified, or if Visitor Badge is selected.
Visitors (Visitor Details)
Use this option to specify the type of visitor information to include in a selected database field object.
The information is added on a per-visitor basis when you print the badge from the
"Home/Identity/Visitors" or "Home/Identity/Print Badges" screen.
The option is grayed out if Visitor Badge is not selected.
You can select any visitor personal data title defined in the "Setup/Identity/Personal Data/Visitor
Titles" screen, or any of the following from the "Home/Identity/Visitors" screen (not available at
Central Card Handler clients.):
Representing - The organization the visitor is representing.
Vehicle - The visitor's vehicle license number.
Arriving - The visitor's expected arrival date.
Departing - The visitor's expected departure date.
Visiting - The name of the card holder the visitor is visiting.
Contact Number - The contact number of the card holder the visitor is visiting.
Text
Use this option to enter text that does not alter for each person. For example, the text "Name:", which may
precede variable text that you have placed down using the Database Field tool.
1. Select Tools/Text/Add Text.
175
Badge Designer Screen ("Setup/Identity/Badge Designer")
2. You must first create a rectangular frame for the text. At one of the required corner points of the
frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button.
5. To type the text, use the Text option, which is accessible from the Tools/Text menu or from the
frame's right-click menu
Image
Use this option to include a bitmap or JPEG picture on the badge, such as a company logo. The picture
does not alter for each person.
1. Select Tools/Image/Add Image.
2. You must first create a rectangular frame for the picture. At one of the required corner points of the
frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button.
5. To choose the image to include, use the Import File option, which is accessible from the
Tools/Image menu or from the frame's right-click menu. The Tools/Image/Transparent option
allows you to make a selected color of the image transparent, so that objects behind the image
show through.
Face
Use this option to specify the position and shape of the person's picture. The picture is inserted
automatically when you print the badge.
1. Select Tools/Face.
2. You must first create a rectangular frame for the picture. At one of the required corner points of the
frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button. A cross appears in the frame.
The aspect ratio of the frame is fixed; adjusting the width or height causes both dimensions to be changed.
Signature
Use this option to specify the position and shape of the person's signature. The signature is inserted
automatically when you print the badge.
1. Select Tools/Signature.
2. You must first create a rectangular frame for the signature. At one of the required corner points of
the frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button. A cross appears in the frame.
5. The Tools/Image/Transparent option allows you to make the background transparent, so that any
colored objects behind the signature show through.
Line
Select this to draw a straight line.
1. Select Tools/Line.
2. At the required start point, click and hold down the left-hand mouse button.
176
Symmetry Software Reference Manual
Note: You can perform the same action by clicking the right-hand mouse button in white space.
By convention, if you are using badges that have a magstripe, you should place the magstripe on the rear
side. If you are using smart cards, it is normal to place the chip on the front side.
Note: The correct paper size must be set up in the printer settings to ensure that the printer does not
apply the clear overlay over the chip or magstripe. This should have been set up during software
installation, but can be changed by using the Print/Print Setup option (for a temporary change) or from
the printer settings in the Windows Control Panel (for a permanent change). For further details, please
refer to the help for the Print Setup screen.
Format
Alignment
You can use the options to align the selected items.
Border
Use this option to change the thickness or color of the border of a selected object.
Fill
Select Transparent to make the object transparent (except its border). Select Fill Color to change the
selected object's fill color.
Order
Each time you add a new drawing object, it is placed above the last object added. You can rearrange the
order of the objects by using the following options:
Bring to Front - This brings the selected object to the top, on top of all other objects.
Bring Forward - This brings the selected object up one position.
177
Badge Designer Screen ("Setup/Identity/Badge Designer")
Send to Back - This sends the selected down to the bottom, below all other objects.
Send Backward - This sends the selected object down one position.
Rotatation
Use this option to rotate an item. Choose the appropriate angle of rotation, or choose the currently-
selected angle to return the item to its normal orientation. The rotation angle is always clockwise from the
normal orientation.
You cannot rotate lines, rectangles or ellipses.
Font
Font
Use this option to specify the font to use for the text inside the selected frame.
Alignment
Use this option to specify where to position the text in the selected box.
Choose Left, Center or Right to determine the position of the text in the horizontal direction.
Choose Top, Middle or Bottom to determine the position of the text in the vertical direction.
Choosing Word Wrap causes the text to wrap around onto the next line (at the next word break) if the box
is too narrow. If Word Wrap is not selected, all the text will not be visible if it is too long to fit on a single
line. Word Wrap is not available if the text has been rotated.
Size To Fit
If you choose Size to Fit, the font size is adjusted automatically to allow the text to fit neatly inside the
frame. In the case of database field text, the font size is adjusted at the time of badge printing to allow for
the actual text inserted.
View
Zoom
Select this option to zoom in or zoom out of the badge design you are designing.
Change Side
For double-sided badge designs, you can toggle between designing the front or back of the badge by
selecting View/Change Side.
For further details, please refer to Double Sided Badge Designs near the top of this help topic.
Item
Labels
Select this option if you want to display the names of objects, such as rectangles, database fields,
etc.
Frames
Some objects, such as text, can have a border, and this can be set to zero. If Frames is selected,
the border of any object set to zero is highlighted by a thin gray line, although it will not be printed.
This allows you to determine the limits of each object.
Grid
Grid
Select this option to switch on or off the displaying of the grid lines.
Snap to Grid
Select this option if you want the ends or corners of the objects you draw or move to snap to the grid
points. The grid is set up using the Tools/Card Format/Card Layout option.
178
Symmetry Software Reference Manual
Right-Click Options
Note: The right-click options operate on only one object. To keep the interface easy to understand, do not select
multiple objects before right-clicking. If you right-click in an area that contains overlapping objects, a menu prompts
you to choose the item to operate on.
Most of the options in the right-click menus are available from the ribbon bar. The following options are not available
from the ribbon bar:
Rename
Enables you to rename the object.
Delete
Deletes the selected object.
Rule
Selecting this option displays a screen that enables you to set up a rule for hiding or showing the object based
on the values assigned to one or more personal data titles.
Any object that has a rule, is marked with a red dot in its bottom-right corner.
Introduction
Purpose of this screen
This screen enables you to define, run, monitor and reset musters. You can define a new muster using the New
button or open an existing muster by selecting it in the Selection screen and clicking Open.
About Musters
Musters are used to determine the total number of card holders and visitors in defined areas of your site, and to
find out the names and details of the people in those areas. Musters may be of use during a fire or other
emergencies to assist the emergency services, or simply to determine the people located in specific areas.
You can set up multiple musters for different areas of your site. An area can overlap other areas, be entirely
contained within another or be completely separate.
When you start a muster, it generates a Card Holders in Area muster report, which lists the names of all card
holders who are in the area. You can set the muster report to repeat automatically at specified intervals until
there is no-one left in the area. The Selection screen lists the status of each muster and the number of card
holders who are in the muster's area.
When defining a muster, you specify an Area Reader Group. This determines the area covered by the muster.
Any card holder or visitor who last used a reader in the Area Reader Group and was granted access is
regarded as being in that area. As soon as a person uses a reader that is not in the reader group, he or she is
removed from the area.
Note: Musters can report accurate information only if there is proper controlled entry to areas, such as using
turnstyles and antipassback rules.
Starting a Muster
You can start a muster manually using the Start button. Alternatively, you can set up a muster to start
automatically when a monitor point is triggered. You can start one or more musters at the same time.
179
Muster Definition Screen ("Home/Identity/Muster")
Note: If you wish to send muster reports to a printer, the Symmetry services must run in a named account that
has access to the printer.
Note: For the purposes of the mustering, there is no difference between performing a transaction at muster
reader and at any reader outside the Area Reader Group. However, since muster readers are not normally
included in an Area Reader Group, performing a transaction at a muster reader will not normally cause the
card holder to be added to a different area.
180
Symmetry Software Reference Manual
Monitoring Progress
You can monitor the progress of each muster by using the Selection screen. This screen gives an immediate
view of the number of people left in each area.
Resetting the Muster
When a muster is over, it must be reset. There are several ways to reset a muster:
It can be reset automatically when the number of people in the area reaches zero.
It can be reset automatically when a specified monitor point is active. Depending on the reset rule
selected, the number of people in the area may need to be zero.
You can reset the muster manually using the Reset button in the Selection screen. If there are still
people in the area and the Allow selected Cards from Muster Area during Muster Reset
checkbox is selected (see below), a dialog is displayed that lists the people who are still in the
area. The dialog allows you to select people to remove from the muster before you reset it. If you
re-run the muster immediately, any person you have chosen to remove will not be included in the
new muster report (unless they have re-entered the area using a card transaction). If the checkbox
is not selected, the Reset button resets the muster and no one is removed from the muster.
The Reset Options in the muster definition allow you to choose the location of cards after the reset, and
whether to set cards to neutral for antipassback.
Multi-Company Installations
Muster reports are company based. If your company group contains more than one company, you need to
select the company before setting up or running a muster report.
Selection Screen
About the Selection Screen
The Selection screen is displayed when you select Muster from "Home/Identity". You can use the Selection
screen to create a new muster or to find an existing one to edit. Click here for an overview of Selection screens
and how to use them.
Note: You cannot make changes to an existing muster report that is running or requires a reset.
181
Muster Definition Screen ("Home/Identity/Muster")
Run at Client
This is the name of the Symmetry client that is to monitor the muster and produce the muster report.
Last Run Time
This shows the date and time of when the muster was last started.
Status
The status can be:
Never Run - The muster has not been previously started.
Monitoring - The muster has been started and is not yet finished.
Completed - The muster was started and was reset.
Awaiting Reset - The muster was started and the number of people in the area is zero. The muster is
awaiting a reset. If a card holder or visitor re-enters the area, the status returns to Monitoring and a report
is generated.
Initial Card Count
This shows the number of cards in the area when the muster was started.
Cards in Area
This shows the current number of cards in the muster's area. This may be greater than Initial Card Count
if new cards have entered the area.
Definition Screen
Description
Enter an appropriate name that reflects the area that is to be reported by the muster report. For example,
"Building 1".
Area Reader Group
The selected reader group determines the people who will be listed in the muster report.
A person is included in the report if the last reader the person used is in the Area Reader Group. As soon as a
person uses any reader that is not in the selected reader group, that person is removed from the next report.
For further information, please refer to "People Included in an Area" (above).
Muster Reader/Group
Use this menu if you have readers installed at muster points specifically for the purposes of mustering.
The menu lists all reader groups that belong to the currently-selected company, with the exception of the reader
group selected in Area Reader Group. The menu also lists all readers that belong to the company if Include
Readers is selected.
Selecting a reader or reader group from the menu nominates the reader or all of the readers in the group to be
muster readers.
Please refer to "Muster Readers" (above) for further information.
If you are not using muster readers, use the default <None> option.
Include Readers
Selecting this option causes the Muster Reader/Group menu to include readers as well as reader groups.
Auto Start when Alarm Received from Input
This option is available only if you have selected a named Symmetry client computer in Run at Client.
You can use the option to select a monitor point, which if triggered, causes the muster to start automatically at
the selected client. The monitor point may, for example, be triggered by a fire alarm.
You can choose any monitor point, irrespective of the company it belongs to.
182
Symmetry Software Reference Manual
If you select this option, it remains possible to start a muster report manually from the "Home/Identity/Muster"
screen at the nominated client or at a different client.
Report Options
Group by Personal Data
Selecting a personal data title causes the muster report to be subdivided according to the title chosen. For
example, if you select a personal data title of Department, the report will be presented by department, with
head-count totals for each department.
Visitors are grouped together near the top of the report, irrespective of the Group by Personal Data
setting.
New Page per Item
Selecting this option causes each personal data title to start on a new page. For example, if Group by
Personal Data is Department, each department in the report will start on a new page.
Sort Report by
If you select Card Holder Name, people included in the muster report are listed in name order.
If you select Card Holder Number, people are listed in order of ascending card number.
Include
You can use this menu to select a personal data title to include as an additional column in the muster
report. For example, if you choose a personal data title named "Gender", the report will contain a column
titled "Gender". In this case, the report will display the gender of each card holder, as specified in the
"Home/Identity/Card Holders" screen.
This menu contains a list of all personal data titles defined for the currently-selected company. These are
set up in the "Setup/Identity/Personal Data/Card Holder Titles" and "Setup/Identity/Personal Data/Visitor
Titles" screens.
Exclude Card Holders in the area longer than
You can use this option to exclude card holders who have been in the area defined by Area Reader
Group longer than a specified number of hours. This is to allow for card holders who have left the area
without presenting a card to a reader outside of the area.
Note: If an area is contained within another, the muster definitions for both areas should use the same
Hours value. This is to avoid a potential discrepancy between the number of card holders reported in each
area.
Output Options
Run at Client
Use this option to choose the Symmetry client that is to monitor the muster and produce the muster report.
If you select <Initiating Client>, the software runs at the Symmetry client where it is started.
Primary Destination
Specify whether to send muster reports to the screen or printer. Do not print to any destination other than
screen or printer, as there may be undesirable consequences.
The printers listed in the menu are those that have been installed at the client you are using. If you have
opened an existing muster definition and the client you are using does not have the selected printer
installed, the printer name includes the suffix "(Not Installed on this Client)".
If the selected printer does not exist on the specified client, the client attempts to use the default printer.
If a muster is configured to appear on the screen and the user logged into the Symmetry software has no
privileges to view the muster (such as using the Permissions button), the report is not displayed.
The report is displayed or printed by the client specified by Run at Client.
183
Muster Definition Screen ("Home/Identity/Muster")
Secondary Destination
If you choose a printer in Secondary Destination, the muster report will be sent to this printer as well as
to the screen/printer selected in Primary Destination.
Please refer to Primary Destination above for further information.
First Report after
Use this menu to specify a delay between the muster being started (either automatically or manually) and
the first report being printed or displayed.
The Repeat Every menu allows you to specify the time interval between each report. If, for example, you
choose 1 Minute, a report is generated approximately every minute.
The report stops being repeated when there are no more cards to include on the report.
Repeat Every
This specifies the time interval between each muster report sent to the printer or screen. If, for example,
you specify 5 minutes, a report is generated approximately every 5 minutes after the first report.
The report stops being repeated when there are no more cards to include on the report and re-starts if
someone re-enters the area.
Report when less than
Entering a value causes the Card Holders in Area muster report to be generated automatically only when
the number of card holders is less than the specified value.
This option provides a way of preventing a long report from being produced, which may be of little value. In
addition, a long report may take some time to print on slow printers.
The setting does not prevent you from generating a report manually using the Report button in the
"Home/Identity/Muster" screen.
Reset Options
Auto Reset When Complete
Selecting this option causes the muster to reset automatically when the number of cards in the area
defined by Area Reader Group is zero.
A muster shows a status of "Completed" in the Muster Selection screen once it is reset.
Auto Reset Input
Selecting a monitor point from the menu causes the muster to reset automatically when the monitor point
is active. The Auto Set Rule determines when the muster can be reset and the effects of the reset.
This option is available only if Auto Reset when Complete is not selected.
Auto Reset Rule
This is available if you have selected a monitor point in Auto Reset Input. The option determines when a
muster can be reset using a monitor point and the effect of the reset. The options are:
Only perform reset if no cards in the area - When the monitor point becomes active, the
muster resets only if there are no cards in the area.
Allow reset if area occupied but leave remaining cards in the area - When the monitor
point becomes active, the muster resets regardless of whether or not there are still cards in
the area. If there are cards in the area, they remain in the area, so that if you restart the
same muster, you will see those cards in the new muster report.
Allow reset if area occupied and remove all remaining cards from the area - When the
monitor point becomes active, the muster resets regardless of whether or not there are still
cards in the area. If there are cards in the area, they are removed from the area, so that if
you restart the same muster, you will not see those cards in the new muster report. This
option may be useful if, for example, the operator who triggers the monitor point is sure that
all remaining cards belong to visitors who are not on site.
184
Symmetry Software Reference Manual
185
Area Occupancy Screen("Setup/Identity/Area Occupancy")
General
Overview of this screen
This screen enables you to set up commands that are executed automatically when an area has too few or too
many people. A typical application is an access-controlled parking lot, where a "Full" sign (controlled by an
auxiliary output) can be switched on when the car park is full.
Commands can also be executed automatically when the area occupancy returns to acceptable levels. For
example, a car park "Full" sign could be switched off when the car park is no longer full.
The controlled area must have separate entry and exit readers. The area occupancy increases by one for each
successful transaction at an entry reader and decreases by one for each successful transaction at an exit
reader.
To affect the occupancy count, a card holder or visitor must have the Area Occupancy Card option set in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
The system executes the commands from the server, not directly from the nodes. This means that the
Symmetry services at the server must be running (this should be the case if Symmetry has been installed
correctly).
A card's access rights determine which entry and exit readers, if any, the person is able to use.
Screen Options
For This Company
Choose the company that owns the area's entry and exit readers. This determines the reader groups displayed
in the Entry Reader Group and Exit Reader Group pull-down menus.
Entry Reader Group
Choose the reader group that contains all the readers used to gain entry to the controlled area. A reader cannot
be in both an entry and exit reader group.
Exit Reader Group
Choose the reader group that contains all the readers used to gain exit from the controlled area. A reader
cannot be in both an entry and exit reader group.
Minimum
If applicable, enter the minimum number of card owners who must be in the area at any one time.
Maximum
If applicable, enter the maximum number of card owners who are allowed to be in the area at any one time.
Set Count To
You can set the recorded count to the value you enter in this field. You may want to do this when first setting up
the system or if the recorded count is not the same as the actual count (for example, because card holders
have been tailgating).
The new count is set to the value you have specified when you select OK.
IF Minimum Commands
If required, you can define up to two commands to be generated automatically when the area occupancy falls to
the specified minimum value, then two more for when the count increases above the minimum value.
Type - Choose the type of device to send the command to.
Location - Select the specific device or group of devices to send the command to. If you require any further
details about the meaning of this option, refer to the description of the appropriate command.
186
Symmetry Software Reference Manual
=Min - Select the command to execute when the occupancy count falls to the value specified in the Minimum
field.
> Min - Select the command to execute when the occupancy count becomes greater than the value specified in
the Minimum value. The command is executed only if the occupancy count has risen from the Minimum value.
Click here for details of each command.
IF Maximum Commands
If required, you can define up to two commands to be generated automatically when the area occupancy
increases above the specified maximum value, then two more for when the count decreases below the
maximum value.
Type - Choose the type of device to send the command to.
Location - Select the specific device or group of devices to send the command to. If you require any further
details about the meaning of this option, refer to the description of the appropriate command.
= Max - Select the command to execute when the occupancy count increases to the value specified in the
Maximum field.
< Max - Select the command to execute when the occupancy count becomes less than the value specified in
the Maximum value. The command is executed only if the occupancy count has fallen from the Maximum
value.
Click here for details of each command.
Options
Determines whether the 'Trigger Operation' message generated when the command is executed should be
reported as an alarm, event or not at all by the node that controls the Location device.
An event simply records the message in the log file. You can use the "Home/Monitoring/Activity" screen to view
the contents of the log file.
An alarm displays the message in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screens and also adds the message to the log file.
Status
Select Enabled to allow the command to execute at the allotted times. Selecting Disabled causes the
command not to be actioned.
Clear
This clears the selections in the screen.
Count
This displays the system's currently recorded occupancy count for the area.
General
Overview of this screen
The Approving Official screen enables you to specify the details of people who are able to authorize the issuing
of a badge to a card holder or visitor.
When setting up a person's details in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen, you
can select the name of the approving official. This then specifies the person who has authorized a badge to be
issued to that person.
If Approving Official is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences"
screen, it is mandatory for an approving official to be selected in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
187
Card Blocks Screen("Setup/Identity/Card Blocks")
You can use the screen to capture the approving official's signature. Doing so enables you to display the
signature when you select the approving official's name in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
The approving officials you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Approving Official from "Setup/Identity". You can use the
Selection screen to create a new approving official or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
General
Overview of this screen
This screen must be used if the cards being used (such as the G4Tec 37-bit HID Prox Card Format) do not
have an encoded customer code.
In these cases, you need to use the screen to define the ranges of cards being used. Often, the card numbers
on these cards are encoded at time of manufacture and cannot be reprogrammed.
For each block of cards purchased:
1. In First Card Encoded Data, enter the encoded card number of the first card in the block.
2. In Card Qty, enter the number of cards purchased.
3. Card Serial Numbers shows the card numbers that will be used for these cards in Symmetry (for example,
in the Card Holders screen).
Note: If default card blocks were set up automatically during software installation, you should remove any that
are not used. Otherwise, for readers that are in Customer Code Only mode, access may be granted to any card
that is within a card block, even though it may not have been allocated to a person (for example, in the
"Home/Identity/Card Holders" screen).
188
Symmetry Software Reference Manual
Note: Card blocks are a feature unique to multiNODE-2 or later nodes and therefore should only be used when
these types of nodes are installed.
Screen Options
Use Setblock Data
Selecting this option causes the card-block data to be extracted from a supplied encrypted file on the server.
Other card-block data that may have been set up in this screen is not used.
First Card Encoded Data
In this box, type the encoded number of the first card in the block supplied.
Card Qty
Type the number of cards in the block.
Card Serial Numbers
After you have entered the card quantity and clicked the mouse in another field, the Start and End boxes
display the first and last card numbers as used within the system.
General
"Setup/Identity/Personal Data/Card Holder Titles" - Use this screen to set up the titles that appear in the
Personal tab when setting up a card holder in the "Home/Identity/Card Holders" screen or "Home/Identity/Bulk Card
Amendments" screen.
"Setup/Identity/Personal Data/Visitor Titles" - Use this screen to set up the titles that appear in the Personal tab
when setting up visitors in the "Home/Identity/Visitors" or "Home/Identity/Bulk Card Amendments" screen.
You may, for example, want to have titles such as "Car Registration", "Height", "Hair Color", etc.
You can define the data items for each title using the "Setup/Identity/Personal Data/Card Holder Data" or
"Setup/Identity/Personal Data/Visitor Data" screen. For example, for the title "Hair Color", you may choose to create
a list consisting of black, brown, blonde, etc.
When you have finished making any changes, select OK to save the changes; otherwise, Cancel.
The titles apply to all card holders in the currently selected company.
Screen Options
Personal Data Titles
Enter a title for the personal data title (such as "Hair Color"). Up to 40 characters can be used.
189
Card/Visitor Personal Data Titles Screen ("Setup/Identity/Personal Data/Card Holder (or Visitor) Titles")
Mandatory
If you select Mandatory for a title, information for that title will have to be specified when adding or editing a
card holder/visitor.
Field Type
If you choose Edit List, the user will be able to type data for that field, and the typed data will be automatically
added to the list of predefined data items.
Choosing Expiry Date enables a date to be entered for the personal data title in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen. At the beginning of the specified day, the status of the card is
automatically set to "Inactive". This feature is useful if you want the card to be made inactive when, for
example, an insurance policy or qualification expires. You can specify the required date format in the Mask
field. Selecting Expiry Date causes Category to be automatically set to Date.
If you choose List Only, a user of the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen will be
restricted to selecting one of the predefined data items for that title. For example, for "Hair Color", "black",
"brown", "blonde", etc.
If you choose String, the field will be a normal data-entry field.
Category and Mask
These determine the required format of the information entered for this personal data title. Choose one of the
following:
Custom - Use # to indicate an alphanumeric character, and 0 for a numeric character. For example,
if you specify #0000, the personal data specified for this title must consist of one alphanumeric
character, followed by four numeric characters (such as E1500). If you include any other character,
the personal data must include the character at the specified position. For example, if you specify
00.00, the personal data must include four numeric characters, with a period (decimal point) after
the first two (for example, 10.99).
Date - A date value will be required, in the format specified by Mask, which must be all of the
following in any order separated by forward slashes:
dd
mm or mmm
yy or yyyy
For example, dd/mm/yy or mmm/dd/yyyy.
Note: If you use yy rather than yyyy, Symmetry assumes the current century within the range 00 to 35. If
you want to enter a year in a different century, you may need to use yyyy.
Email - This category is displayed only when setting up card holder data titles (not available for
visitor data titles). Selecting this category specifies that the personal data title is an email address.
If a visitor is signed in using the "Home/Identity/Visitors" screen, a "Visitor arrived" email is sent to
each email address specified in the Personal Data tab of the card holder being visited.
Click here for further information.
General - No required format. Mask is not used for this option.
Time - A time value will be required, in the format specified by Mask, which can be hh:mm (24-hour
clock) or h:mm $ (12-hour clock). In the latter case, the $ indicates that either am or pm would be
accepted (in lowercase) when specifying the personal data; for example, 11:15 am.
190
Symmetry Software Reference Manual
General
"Setup/Identity/Personal Data/Card Holder Titles" - Use this screen to set up the titles that appear in the
Personal tab when setting up a card holder in the "Home/Identity/Card Holders" screen or "Home/Identity/Bulk Card
Amendments" screen.
"Setup/Identity/Personal Data/Visitor Titles" - Use this screen to set up the titles that appear in the Personal tab
when setting up visitors in the "Home/Identity/Visitors" or "Home/Identity/Bulk Card Amendments" screen.
You may, for example, want to have titles such as "Car Registration", "Height", "Hair Color", etc.
You can define the data items for each title using the "Setup/Identity/Personal Data/Card Holder Data" or
"Setup/Identity/Personal Data/Visitor Data" screen. For example, for the title "Hair Color", you may choose to create
a list consisting of black, brown, blonde, etc.
When you have finished making any changes, select OK to save the changes; otherwise, Cancel.
The titles apply to all card holders in the currently selected company.
Screen Options
Personal Data Titles
Enter a title for the personal data title (such as "Hair Color"). Up to 40 characters can be used.
Mandatory
If you select Mandatory for a title, information for that title will have to be specified when adding or editing a
card holder/visitor.
Field Type
If you choose Edit List, the user will be able to type data for that field, and the typed data will be automatically
added to the list of predefined data items.
Choosing Expiry Date enables a date to be entered for the personal data title in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen. At the beginning of the specified day, the status of the card is
automatically set to "Inactive". This feature is useful if you want the card to be made inactive when, for
example, an insurance policy or qualification expires. You can specify the required date format in the Mask
field. Selecting Expiry Date causes Category to be automatically set to Date.
If you choose List Only, a user of the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen will be
restricted to selecting one of the predefined data items for that title. For example, for "Hair Color", "black",
"brown", "blonde", etc.
If you choose String, the field will be a normal data-entry field.
Category and Mask
These determine the required format of the information entered for this personal data title. Choose one of the
following:
Custom - Use # to indicate an alphanumeric character, and 0 for a numeric character. For example,
if you specify #0000, the personal data specified for this title must consist of one alphanumeric
character, followed by four numeric characters (such as E1500). If you include any other character,
the personal data must include the character at the specified position. For example, if you specify
00.00, the personal data must include four numeric characters, with a period (decimal point) after
the first two (for example, 10.99).
Date - A date value will be required, in the format specified by Mask, which must be all of the
following in any order separated by forward slashes:
dd
mm or mmm
191
Card Personal Data Screen("Setup/Identity/Personal Data/Card Holder Data")
yy or yyyy
For example, dd/mm/yy or mmm/dd/yyyy.
Note: If you use yy rather than yyyy, Symmetry assumes the current century within the range 00 to 35. If
you want to enter a year in a different century, you may need to use yyyy.
Email - This category is displayed only when setting up card holder data titles (not available for
visitor data titles). Selecting this category specifies that the personal data title is an email address.
If a visitor is signed in using the "Home/Identity/Visitors" screen, a "Visitor arrived" email is sent to
each email address specified in the Personal Data tab of the card holder being visited.
Click here for further information.
General - No required format. Mask is not used for this option.
Time - A time value will be required, in the format specified by Mask, which can be hh:mm (24-hour
clock) or h:mm $ (12-hour clock). In the latter case, the $ indicates that either am or pm would be
accepted (in lowercase) when specifying the personal data; for example, 11:15 am.
General
Overview of this screen
You can use this screen to create a list of personal data items for those personal data titles that have a field
type of Edit List or List Only, as set up in the "Setup/Identity/Personal Data/Card Holder Titles" screen.
For example, for the title "Hair Color", you may choose to create a list consisting of black, brown, blonde, etc.
The lists are then available in the "Home/Identity/Card Holders" screen, which can make the process of setting
up new card holders and specifying personal data much easier.
Note that new personal data items can also be created by typing the information into any of the first ten
personal data fields of the "Home/Identity/Card Holders" screen, providing that the Field Type in the
"Setup/Identity/Personal Data/Card Holder Titles" screen is set to Edit List.
The personal data items you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Card Holder Data from the "Setup/Identity/Personal Data".
You can use the Selection screen to create a new card-holder personal data item or to find an existing one to
edit. Click here for an overview of Selection screens and how to use them.
The following options are specific to this Selection screen:
Card Personal Data Title
Use this pull-down list before selecting Find or New. It allows you to choose the personal data title for the
data item that you wish to find or create. These personal data titles are defined by using the
"Setup/Identity/Personal Data/Card Holder Titles" screen.
Note: The menu lists only personal data tiles that were defined with a field type of Edit List or List Only
in the "Setup/Identity/Personal Data/Card Holder Titles" screen.
192
Symmetry Software Reference Manual
General
Overview of this screen
You can use this screen to create a list of personal data items for those personal data titles that have a field
type of Edit List or List Only, as set up in the "Setup/Identity/Personal Data/Visitor Titles" screen.
For example, for the title "Hair Color", you may choose to create a list consisting of black, brown, blonde, etc.
The lists are made available in the "Home/Identity/Visitors" screen when defining the personal details of a
visitor. Creating lists of personal data in this screen can make the process of specifying visitor details much
easier.
Note that new visitor personal data items can also be created automatically by typing the information into
personal data fields in the "Home/Identity/Visitors" screen, providing that the Field Type in the
"Setup/Identity/Personal Data/Visitor Titles" screen is set to Edit List.
The personal data items you set up in this screen can be used only for visitors associated with the currently
selected company.
Using the Selection screen
The Selection screen is displayed when you select Visitor Data from "Setup/Identity/Personal Data". You can
use the Selection screen to create a new visitor personal data item or to find an existing one to edit. Click here
for an overview of Selection screens and how to use them.
The following options are specific to this Selection screen:
Visitor Personal Data Title
Use this pull-down list before selecting Find or New. It allows you to choose the personal data title for the
data item that you wish to find or create. These personal data titles are defined in the
"Setup/Identity/Personal Data/Visitor Titles" screen.
Note: The menu lists only personal data tiles that were defined with a field type of Edit List or List Only
in the "Setup/Identity/Personal Data/Visitor Titles" screen.
193
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")
General
Overview of this screen
You can use this screen to create, find, view, modify, copy or delete workflows, depending on your user
privileges, as set up in the "Maintenance/User & Preferences/Roles" screen.
Workflow functionality is available if the Alarm Workflow Designer license is installed.
About workflows
A workflow is a set of actions that are started automatically when you perform a selected operation, such
as opening a new alarm, acknowledging an alarm or opening a task. You can choose the type of trigger
that starts a workflow and the actions that the workflow carries out. You can, for example, create a
workflow that automatically opens the Card Holders screen when you open a new alarm.
A workflow can contain more than one action. For example, a workflow can open a screen, send an email
and create a task when you acknowledge a single alarm. In addition, a workflow can contain different
paths depending on your responses to questions.
Triggers and actions
When you create a workflow, you specify the trigger that starts the workflow. Triggers are either alarm
based, such as "Open New Alarm" and "Open Existing Alarm", or task based, such as "Create Task" and
"Complete Task". A full list of triggers is provided later in this help.
The selected trigger determines the actions you can drag and drop into the Workflow Designer. Actions
include "Open Window", "Close Window", "Send Command", "Question", "Create Task" and others. The
order you place the actions in the workflow determines the order in which they are executed.
Some actions have associated options. For example, the "Open Window" action has an option that allows
you to choose the window to open. The "Create Task" action has a greater set of options, which can be
displayed in a separate window.
194
Symmetry Software Reference Manual
You can delete an action by clicking the action and pressing the Delete button on the keyboard.
Workflows that use the same trigger
It is possible to create different workflows that use the same trigger. For example, two workflows could use
the "Open New Alarm" workflow. In this case, the workflows are executed in the order set using the
Priority button.
Note: If a user cancels a workflow, all other workflows later in the execution order are also cancelled.
Conditions
If you choose an alarm-based trigger, you can specify that any alarm from any device can trigger the
workflow, or only selected alarms from certain devices. The Conditions area in the Workflow Designer
allows you to choose the devices and alarms. By default, workflows are triggered by any alarm from any
device.
Using the Workflow Designer
To use the Workflow Designer:
1. Create a new workflow, or open an existing workflow, from the Selection screen.
If you have opened an existing workflow, you can use arrow buttons near the top-right corner of the
screen to scroll through each workflow.
2. Select the Trigger.
3. For an alarm-based trigger, select the alarm Conditions, if required.
4. Select an Action, and drag and drop it into the workflow. The pointer indicates valid/invalid drop
points. You can drag and drop an action to another location in the workflow, if required.
Invalid actions are shown grayed out.
5. If necessary, select options for the trigger. These are shown in a separate window or in the area
near the bottom-left corner of the screen.
6. Continue to add additional actions, as required.
7. Click Save.
The system ensures that no two enabled triggers can conflict. A message is displayed if the
workflow conflicts with the setup of another enabled workflow.
Starting a workflow
A workflow is started by a user carrying out a defined trigger, such as opening a new alarm. Prompts and
feedback are displayed, depending on the actions in the workflow.
Note: The user requires the appropriate permissions for each action in the workflow. For example, if a
action is to open the Activity screen, the user requires privileges to open the Activity screen. If the user
does not have the appropriate privileges, the action is not carried out.
If the action generates a task or changes the status of an alarm, the Tasks or Alarms screen shows the
new task/status.
Note:
An alarm-based trigger can respond to a masked alarm.
The trigger can respond only if one alarm is opened, cleared, etc.
Note: All changes to a workflow are recorded and can be audited using the "Reports/History/User Audit"
screen.
195
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")
196
Symmetry Software Reference Manual
The Select button allows you to choose the types of alarms that will cause the workflow to trigger. For example,
you may want the workflow to trigger only when there is a Door Forced alarm from a specific reader. By default,
the workflow is triggered by any type of alarm.
Actions
Note: The actions available depend on the selected trigger.
Add Comments
This action causes a dialog to be displayed when it is executed in the workflow. The dialog prompts the
user to enter a comment, which can be a predefined comment or a typed comment. The comment is saved
in the comments section of the alarm or task that triggered the workflow.
Predefined comments are set up in the "Operation/Alarms/Comments" screen.
Selecting Comments Mandatory makes entering a comment mandatory.
Note: A comment is mandatory only if Comments Mandatory is selected. The Alarm Comments
Mandatory setting in the "Maintenance/User & Preferences/Client Preferences" screen is not used for
comments entered through an Add Comments workflow action.
Alarm-Escalate
This action causes the alarm that triggered the workflow to be automatically routed to the Alarms screen of
the selected client.
Note: The selected client does not require an alarms routing definition to be set up in the
"Operation/Alarms/Routing" screen.
Alarm-Priority
This action causes the priority of the alarm that triggered the workflow to be automatically set to the
selected value.
Alarm-State
This action causes the alarm that triggered the workflow to be automatically acknowledged or cleared,
depending on the selection in the Set State menu.
For a clear alarm action, the workflow will acknowledge, but not clear, an alarm if the device that caused
the alarm needs to be reset (such as a door being closed). In addition, any requirement to enter a
comment when clearing an alarm (as set using Alarm Comments Mandatory is set in the
"Maintenance/User & Preferences/Client Preferences" screen) is bypassed.
Note: No actions can appear after a Set State action, if it is set to Clear Alarm.
Cancel Operation
This action causes the trigger that started the workflow to be automatically cancelled. For example, if the
trigger is a "Clear Alarm", the Cancel Operation action causes the Clear Alarm to be cancelled. You could,
for example, use this action to prevent an operation from taking place depending on the response to a
question in the workflow.
If you select Silent Cancel, no confirmation is provided when an operation is cancelled. If you do not
select Silent Cancel, the message "The operation you have just requested has been cancelled by a
workflow" is displayed when an operation is cancelled.
Close Window
This action causes the selected window to be automatically closed. For screens that have a Selection and
Definition screen (such as the Card Holders screen), the action closes the Definition screen only.
Selecting Override Confirmation closes the screen without prompting the user to save any changes (if
applicable). If Override Confirmation is not selected, a prompt is displayed to save changes.
Create Task
This action automatically generates the specified task. The task appears in the "Home/Monitoring/Tasks"
screen.
197
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")
When you add this action, a separate window is displayed for you to specify the task details. When you
click Close, you can access the same details in the area near the bottom-left corner of the Workflow
Designer.
Clicking this button (located near the bottom-left corner of the Workflow Designer)
displays the task details in a separate window.
The lower part of the Create Task area/window contains a box, which allows you to enter the task
instructions. You can type text into this box.
The following options are also provided:
Assign
Specify the user name or role the task is assigned to.
For further information, please refer to "Assigned To" in the help for the "Home/Monitoring/Tasks"
screen. Click here to access this help.
Due Date
Specify the date the task is due:
Date Triggered
The task will be due on the date the action is executed.
Days After Date Triggered
The task will be due a specified number of days after the action is executed.
Triggering Event's Date
The task will be due on:
a) the date of the alarm that triggers the workflow, or
b) the due date of the task that triggers the workflow.
Days After Triggering Event
The task will be due a specified number of days after:
a) the date of the alarm that triggers the workflow, or
b) the due date of the task that triggers the workflow.
Due Time
Specify the time the task is due:
Fixed Time
The task will be due at the specified time.
Time Triggered
The task will be due at the time the action is executed.
Triggering Event's Time
The task will be due at:
a) the time of the alarm that triggers the workflow, or
b) the due time of the task that triggers the workflow.
Hours After Trigger
The task will be due a specified amount of time after the action is executed.
Subject
Specify the subject or name of the task.
Alarm
Specify the conditions under which an alarm is generated for this task.
198
Symmetry Software Reference Manual
For information about handling task alarms, please refer to the help for the "Home/Monitoring/Tasks"
screen. Click here to access this help.
Merge Field, Insert
Click here for details about Merge Field and Insert.
Email
This action automatically sends an email to the specified recipients.
Note: To send emails from a workflow, email server and other details must be configured in the
"Setup/Configuration/Email Profiles" screen.
When you add this action, a separate window is displayed for you to specify the email details. When you
click Close, you can access the same details in the area near the bottom-left corner of the Workflow
Designer.
Clicking this button (located near the bottom-left corner of the Workflow Designer)
displays the email details in a separate window.
The lower part of the area/window contains a box, which allows you to enter the text of the email. You can
type text into this box.
The following options are provided:
Email Config
Select an email profile set up in the "Setup/Configuration/Email Profiles" screen.
To
Enter the email address of the recipient.
If you want to enter more than one address, separate each with a semicolon.
CC
If required, enter the email address of a secondary recipient. A copy of the email will be sent to this
address.
If you want to enter more than one address, separate each with a semicolon.
Subject
Specify the subject of the email.
Merge Field, Insert
Click here for details about Merge Field and Insert.
Open Window
This action causes the selected screen to be automatically opened.
Note:
If you select Card Holder, only alarms that have a known card holder can open the screen.
The action causes the "Home/Identity/Card Holders" Definition screen to be opened. The
screen displays the details of the card holder who caused the alarm.
If you select Graphics, only alarms that have a device on a graphic can open the screen.
The action causes the "Home/Monitoring/Graphics" screen to be opened. The screen
displays the lowest-level graphic that contains the device.
If you select Locator, only card-based alarms can open the screen. The action causes the
"Home/Identity/Locator" screen to be opened. The screen displays the last-known location of
the card holder who caused the alarm.
The Video Playback (Instant Replay) option is relevant only if an alarm that triggered the
workflow has a tagged video clip. The action plays the video clip.
199
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")
Question
This action causes a question to be displayed to the user. The question can have up to 5 predefined
responses. Each response causes a different branch in the workflow to be followed.
In the Workflow Designer, the Question action is contained in a rectangle, and within the rectangle you can
drag and drop additional actions into the relevant branches.
A simple example is a question that prompts the user "Do you want to close the Activity screen?", with Yes
and No responses only. The Yes branch could contain a Close Window action to close the Activity screen.
The No branch could contain no actions, which would prevent the Activity screen from being closed.
You can customize the question and response text displayed to the user using the fields near the bottom-
left corner of the Workflow Designer.
By default, there are only two responses to the question. Typing text into the c, d and e fields automatically
creates additional branches.
Response
This action prompts the user to enter information. The information is stored as a comment in the alarm or
task that triggered the workflow.
You can use the box near the bottom-left corner of the Workflow Designer to specify the question text to
display to the user.
Click here for details about Merge Field and Insert.
Selecting Response Mandatory forces the user to respond to the question.
Send Command
This action sends a predefined command. You can choose any command set up in the
"Operation/Commands/Predefined" screen.
You can set up a new predefined command by clicking New.
Note: The predefined command specifies the user roles that can use the command. The action is
executed only if the user who caused the trigger has one of the roles specified in the predefined command.
Show Instruction
This action causes instructions to be displayed to the user. You can use the box near the bottom-left
corner of the Workflow Designer to specify the instructions to display to the user.
Click here for details about Merge Field and Insert.
Start Intercom
This action is relevant only if the alarm that triggered the workflow is a Call Request alarm. The action
opens an audio link between the intercom at the client and the intercom making the call request.
Priority
You can use the Priority button to specify the order the Symmetry software should execute different workflows
that use the same trigger.
Buttons (bottom right)
The following buttons appear near the bottom-right corner of the screen:
Select this button, followed by Design View to return to normal design-viewing mode if Print
Preview is currently selected.
Select Print Preview to display how the workflow design will appear when printed using the
current Page Setup settings.
Select Page Setup to choose page settings for printing the workflow design.
Select Print to print the workflow design.
You can click this button and choose a magnification factor to reduce or enlarge the view of
the workflow design. Selecting Size To Fit increases or decreases the magnification factor
to display the workflow design comfortably in the screen.
200
Symmetry Software Reference Manual
Select this button, followed by Default, then one of the following buttons to apply the default
magnification factor when in the zoomed-in or zoomed-out state:
Select Zoom In or Zoom Out to zoom in/out with each mouse click.
Select Drag to pan around the workflow when in the zoomed-in state.
General
Overview of this screen
This screen allows you to set up one or more "email profiles". An email profile is a set of email communication
settings. Email profiles are used for:
Emailed alarms. You can use the "Operation/Alarms/Definitions" screen to specify the email profile
to use for a particular type of alarm (which also specifies the recipient). To email alarms, alarms
must be routed to E-Mail Alarms in the "Operation/Alarms/Routing" screen.
Workflow emails, as configured in the "Setup/Workflow/Workflow Designer" screen. The Workflow
Designer specifies the recipients of the email.
Reports sent by email. Some report screens (such as "Reports/History/Activity") allow you to select
Email as the report destination.
Visitor sign-in emails. When a visitor is signed in from the "Home/Identity/Visitors" screen, Symmetry
can automatically send a "Visitor arrived" message to each email address specified in the Personal
Data tab of the card holder the person is visiting. For further information about this feature, please
refer to Overview of Visitor Management.
After entering the information, you can test the settings by clicking Test. This sends a message to a specified
email address.
Using the Selection screen
The Selection screen is displayed when you select Email Profiles from "Setup/Configuration". You can use the
Selection screen to create a new email profile or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
201
Graphics ("Setup/Graphics/Add")
Use SSL
Depending on the configuration required to connect to the chosen email provider, select Use SSL if the server
uses the implicit Secure Sockets Layer (SSL) security protocol. Leave Use SSL unselected if the explicit SSL
security protocol is required.
With explicit SSL, the client first connects to the server using an insecure channel, and requests that a secure
channel is used. If granted, both the client and server switch to using an encrypted SSL connection.
With implicit SSL, the client and server jump immediately into an encrypted SSL connection. Often, this requires
a specific port for secure connections.
Outgoing SMTP Port
Specify the port number to use to connect to your outgoing email SMTP server.
The default port number depends on the settings of Encrypted Connection Required and Use SSL.
Authentication Required, Username, Password
Select this option if the outgoing SMTP email server requires a logon to send emails. Enter the logon User
Name and Password in the fields provided.
Block attachments over
This option is used when sending reports by email. Select the maximum size of the report attachment. Some
email servers have restrictions on the size of attachments that can be sent or received.
If an operator emails a report manually and the limit is exceeded, a message is displayed to indicate that the
email cannot be sent. If the Symmetry client service generates a scheduled report that exceeds the limit, the
message "System blocked emailing of report to {0} as it exceeded the max size permitted" is recorded in the
Windows event log.
Graphics ("Setup/Graphics/Add")
Note: Two graphics cannot use the same graphic filename. If you select a filename that is
already used by a graphic, the Add button will not be made available. Instead, the graphic that
uses the selected filename will be highlighted.
Note: You cannot use Browse to change the file used by an existing installed graphic.
The Filename box displays the name of the file you have selected.
2. Enter a unique name for the graphic in the Name box. This name will be displayed in the
"Home/Monitoring/Graphics" screen. The name is automatically set to be the same as the graphic
filename if MapNameEqualsFileName is set to 1 in the ini file.
202
Symmetry Software Reference Manual
3. Select Add.
The graphic is stored in the database, but the Symmetry software also maintains a local copy in the
Program Data\Security Management System\Graphics folder, which it uses for performance benefits.
To delete an installed graphic
1. Click on the graphic name in the upper area of the dialog.
2. Select Delete.
To change the name of an installed graphic
1. Click on the graphic name in the upper area of the dialog.
2. Type the new name in the Name box.
3. Select Change.
To update an installed graphic
If there have been changes to a graphic and you want those changes to be reflected in the Symmetry
software:
1. Click on the graphic name in the upper area of the dialog.
2. Select Update.
3. Use the dialog displayed to select the graphic filename.
To save an installed graphic
You can save any graphic installed in the Symmetry software to an external file.
1. Click on the graphic name in the upper area of the dialog.
2. Select Save As.
3. Use the dialog displayed to select the name and location of the file you want to create.
General
Overview of this screen
This screen enables you to configure graphics for use in the "Home/Monitoring/Graphics" screen. Graphics are
often plans of the building and provide operators with a quick graphical method of controlling and monitoring
Symmetry.
To configure a graphic, open a graphic previously installed using the "Setup/Graphics/Add" screen, then
position one or more icons on the page. Many of the icons represent physical devices, such as readers, doors,
monitor points and cameras. Operators can use these icons in the "Home/Monitoring/Graphics" screen to view
or change the current status of a device. Others icons, such as the threat level icon, are icons that an operator
can use to control the operation of the system.
A hierarchy of graphics can be defined by creating a link from one graphic to another, which may be useful for
larger sites. For example, a top-level site plan may contain a link for each building shown on the graphic. Each
link could be used to show a more detailed plan of the relevant building. Similarly, further levels could be added
to allow detailed floor or zone plans to be accessed from each building plan.
Note: You can replace the picture used for any icon used in the graphic by right-clicking on the icon and
choosing Picture.
You can add only those devices that belong to the currently selected company.
203
Graphics Screen ("Setup/Graphics/Setup")
204
Symmetry Software Reference Manual
Unassigned Devices
This pull-down list shows items such as readers that can be included in the graphic. Some items can appear
more than once on a graphic.
There are three device instances for each reader: one for the door monitor, one for the reader itself and the
other for the door associated with the reader. The three different devices allow a user to monitor and control
each function separately from the "Home/Monitoring/Graphics" screen. For example, door-related alarms cause
the door icon to flash, and card/reader alarms cause the reader icon to flash.
Unassigned Groups
This pull-down list shows groups of devices that are not yet included in the graphic. You may, for example, want
to include a reader group on a graphic to enable all readers in the group to be controlled from a single icon in
the "Home/Monitoring/Graphics" screen.
Unassigned Graphics
This pull-down list shows the graphics that have not yet been included in the currently viewed graphic or in
another graphic.
View Type and PTZ Preset
View Type and PTZ Preset are available for 360-degree cameras that support dewarping, such as
CompleteView cameras. Use the options to select the dewarped camera view and preset position to display.
Each view can have different presets, as configured in the camera definition screen in Symmetry.
About the toolbar buttons
The Graphics screen displays the following toolbar buttons (positioning the pointer over a toolbar button
displays the meaning of the button).
Note: To select more than one object, use the mouse to frame around the items, or select each individually
using Control-Click.
205
Graphics Screen ("Setup/Graphics/Setup")
206
Symmetry Software Reference Manual
Selecting Show this Device on Alarm automatically removes the option from any other icon of the same
device. If you remove the icon, the option is automatically applied to another icon of the same device, if one
exists.
General
About the Activity Filters Screen
The Activity Filters screen can be displayed using any of the following methods:
By selecting "Setup/Configuration/Activity Filters".
By clicking Filters in the "Home/Monitoring/Alarms" or "Home/Monitoring/Activity" screen.
By right-clicking an alarm in the "Home/Video & Audio/Virtual Matrix" screen and selecting Activity
Filters, Define.
Activity filters enable you to:
Partition the viewing of alarms in the "Home/Monitoring/Alarms" screen. Each filter you define can be
displayed as a separate tab in the Alarms screen. Each tab displays only those alarms that pass
the filter rules, such as alarms of a specified type or from a specified location.
You can use the Select Filters button in the Alarms screen to choose the filters (and therefore tabs) to
display in the Alarms screen.
Each Symmetry user can have different activity filter tabs displayed in the Alarms screen. Up to ten tabs
can be displayed, in addition to the "All Alarms" tab.
Note: The All Alarms tab is displayed in the "Home/Monitoring/Alarms" screen if Show All Alarms Filter
is selected in your user role. If you are viewing an activity filter tab other than All Alarms, and an alarm
occurs that is visible in another tab, that tab is highlighted with a flashing bar in an orange-color. The
highlighting remains until you have viewed the tab.
Limit the types of alarms and events displayed in the "Home/Monitoring/Activity" screen. Each filter
you define is automatically added to the Filter menu; selecting a filter causes the screen to display
only those alarms and events that pass the filter rules.
Limit the types of alarms displayed in the "Home/Video & Audio/Virtual Matrix" screen. Each filter
you define is automatically added to the menu displayed when you right-click an alarm; selecting a
filter causes the screen to display only those alarms that pass the filter rules.
Note: You can use only those filters that have either been defined yourself, or by another user with the Visible
to all Users option set in the "Setup/Configuration/Activity Filters" screen.
Note:Restrict alarm counts to selected filters in the "Maintenance/User & Preferences/Client Preferences"
screen affects alarm counts and other indications of alarm conditions. For further information, please refer to
the help for the Client Preferences screen.
Note: The Role Filters button in the "Maintenance/User & Preferences/Roles" screen can be used to filter the
alarms and events displayed to a user based on the user's role. If a role filter is defined, Symmetry does not
display any alarm or event to a user unless it passes the role filter, irrespective of the tabs and filters selected in
the Alarms or Activity screen. The message "Warning role filters are applied" appears near the top of the
Alarms and Activity screens if a role filter is active.
207
Activity Filters Screen ("Setup/Configuration/Activity Filters")
2. Click New.
3. Specify a name for the filter in the Description field.
4. Use Column Name, Operator, Value Type and Value to specify a filter rule, then click Apply Rule.
5. If you want to apply additional rules to the filter, click Add OR or Add AND, then repeat step 4.
6. Click OK.
Modifying an Existing Filter
To modify an existing activity filter:
1. Open the Activity Filters screen.
2. Select the filter you want to modify and click Open.
3. If required, modify the filter name displayed in the Description field.
4. If you want to modify one of the filter's existing rules:
4a) Select the rule in the large box.
4b) Edit the rule using Column Name,Operator, Value Type and Value, then click Apply Rule.
5. If you want to apply additional rules to the filter, click Add OR or Add AND, then repeat step 4b.
6. Click OK.
Selection Screen
Using the Selection screen
You can use the Selection screen to create a new filter or to find an existing filter to edit. Click here for an
overview of Selection screens and how to use them.
The Selection screen includes a Role Filter column. This shows whether the filter has been selected as a
default filter for a user role, as specified in the "Maintainance/User & Preferences/Roles" screen.
208
Symmetry Software Reference Manual
The menu contains a Text option, which you can use to type a text value in the Value field (case is not
important). The filter will display an alarm message if the device name contains the specified text.
Choose System Alarms if you want the filter to display system alarms of the type specified in Value.
Time - To set up a rule based on the time of the alarm. Choose the required Operator and enter the
time in the Value field (24-hour value, such as 14:30).
Priority - To set up a rule based on the priority of the alarm. Choose the required Operator and
enter the priority in the Value field.
Category - To set up a rule based on the category of the alarm (e.g. as defined in the "Install/Access
Control/Reader" screen).
Location - To set up a rule based on the location of the alarm (e.g. as defined in the "Install/Access
Control/Reader" screen).
Apply Rule
Applies the rule you have set up using Column Name, Operator, Value Type and Value. The rule is displayed in
the large box and will be used as part of the filter definition.
Add OR
Click this button if you want to add a logical OR rule to the filter. For example, if the rule is defined as
What=Wrong PIN, OR What=Door Forced, an alarm message will be displayed only if it is a Wrong PIN or Door
Forced alarm.
After clicking Add OR, specify the rule using Column Name and other settings, then click Apply Rule.
Add AND
Click this button if you want to add a logical AND rule to the filter.
The AND operation applies to all other rules in the filter definition. For example, if the rule is defined as
What=Wrong PIN, OR What=Door Forced AND Where=Reader2, Wrong PIN and Door Forced alarms will be
displayed only if they are from Reader2.
After clicking Add AND, specify the rule using Column Name and other settings, then click Apply Rule.
Remove
Deletes the rule highlighted in the large box to the left.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Introduction
Use this screen to specify the colors and names of the five threat levels and any associated commands. The screen
is available only if the Threat Level Manager license is installed.
For an overview of threat level management, please refer to the Threat Level Manager Installation and User Guide.
Threat Color
If required, click on a colored box on the left side of the screen to change a threat level's color. The color is used
when the threat level is displayed elsewhere in the user interface (such as in the indication of the current threat
level in the bar along the bottom of the Symmetry window).
Threat Name
You can change the name of a threat level in the text box.
209
Patrol Tours Screen ("Setup/Configuration/Patrol Tours")
Commands
Clicking the Commands button displays the Threat Commands screen, which allows you to associate one or more
commands with the threat level.
Requires Authentication
Selecting Requires Authentication will require two people to provide their username and password before the
current threat level can be changed (in "Home/Monitoring/Change Threat Level"). Both people need the Authorize
Change of Threat Level user privilege ("Maintenance/User & Preferences/Accounts" screen).
General
What is this screen used for?
You can use this screen to set up patrol tours.
The patrol tours you set up in this screen can be used only for the currently selected company.
The purpose of setting up a patrol tour is to enable a guard's progress to be monitored as he or she patrols a
site.
Note: Patrol tours can be set up only if the Guard Patrol Manager software is installed, as described in the
Guard Patrol Manager Installation and User Guide.
210
Symmetry Software Reference Manual
211
Advanced Access Titles Screen ("Setup/Configuration/Advanced Access Titles")
If Arrive in (Mins) and/or +/- (Mins) are set to zero, no time limits are imposed for that device. It may be useful
to use a value of zero for the first device in the tour if the time to reach the device is variable.
+/- (Mins)
Use this box to specify the tolerance for Arrive in (Mins). If a value of zero is specified, no time limit is imposed
(although the sequence of tour devices is still important).
>>/<</Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Use this screen to define the titles for the advanced access rights in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. The default titles are "Advanced 1" to "Advanced 16".
Click here for further information about advanced access rights.
The titles you set up in this screen can be used only for people associated with the currently selected company.
General
Overview of this screen
This screen is displayed only if you are using a Symmetry head office system (that is, a Symmetry Global
Edition Head Office license has been installed at the Symmetry system you are using). You can use this screen
to set up global access codes.
A global access code is a set of access codes defined using the "Operation/Times/Access Codes" screen at
one or more regions. When you open this screen, Symmetry makes available all access codes that have been
defined at all regions configured in the "Install/Global/Region" screen.
You can include access codes from different regions in the same global access code. If required, you can
include the same access code in more than one global access code.
The global access codes you define using this screen are available when setting up access rights in the
"Home/Identity/Card Holders" screen at the head office. Assigning a global access code to a card holder's
access rights causes the head office to download the card automatically to the appropriate regions (thereby
allowing the card holder to have access rights at those regions). For example:
A card holder is assigned the global access code named "Region 1 and 2: Standard Work Hours".
The global access code includes the access codes "Standard Hours 9am-5pm" from region 1, and
"Standard Hours 8am-4pm" from region 2.
The head office downloads the card automatically to regions 1 and 2.
At region 1, the card has the access rights "Standard Hours 9am-5pm".
At region 2, the card has the access rights "Standard Hours 8am-4pm".
It is possible to create a global access code that contains no regional access codes; this allows the regional
access codes to be assigned at a later date.
Please refer to the Global Edition Installation and User Guide for an introduction to Global Edition.
212
Symmetry Software Reference Manual
General
Overview of this screen
Some card technologies have a customer code (otherwise known as a facility code) encoded within the card
number, which is used to identify the company that the card owner is associated with in the Symmetry software.
You can use this screen to define the customer codes used by each company. By default, each company can
have up to eight customer codes, although the installer is able to remove this restriction using an ini file setting.
More than one company can use the same customer code.
By default, the number of customer codes per system is limited to 8, but again, the installer is able to remove
this restriction using an ini file setting.
Note that you must ensure that each customer code specified within the definition of each reader
("Install/Access Control/Reader" screen) is defined in the Facility/Customer Codes screen. This means that
each company must have at least one customer code, even if the cards used by the company cannot
contain a customer code (such as some proximity cards).
When using Micronodes, only one facility/customer should be used.
You can find out who is using a customer code by using the "Reports/Identity Reports/Access" screen.
Using the Selection screen
The Selection screen is displayed when you select Facility/Customer Codes from the "Setup/Configuration"
menu. You can use the Selection screen to create a new facility/customer code or to find an existing one to
edit. Click here for an overview of Selection screens and how to use them.
213
Entry Point Screen ("Setup/Identity Verification/Entry Point")
Companies Available
This box lists the available companies that are not yet assigned to the customer code. Click on the appropriate
line in the Companies Available list, followed by >>. Use the Ctrl or Shift keys to select more than one
company.
List Of Companies to Use the Code
This box lists the companies that are assigned to the customer code. You can remove a company from the list
by clicking on the appropriate line, then <<. Use the Ctrl or Shift keys to select more than one company.
You cannot remove a company from the list if a card definition uses the customer code (as specified in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen).
Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
General
Overview of this Screen
You can use this screen to specify entry points to the site. Entry points are used in views, as configured in the
"Setup/Identity Verification/View" screen.
The "Home/Identity/Verification" screen displays the entry points in a selected view.
Using the Selection screen
The Selection screen is displayed when you select Entry Point from "Setup/Identity Verification". You can use
the Selection screen to create a new entry point or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
Screen Options
Description
This is the name of the entry point. This is displayed in the "Home/Identity/Verification" screen.
Tag Name
This optional text is displayed in the entry point's button in the side bar of the "Home/Identity/Verification"
screen. Since space is limited in the button, you may want to use an abbreviated form of the entry point's name.
Auto Clear After
Selecting this option and entering a value in this field specifies the length of time the
"Home/Identity/Verification" screen displays the stored image and card/personal details following a grant/deny
access transaction.
Camera 1/2/3
Optionally, specify up to three live video images to display in the "Home/Identity/Verification" screen for the
entry point.
Digital video cameras defined in the "Install/Video & Audio/Digital Video" screens are available for selection.
A user of the "Home/Identity/Verification" screen is able to view video only from cameras that are available to
the user's role. The Permissions button in the camera definition screen determines the roles that are allowed
to view video from a camera.
The following options may be displayed, depending on the camera type:
View - For 360-degree cameras such as the Oncam Grandeye that support dewarping, you can
choose one of the dewarped camera views. The camera will switch to display the view you select.
214
Symmetry Software Reference Manual
PTZ Preset - You can choose one of the camera's PTZ presets set up for the camera, if it has any.
The camera will switch to display the PTZ preset you select. For 360-degree cameras, the camera
view you select may affect the available presets, since each view can have different presets (as
configured in the camera definition screen in Symmetry)
Control Reader
Select the main reader used at the entry point.
Additional Readers
You can choose a reader group from this menu. When the entry point is in automatic verification mode (PC
Door Control mode off), the "Home\Identity\Verification" screen displays alarm\event messages from all readers
in this reader group, as well as from the Control Reader.
You may want to use this option if the entry point has a main (control) reader and other separate readers for
use by VIPs or other categories of card holder.
The selected reader group is used only when the entry point is in automatic verification mode and has no other
effect than to cause alarm\event messages from readers in the group to be displayed in the
"Home\Identity\Verification" screen.
Call Station
Optionally, specify the intercom call station to display in the "Home/Identity/Verification" screen for the entry
point. This will allow the user of the "Home/Identity/Verification" screen to use the intercom system to
communicate with people at the entry point.
The PC at which the "Home/Identity/Verification" screen is used must be defined as an intercom client in the
"Install/Video & Audio/Intercom/Clients" screen.
Intercom call stations are defined in the "Install/Video & Audio/Intercom" screens.
Command 1/2/3
Optionally, choose up to three predefined commands to display for the entry point in the
"Home/Identity/Verification" screen.
Predefined commands are configured in the "Operation/Commands/Predefined" screen.
The third command is not available if Allow Activity Comments is selected.
A user of the "Home/Identity/Verification" screen is able to run only those predefined commands that are
available to the user's role. The Permissions button in the "Operation/Commands/Predefined" screen
determines the roles that are allowed to run a command.
Notification Sound
If you select a sound ("wav" file), it will be played in the "Home/Identity/Verification" screen when there is a card
transaction at the entry point, providing the entry point is in manual verification mode (PC Door Control mode).
Entry Point Type
This option determines the graphic that is used for the Grant Access and Deny Access buttons in the
"Home/Identity/Verification" screen.
Auto Pause Video (Manual Verification)
Choose this option if you want live video at the entry point to be paused when there is an access control
transaction at the entry point, providing the entry point is in manual verification mode (PC Door Control mode).
Allow Grant Access
Selecting this option enables the Grant Access button in the "Home/Identity/Verification" screen.
Allow Card Holder Lookup
Selecting this option enables the Lookup Card holder button in the "Home/Identity/Verification" screen.
215
View Screen ("Setup/Identity Verification/View")
Allow Lock/Unlock
Selecting this option enables the Unlock and Lock buttons in the "Home/Identity/Verification" screen (to lock or
unlock the door or other entry device).
Allow Deny Access
Selecting this option enables the Deny Access button in the "Home/Identity/Verification" screen.
Allow Activity Comments
Selecting this option causes the Activity Comment icon to be displayed in the "Home\Identity\Verification"
screen. Clicking the icon enables the user to add a comment against the current alarm\event message
displayed in that screen.
Selecting Allow Activity Comments disables Command 3 to provide space in the "Home\Identity\Verification"
screen for the new icon.
Card Alarm Notification
This option is relevant only for automatic verification mode (PC Door Control mode off).
Selecting this option causes any one of the following alarms at the Control Reader to prompt a user of the
"Home\Identity\Verification" screen whether to grant or deny access to the card holder:
At Wrong Door
At Wrong Time
Card Expired
Card Holder on Vacation
Unknown Card
Note: Granting access has the same effect as granting access from the "Home/Monitoring/Command Centre"
screen. It does not generate an Access Granted transaction against the card holder, since the card holder does
not have valid access rights.
General
Overview of this Screen
You can use this screen to specify the entry points to include in a view and the order of the entry points in the
view. Entry points are defined in the "Setup/Identity Verification/Entry Point" screen.
Selecting a view in the "Home/Identity/Verification" screen causes the entry points in that view to be displayed.
A view can contain up to 27 entry points. An entry point can be in more than one view. You cannot have two
entry points in the same view that use the same reader.
The screen applies only to the currently-selected company.
Using the Selection screen
The Selection screen is displayed when you select View from "Setup/Identity Verification". You can use the
Selection screen to create a new view or to find an existing one to edit. Click here for an overview of Selection
screens and how to use them.
Screen Options
Description
This is the name of the view.
216
Symmetry Software Reference Manual
If you have made any changes, you are prompted to save those changes before the previous or next record is
displayed.
Available Entry Points
This box lists the entry points that are not yet in the view.
In this View
This box lists the entry points that are in the view.
Up/Down buttons
The up/down buttons to the right of the screen allow you to change the order of a selected entry point. For
example, moving an entry point to the top of the list will cause that entry point to be displayed at the top of the
view in the "Home/Identity/Verification" screen.
Default View
Select this option if you want the view to be the view that is displayed by default the first time a user opens the
"Home/Identity/Verification" screen. The next time a user opens the screen, the last view the user used is
displayed.
Only one view can be the default view. Selecting this option for a view automatically deselects the option in all
other views.
Camera Limit
This allows you to specify the maximum number of camera images to display for each entry point in the view.
You may want to use this setting to create two different views that include the same entry points, but have
different camera limits. This would, for example, enable the view that has the lower camera limit to be displayed
on a monitor that has a lower resolution.
Rotate View
This option is available if there is only one entry point in the view.
If you want the "Home/Identity/Verification" screen to list previous transactions at the entry point, select this
option and enter the number of transactions to list in Entry Point History Limit. Once this limit is reached, a
new transaction causes the oldest transaction to be removed.
Entry Point History Limit
See Rotate View above.
Single View
This option is available if there is only one entry point in the view.
Select this option if you want the view to occupy the entire "Home/Identity/Verification" screen.
>>/<</Copy/Delete/Permissions/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.
217
Data Titles Screen ("Setup/Identity Verification/Data Titles")
General
Overview of this Screen
You can use this screen to specify card and personal information to display in the "Home/Identity/Verification"
screen for card holders and visitors.
The screen applies only to the currently-selected company.
Note: If your system is configured for more than one company, make sure that the personal information
configured in this screen is exactly the same for all companies that are in the same company group. For
example, if you select First Name for the first item of personal information, make sure you select First Name
when setting up this screen for all other companies in the same company group. If you do not do this, personal
information will not be displayed correctly in the "Home/Identity/Verification" screen when a card holder
presents a card not belonging to the user's currently-selected company.
Screen Options
Card Holder Data
Use the menus to specify the card and personal information to display in the "Home/Identity/Verification" screen
for card holders.
The options you can select include the personal data titles defined in the "Setup/Identity/Personal Data/Card
Holder Titles" screen, and various items of information defined in the "Home/Identity/Card Holders" screen.
You can use the buttons to the right of the menus to choose the font, text color and background color to use for
the displayed information. The selected font and colors are shown to the right of the buttons. Choosing (None)
resets the font and colors.
Visitor Data
Use the menus to specify the card and personal information to display in the "Home/Identity/Verification" screen
for visitors.
The options you can select include the personal data titles defined in the "Setup/Identity/Personal Data/Visitor
Titles" screen, and various items of information defined in the "Home/Identity/Visitors" screen.
You can use the buttons to the right of the menus to choose the font, text color and background color to use for
the displayed information. The selected font and colors are shown to the right of the buttons. Choosing (None)
resets the font and colors.
218
Install Menu
219
Card Formats Definition Screen ("Install/System/Default Settings/Card Formats")
Note: You cannot change the card layout assigned to a built-in card format, or modify any of the built-in card
layouts.
You can access this screen from the Card Formats Selection screen, which allows you to choose whether to open
an existing card format or create a new one. The screen is available only if it is enabled in your user role
(Maintenance/User & Preferences/Roles" screen).
220
Symmetry Software Reference Manual
AID
This is a unique identifier for the card format.
The default is the AID that is stored in M4000 nodes. When an M4000 node receives a transaction from a card
that does not match any of its known formats, the M4000 passes the AID and other card data to Symmetry.
Symmetry attempts to match the AID and other card data with the card formats that are defined in this screen,
starting with those that have the same AID. This can allow Symmetry to decode the data and display relevant
information in the Alarms and Activity screens.
The AID must be a hexadecimal string with an even number of characters.
Format ID
The Format ID can be used to specify the card format to use for a card holder or visitor when using data
import, as described in the Data Connect Manual.
Layout
This allows you to choose the card layout to use for the card format named in the Description field.
The menu is grayed out if you have opened a built-in card format from the Selection screen, as the layout of
built-in card formats is fixed.
The menu is also grayed out if the card format is already being used in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
New
You can click this button to create a new card layout in the Data Layout Definition screen. When you save the
new layout, it will be automatically selected as the layout to use for the card format named in the Description
field.
The button is grayed out if you have opened a built-in card format from the Selection screen, as the layout of
built-in card formats is fixed. The menu is also grayed out if the card format is already being used in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Modify
You can click this button to modify the card layout selected in the Layout menu. The Card Layout Definition
screen is displayed.
The button is grayed out if the card layout selected in the Layout menu is a built-in card layout, as these card
layouts are fixed. The button is available for other layouts, even if the card format is already being used in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Copy/Delete/Apply/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.
Clients ("Install/System/Clients")
221
Client Ports ("Install/System/Client Ports")
Network Name
Shows the Windows computer name of the client.
The association between client name and Windows computer name was made using Installation Wizard when
Symmetry was first started at the client.
If you want to associate the client with a different Windows computer name, re-run the Installation Wizard (from
"Install/System"), and use the Client Name screen to re-make the association.
"Client software to be installed/configured" is displayed if the association has not yet been made (because the
client has not been started for the first time).
Display real-time current activity at this client
Select this option if you want the "Home/Monitoring/Activity" and "Home/Identity/Verification" screens to be able
to be used at the client.
Output Alarms/Events to printer
Select this option if you want the client to print alarm/event messages that have been set up for printing in the
"Operation/Alarms/Reporting" screen. The alarm/event messages will be printed on the default Windows
printer, which should be of the dot-matrix type (laser printers are unsuitable due to their inability to use
continuous stationery).
This option is available only if Display real-time current activity at this client is selected.
This option can be overridden on a global basis using Enable Printing of Alarms/Events in the
"Maintenance/User & Preferences/System Preferences" screen.
The alarms/events printed at a client depend on alarm routing, as set up in the "Operation/Alarms/Reporting"
screen.
There is no need to restart the client or services after changing this option.
The account used by the "SymmetryServices" service must have permission to print. This can be tested by
logging in as the account, adding the printer in the Control Panel, and checking that you can print a document
from this account.
Client offline Monitoring
Selecting this option enables the Client/Server Offline and Client/Server Online alarms/events to be generated
for the client. If a client has chains connected to it, it is important for the server to be able to report that it cannot
communicate with the client.
The Client/Server Offline and Client/Server Online alarms/events can also be generated if the server goes
offline (such as if the Symmetry services at the server shut down). The alarm/event is displayed the next time
the server goes online. These alarms/events are reported by clients that have alarms routed to them.
Release
You can use this button to release a Symmetry client license from the machine. You may want to do this if you
want to install the Symmetry client software on a different machine using the same license serial number.
Note: Do not use this option for the Symmetry server machine, even if it includes a client license.
222
Symmetry Software Reference Manual
223
Client Ports ("Install/System/Client Ports")
(It may seem strange that the reader checks the customer code and then passes the customer code and
card number to the node to check access rights, but this is necessary for the operation of the reader. The
reader requires a password check for each transaction, and the password has been set up to be the same
as the customer code.)
For further information, see Overview of Fingerprint Readers.
Commend Controls
A port for connection to a Commend Intercom System (available only for Securimaster systems). Only one
Commend system can be connected to Symmetry. If you select Commend Controls for a COM port, the
option will not be available for other COM ports. If you select Commend Controls, you are not able to add
an Intercom System to the same Symmetry system, and vice versa.
By default, the Commend 416 system hardware is supported. If the Commend 200/700 system hardware
is used, the relevant parameter must be set in multimax.ini.
Overview of the Controls option
Communications Receiver
Select this option if a Bosch D6600 communications receiver is connected to the client COM port. The
baud rate must be the same as set at the receiver (default 38400).
Please refer to the Intrusion Management Installation and User Guide for details of the Bosch DD600
integration.
Communications Receiver LAN Chain
This is displayed automatically if you have selected COMNet from the Port menu.
Dial-In Alarms Reporting
Select this option if you want the COM port to be able to receive alarms from a separate Symmetry system
that has its own server.
Click here for an overview of dial-out/dial-in alarms reporting.
Dial-Out Alarms Reporting
Select this option if you want the COM port to be able to copy alarms to a separate Symmetry system that
has its own server. Note that alarms must be routed to the client specified in the Client Name box to
enable the dial-out alarms to be sent through the selected Port.
Click here for an overview of dial-out/dial-in alarms reporting.
HGU Enrollment Reader
A reader for capturing biometric hand print templates for the Biometrics tab of the "Home/Identity/Card
Holders" and "Home/Identity/Visitors" screens.
For further information, see Overview of Biometric Hand Templates and HGUs.
Intercom System
A Stentofon Alphacom Intercom System connected via a COM port.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls
and Intercom System. Also, only one client in the system can be connected via a COM port to a
Stentofon Intercom System.
224
Symmetry Software Reference Manual
Intrusion System
An intrusion system connected to a client COM port. Please refer to the Intrusion Management Installation
and User Guide for an overview of configuring and using the intrusion panels interface.
Intrusion System LAN Chain
The port for communication with intrusion systems over a network. Please refer to the Intrusion
Management Installation and User Guide for an overview of configuring and using the intrusion panels
interface.
IP Biometric Encoder
A network port used to communicate with a biometric encoder, such as the Suprema BioLite N2.
Click Configure Encoder to specify:
Description - a name for the device.
Network Address - The IP address of the device or its network (DNS) name.
LANnode Chain
The port for communication with nodes on a LAN (Local Area Network) chains. A LAN chain
communicates via a COM or Network (Ethernet) port of a client.
For full details of LAN chains, please refer to the NIC Module Configuration Guide.
Click here for details of the steps you need to take to set up a LAN chain.
Magstripe Encoder
A magstripe encoder for encoding and reading magstripe card details (available only if the Card Encoding
Module license is installed).
An encoder of this type is used for the "Maintenance/Access Control/Encode Cards" and
"Maintenance/Access Control/Read a Card" screens. It is also used at magstripe versions of the
Verification Client.
Multinode Dial-Up Chain
A port used for communication with a remote chain of nodes (via a modem. All client-initiated calls use this
port, but the remote node's modem may call this port or a secondary dial-in port.
Each port may communicate with one or more remote chains (as defined in "Install/Access
Control/Chains/Dial-Up" ).
There is a restriction on the maximum number of dial-up chains connected to each client. This is
dependent on the option purchased.
Multinode Hardwired Chain
The port for communication with the first node in a chain, where the chain does not return to a second port
on the client.
Note that the Multinode Hardwired Chain selection should be used for a chain of multiNODE-2,
multiNODE 2100, M2150, M1100, M1200, M1400 or multiNODE-2000 nodes.
Multinode Primary Bi-Directional Chain
The port for communication with the first node in a chain, where the chain returns to a second port on the
client. Communication with the nodes is normally carried out through the primary port, but if communication
is lost, the secondary port is used to communicate with the nodes on the other side of the break.
You must set up the next even-numbered COM port as the chain's secondary bi-directional port.
This option is available for odd-numbered COM ports only.
Multinode Secondary Bi-Directional Chain
The port for communication with the last node in a chain, where the chain returns to a second port on the
client.
You must set up the previous odd-numbered COM port as the chain's primary bi-directional port.
225
Client Ports ("Install/System/Client Ports")
226
Symmetry Software Reference Manual
EnableColor=0
Win95USB=0
ImageScreenResolution=1
UseMultiUSB=0
DisableMessages=0
[SignatureGem1X5]
TabletXStart=400
TabletXStop=2400
TabletYStart=350
TabletYStop=950
TabletLogicalXSize=2000
TabletLogicalYSize=600
TabletFilterPoints=4
TabletTimingAdvance=4
TabletBaudRate=19200
TabletResolution=410
3. Restart the Symmetry software.
Smart Card Encoder
A smart card encoder (reader/writer), which is available only if the Card Encoding license is installed. An
encoder can be used:
By the Encode button in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen
to encode smart cards.
By the Capture button in the "Maintenance/User & Preferences/Accounts" screen to capture
the details of a smart card for secure logons, and for secure logons themselves. An encoder
must be located at the same client at which the Capture button is used or at the client used
for secure logons.
By the "Maintenance/Access Control/Read a Smart Card" screen.
At Encoding Clients.
At smart card versions of the Verification Client.
Switcher CCTV
A CCTV switcher unit is a unit that switches camera outputs to nominated monitors. A switcher unit can be
connected to any client that supports ports.
Overview of CCTV switching
Symmetry Blue Enrollment Reader
This is a Symmetry Blue USB enrollment reader.
Adding this port causes a Bluetooth icon to be displayed in the "Home/Identity/Card Holders" and
"Home/Identity/Visitors" screens. The icon allows a Bluetooth-enabled mobile device that has been
previously installed with the Symmetry Blue mobile app, to be enrolled for the card holder or visitor. The
mobile device can then be used at Symmetry Blue readers to gain access in a similar manner to using a
conventional card.
There can be only one Symmetry Blue enrollment reader per Symmetry client.
VICON Multiplexer
This is a CCTV multiplexer.
227
Serial Device Definition ("Install/System/Serial Devices/Port Settings")
Baud Rate
Specify the communications baud rate (normally 9600 in all cases). This option is grayed out if Network has
been selected.
Add Virtual Serial Device
This option is displayed if you choose Intrusion System or Intrusion System LAN Chain from the Allocation
menu. DMP XR200 and DSC PC4020 intrusion systems allow the Symmetry software to download commands
containing user-definable messages. The messages are definable in a text format and could, for example, be
used to arm and disarm areas or display messages at keypads. A message can be sent to a panel using
Symmetry commands, such as from the Command Center.
To send messages to an intrusion system, you need to define the messages in the "Install/System/Serial
Devices/Messages" screen, and define a serial device definition for the port in the "Install/System/Serial
Devices/Port Settings" screen.
Please refer to the Intrusion Management Installation and User Guide for step-by-step guidance on how to
configure and use the intrusion interface.
Encryption
This is displayed only if an Encrypted Communications license is installed and you have logged on with System
Admin privileges (as specified in the "Maintenance/User & Preferences/Roles" screen) and Port is set to
Network. You need to select Encrypt and enter the correct encryption key if the LAN chains that the client is
supervising use a CoBox NIC module, NIC-3 (XPort) module, NIC-4 module or EN-DBU programmed with
special encryption firmware.
Selecting Encrypt enables the client to use encrypted communications to/from the LAN chains it is supervising.
The encryption key consists of 16 or 32 pairs of hexadecimal characters, depending on whether 128-bit or 256-
bit encryption is used. 256-bit encryption is FIPS140-2 compliant. The keys are not displayed if you are viewing
an existing port definition.
The keys must be programmed into the NIC module or EN-DBU.
Encryption must also be set up for the LAN chains in the "Install/Access Control/Chains/LAN" screen.
228
Symmetry Software Reference Manual
The options are grayed out if the serial device has been used in the definition of another item (such as a
scheduled command). This indicates that you must delete the item before you can change the settings here.
Node/Address
If the external equipment is to connect to an RS232/NIC module, choose the name of the node that contains
the RS232/NIC module. Address is read only and shows the selected node's address.
These options are not relevant if you have used Client Name to specify a connection to a serial port of a
Symmetry client PC.
The options are grayed out if the serial device has been used in the definition of another item (such as a
scheduled command). This indicates that you must delete the item before you can change the settings here.
LAN
This is displayed only if you have selected IPNet in the Port menu and Add Virtual Serial Device has been
selected for the port in the "Install/System/Client Ports" screen (to enable messages to be sent to an intrusion
system via the same network link used to transfer transactions from the intrusion system to Symmetry.
Select the LAN chain definition (as defined in the "Install/Access Control/Chains/LAN" screen) that identifies the
intrusion system that you want to send messages to.
Baud Rate, Data Bits, Parity, Stop Bits
The baud rate, number of data bits, parity and number of stop bits must match the requirements of the external
equipment.
These settings are not relevant if Device is Virtual is selected (if Port is a serial connection to the intrusion
panel, the baud rate is taken from the "Install/System/Client Ports" screen).
Device is Virtual
This is displayed if the Port connects to an intrusion system and has Add Virtual Serial Device selected in the
"Install/System/Client Ports" screen.
Device is Virtual is selected and permanently grayed out to indicate that the serial device definition can be
used to send messages to an intrusion system via the same serial or network link used to transfer transactions
from the intrusion system to Symmetry.
Provide Protocol
This is displayed if the Port connects to an intrusion system and has Add Virtual Serial Device selected in the
"Install/System/Client Ports" screen.
If you select Provide Protocol, the messages you intend to send to the intrusion system do not need to be
defined (in the Install/Serial Device/Messages screen) with termination characters and other data. Refer to the
help for the "Install/System/Serial Devices/Messages" screen (click here).
229
Company Definitions ("Install/System/Companies")
Message String
Enter the ASCII text string of the serial message. You can use up to 200 characters, with each character being
an ASCII value from 00 to 255.
The Message String depends on whether Provide Protocol is selected in the "Install/System/Serial
Devices/Port Settings" screen. Selecting Provide Protocol avoids the need to provide termination characters
and other data in the message string, and is the recommended choice. When Provide Protocol is not selected,
a raw format message can be sent.
Note: Please refer to the panel distributor for details of the message strings to use.
Note: The time at the panel can be updated with the PC's time by setting Provide Protocol and sending the
message string =Clock (case is important). This command can also be applied to all panel types for testing
purposes. For DMP panels, the PC's clock must be set to a 12-hour format for this message to be recognized.
Note: You can create more than one company if Micronode nodes are being used, but they must all use the
same customer code, as set up using the "Setup/Configuration/Facility/Customer Codes" screen.
Note: After changing the number of companies in a company group, users who use that company group need
to log out then back in again to see the effects of the change.
Do not forget to assign the company to the correct customer code(s) using
"Setup/Configuration/Facility/Customer Codes".
Deleting companies
If you want to delete a company, you must first "unhook" the company from the database. For example, you
need to remove the company's readers from reader groups, remove the company from company groups, etc. If
you select Delete, the system will tell you what remains to be unhooked.
Do not attempt to delete the final company; the system must always have at least one company.
230
Symmetry Software Reference Manual
General
Overview of this screen
You can use this screen to define company groups. Each company group of one or more companies. Company
groups are used in the "Maintenance/User & Preferences/Roles" screen to specify the companies that users of
a specified role have access to.
Using the Selection screen
The Selection screen is displayed when you select Company Groups from "Install/System". You can use the
Selection screen to create a new company group or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
Screen Options
Company Group Name
This is the name of the company group.
Companies Available
This box lists all of the companies that are not yet in the company group. The same company can be assigned
to more than one company group.
Assigned Companies
This box lists the companies that are in the company group.
>>/<</Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
231
LAN Chain Definitions ("Install/Access Control/Chains/LAN")
Prerequisites
Before you can use this screen, you need to use the "Install/System/Client Ports" screen to set up the client
connected to the chain.
Note: You should not disable communications for chains that are already installed and in service, as this may
cause a mismatch between the data held in the databases and at the nodes.
232
Symmetry Software Reference Manual
233
LAN Chain Definitions ("Install/Access Control/Chains/LAN")
Time Difference is also used to ensure that any alarms or events received from a remote site are logged with
the time at the remote site, rather than the time at the client PC. For example, if Time Difference is -01:00, one
hour is subtracted from the time of alarms/events that are received from a remote site.
Time Zone
This field is displayed only if the ShowTimeZoneCode setting is enabled in the ini file.
Enter the time zone code in which the chain is located. The time zone code will be shown against transactions
that relate to the chain, such as in reports and in the "Home/Monitoring/Alarms" screen.
The entered time zone code is saved only if Time Difference is not zero.
Encryption
This is displayed only if an Encrypted Communications license and you have System Admin privileges (as
specified in the "Maintenance/User & Preferences/Roles" screen). Use the options to select the type of
encryption required between the supervising client and the node at the head of the LAN chain.
Note: Encryption must also be set up for the client in the "Install/System/Client Ports" screen.
Choose:
Two Fish - If a CoBox module is used for encryption.
AES128 or AES256 (Rijndael) - If a NIC-3 (XPort) module, NIC-4 module or M2150 EN-DBU is
used. Choose AES128 if the client port uses 128-bit encryption, or AES256 if the client port uses
256-bit encryption.
Options
Choose one of the following options:
Continuous - The client will continuously poll the chain. If there are two or more continuously-polled
chains or other devices communicating with the same network port on a client, each is polled in
turn.
Periodic - The client contacts the chain only when there is data to download (such as new card
data) and at the times specified in the Periodic Contact tab. The Period Contact tab is displayed
only when Periodic is selected.
The chain always initiates communications with the client immediately on detection of an alarm condition.
Events are uploaded only when the client initiates communications.
Fallback - Select this option if the LAN chain is to use a modem at the node for fall-back
communications in the event that the standard network connection is lost. Selecting this option
displays the Fallback tab.
Secondary - Select this option if the node at the head of the LAN chain contain two NIC4 modules.
The secondary NIC module is used if the network connection to the primary fails. Each NIC
module uses a separate IP address, but only one LAN chain needs to be defined. The LAN
Configuration tab specifies the IP address for the primary NIC module. A Secondary Connection
tab is displayed, which enables you to specify the IP address of the secondary NIC module.
Continuous polling must be used if dual NIC4 communications is required.
Anti-Passback Mode
Select:
None if you do not want nodes on the LAN chain to be included in a global zonal antipassback
scheme. Selecting None does not stop the nodes from being used for a chain-level or node-level
antipassback scheme, as set up in the "Install/Access Control/Node" Screen.
Zonal (Global Client) if you want nodes on the chain to be able to be used in an antipassback
scheme that can include nodes from other LAN chains communicating with the same LAN Client
Name.
234
Symmetry Software Reference Manual
Zonal (Global System) if you want nodes on the chain to be able to be used in an antipassback
scheme that can include nodes from any other LAN chain in Symmetry.
If you select Zonal (Global Client) or Zonal (Global System), you must also select Zonal (Chain) in the
"Install/Access Control/Node" screen for any LAN node that is to be included in the global antipassback
scheme.
Each LAN Client Name can have a maximum of 16 LAN chains defined with zonal antipassback.
You must select the Continuous polling option to be able to select Zonal (Global Client) or Zonal (Global
System).
Click here for an overview of antipassback.
Enabled
Choose Enabled to allow normal communications to and from the chain.
Deselecting the option disables all server-initiated communications to the chain (such as downloading of card
data). It may be useful to disable communications while setting up a chain that has not yet been installed, as
this may prevent unwanted messages.
Note: You should not disable communications for chains that are already installed and in service, as this may
cause a mismatch between the data held in the databases and at the nodes.
Fallback Tab
Setting Up Fallback
To set up fall-back communications for a node LAN chain, you also need to:
1. Set up the information in the Fallback tab of the "Install/Access Control/Chains/LAN" screen.
2. Use the "Install/System/Client Ports" screen to create a port for a secondary dial-in chain.
3. Create a new record in the "Install/Access Control/Chains/Dial-Up" screen, and set the following options:
Client Name - Select the name of the client that is connected to the secondary dial-in port.
Port Name - Select the secondary dial-in port.
Host Initialization String - Select the modem type being used at the client, or enter the
initialization string if a different modem is being used.
Host Phone Number
This specifies the telephone number of the modem at the client.
Remote Phone Type
This specifies whether the LAN chain's modem uses pulse or tone dialing.
Remote Initialization String
Select the type of modem connected to the LAN chain. This automatically selects the appropriate initialization
string. Alternatively, enter the required initialization string if a different modem is being used (refer to the
modem manual).
235
Dial-Up Chain Definitions ("Install/Access Control/Chains/Dial-Up")
236
Symmetry Software Reference Manual
3. Create another dial-up chain record making sure that you select the appropriate secondary dial-in Port
Name as defined in "Install/System/Client Ports". All of the fields will be grayed out except Host
Initialization String, in which you define the type of secondary dial-in modem connected to the client, or
its initialization string.
237
Dial-Up Chain Definitions ("Install/Access Control/Chains/Dial-Up")
Note: You should not disable communications for chains that are already installed and in service, as this may
cause a mismatch between the data held in the databases and at the nodes.
Time Difference
Specify the time difference between the client and remote chain. A negative time means that the time at the
chain is behind that of the client, and vice versa.
When the system adjusts the time at remote nodes, it uses the Time Difference setting to add or subtract the
correct number of hours to set the correct time at the remote nodes.
Time Difference is also used to ensure that any alarms or events received from a remote site are logged with
the time at the remote site, rather than the time at the client PC. For example, if Time Difference is -01:00, one
hour is subtracted from the time of alarms/events that are received from a remote site.
Time Zone
This field is displayed only if the ShowTimeZoneCode setting is enabled in the ini file.
Enter the time zone code in which the chain is located. The time zone code will be shown against transactions
that relate to the chain, such as in reports and in the "Home/Monitoring/Alarms" screen.
The entered time zone code is saved only if Time Difference is not zero.
238
Symmetry Software Reference Manual
Before you can use this screen, you need to use the "Install/System/Client Ports" screen to set up a port to be
used for dial-out alarms reporting.
Click here for an overview of dial-out/dial-in alarms reporting.
239
Dial-In Alarm Definitions ("Install/Access Control/Chains/Dial-In Alarm")
Password
Specify the password the dial-out site must supply to the alarms-receiving site to establish communications.
The password must be the same as defined in the "Install/Access Control/Chains/Dial-In Alarm" screen at the
alarms-receiving site. The alarms-receiving site will not allow communications if the password is incorrect.
Initialization String
Select the type of modem connected to the port named in Dial-Out Port Name. This automatically selects the
appropriate initialization string. Alternatively, enter the required initialization string if a different modem is being
used (refer to the modem manual).
Enabled/Disabled
Choose Enabled to allow normal communications to the alarms-receiving site.
Selecting Disabled disables all communications to the alarms-receiving site. It may be useful to select
Disabled while setting up the system, as this will prevent unwanted communications.
240
Symmetry Software Reference Manual
Enabled/Disabled
Choose Enabled to allow normal communications with the dial-out site.
Selecting Disabled prevents communications from taking place with the dial-out site.
Note: Some options documented in this help topic may not be available, depending on the node type you are
configuring.
Note: You need to close and reopen the Selection screen to see any change of chain status.
Prerequisites
The chain on which the node is located must have been set up using the Hardwired, LAN or Dial-Up option in
the "Install/Access Control/Chains" menu.
This is not required for an EN or M4000 nodes.
Node Description
A unique name for this node.
Location
Click here for information about this option.
Category
Click here for information about this option.
Account Number
Click here for information about this option.
Area Number
Click here for information about this option.
Zone Number
Click here for information about this option.
241
Node Definitions ("Install/Access Control/Node")
Tabs
Setup Tab
Chain Name
This specifies the chain that the node is to be connected to.
Chain name for EN and M4000 nodes
You do not specify a chain name for EN or M4000 nodes. To add a new EN or M4000 node, select
<New> and choose the node from the Node Type menu.
Chain name for ASSA ABLOY DSR nodes
To add an ASSA ABLOY Door Service Router (DSR), select <New> and choose Assa Abloy DSR
from the Node Type menu.
Please refer to the Third-Party Access Devices Configuration and User Guide for an introduction to
the integration with ASSA ABLOY DSR locks.
Chain name for SR-Series nodes
For SR-Series nodes, you can select:
The <New> option to create a new chain for a network-attached node. The new chain
will be named the same as Node Description. Once you have selected the Node
Type, you can use the Discover button to discover this first node on the chain (the
node connected to the network). Note: A chain created in this way is not available in
the "Install/Access Control/Chains/LAN" screen.
An existing chain previously created using <New>.
An existing hardwired or dial-up chain.
Note: Deleting the first node on an SR-Series chain created using <New> makes the node with the
lowest address the first node, and the chain is renamed accordingly.
By default, Chain Name and Node Address are grayed out if you have opened an existing node. This can
be changed using a setting in multimax.ini.
Node Type
Note: Your system may not show all of the following, or may show earlier node types.
242
Symmetry Software Reference Manual
The node can be set up in this screen without the need for a client port and chain to be set up
previously.
EN-2DBC
This is a two-door controller with built-in database unit. The device provides:
An integrated network port.
The ability to be used as an M2150 intrusion node.
The ability to be powered over Ethernet (PoE).
Support for version 3 of the Simple Network Management Protocol (SNMP). This
allows status monitoring by third-party network applications.
The node can be set up in this screen without the need for a client port and chain to be set up
previously.
Multinode-2
A standard multiNODE-2 using through-hole or the later surface-mount boards. (Note for installers
who are used to installing pre-MultiNODE-2 nodes: this option removes any link between reader
alarms and auxiliary outputs.)
Multinode-2 Alarm Panel
A multiNODE-2 automatically configured to enable monitor points and auxiliary outputs to be set up
for the arming and disarming of alarm panels. The arming and disarming are actioned through the
use of card commands. Refer to Customer Support for further details.
Multinode-2-Alarm Relays
A multiNODE-2 automatically configured to emulate a Micronode, where the auxiliary outputs on the
I/O module have a fixed purpose (aux output 1 = x relay, aux output 2 = Reader A alarm, aux output
3 = y relay, aux output 4 = Reader B alarm).
Multinode-2 Card Relays
A multiNODE-2 automatically configured to enable the node's auxiliary outputs to be grouped into
output groups and switched on when a card is granted access from the reader nominated as the
Card Relays Reader in the "Install/Access Control/Reader" screen.
For further information, see Overview of Output Groups and Card-Relay Nodes.
Multinode-2 Elevator
This node is based on the multiNODE-2 hardware but contains other elevator interface boards. If
selected, only one reader can be used with the node (reader 1; the elevator reader). The auxiliary
outputs can be grouped into floor groups, which specify the floor-selection buttons that are enabled
on the elevator control panel when a card is granted access. The node's monitor points can be used
to monitor the floor-selection buttons pressed on the elevator control panel. Up to 32 access-
controlled floors can be used.
Multinode-2 with ACR
Select this node type if the node is a multiNODE-2 used in conjunction with a remote alarm
controller.
Multinode-2+ node types
This is functionally the same as the Multinode-2 node type, but offers built-in mains failure and
tamper reporting without the need to use I/O-module monitor points. Three models are available,
each giving a different maximum card capacity. The card capacity of the multiNODE-2000 being
used must be selected in Cards/Transactions.
multiNODE-2000 Alarm Mode
This configures a multiNODE-2000 node to give the same functions as theMultinode-2 Alarm Panel
node type.
243
Node Definitions ("Install/Access Control/Node")
244
Symmetry Software Reference Manual
M2150 nodes can use alarm and output controllers, as well as door controllers.
After selecting this node type, you must configure the controllers used by the node in the Door & I/O
Controllers tab.
M1100, M1200 and M1400
These node types are collectively known as multiNODE-1000 (M1000). The M1100 and M1200 are
available only with the Business Edition version of the Symmetry software. The M1400 is available
only with Professional Edition and above.
A license is required for each reader connected to M1100 and M1200 nodes. If fully licensed, the
Symmetry software allows up to 16 readers connected to M1100 nodes to be defined, and up to 64
readers connected to M1200 nodes to be defined. There is no system maximum for readers
connected to an M1400.
The M1100 supports up to 1000 card holders and/or visitors, the M1200 supports up to 2000, and
the M1400 supports up to 4000. Two-reader and four-reader variants of each type are available.
No other node types can exist on the same chain as a M1100/M1200/M1400. A mixture of 1100,
1200 and 1400 nodes are not allowed on the same chain.
M2150 EN-DBU
An M2150 node with an on-board network port, configurable number of controllers, mains failure and
tamper reporting.
The node can be set up in this screen without the need for a client port and chain to be set up
previously.
The card and transaction capacity of the database unit must be selected in Cards/Transactions.
M2150 nodes can use alarm/output controllers, as well as door controllers.
You must configure the controllers used by the node in the Door & I/O Controllers tab.
M4000
M4000 is an intelligent next-generation node for Symmetry access-control systems. The node offers
enhanced flexibility over the way the hardware is configured, a local database that is able to support
up to 1 million card holders and 65,000 offline transactions, and a 1Gbit network interface with AES
encryption.
M4000 includes a built-in web interface, which is used to specify and configure all hardware in the
node. For example, the web interface is used to specify:
The number of door-entry and input/output controllers being used.
The number and type of readers being used.
The number and purpose of each input and output. M4000 does not have dedicated
reader and door ports; instead, each input and output is configurable.
The supervision level being used for each input.
When you add a new M4000 node in Symmetry, the system automatically uploads all readers,
monitor points and auxiliary outputs configured in the web interface, and adds these items to the
relevant screens in the Symmetry software. With M4000, you cannot create new readers, monitor
points, etc. in Symmetry - this must be carried out using the web interface.
You can add a new M4000 node without the need to define a client port and chain first.
After selecting M4000 from the Node Type menu, click Discover to discover the device on the
network.
For full information about how to plan, install and configure an M4000 system, please refer to the
M4000 Commissioning Guide.
Address and Callback Port
These fields are displayed only if you have selected Assa Abloy DSR from the Node Type menu.
In Address, enter the URL that Symmetry should use to communicate with the DSR. This should include
the port number (e.g. http://10.0.0.55:8080).
245
Node Definitions ("Install/Access Control/Node")
In Callback Port, enter the address and port number that the DSR should use to send events to
Symmetry. This is in the format:
http(s)://Symmetry_Server_IP_Address:Port
For example, https://10.0.0.66:9090
Please refer to the Third-Party Access Devices Configuration and User Guide for further information.
Node Address
This is the node address on the chain. Addresses that are already used in a chain are not displayed in the
pull-down list.
Each entry in the list may show an address outside brackets, followed by an address inside brackets. Any
addresses shown in brackets relate to the old addressing scheme (1 to 249). Addresses shown outside the
brackets relate to the latest addressing scheme, which uses addresses in the range 1 to 32.
Note: This information is not required if you are defining an M2150 EN-DBU, EN-1DBC, EN-2DBC, EN-
LDBU or M4000. These devices do not support multiple nodes on the same chain.
By default, Chain Name and Node Address are grayed out if you have opened an existing node. This can
be changed using a setting in multimax.ini.
Cards / Transactions
This specifies the amount of memory in the node that is to be reserved for card details. If you specify a
higher limit for the maximum number of cards, the amount of memory available for logging historical
information is reduced. For example, 7,000/4.3K means that with an area of memory reserved for 7,000
cards, the maximum number of stored events and alarms is 4,300.
For multiNODE-2 nodes, the pull-down menu includes different choices for nodes fitted with extended,
rather than standard, memory - make sure you choose the correct setting.
If the node type selected is a multiNODE-2000 or multiNODE-2100, the Cards/Transactions setting you
choose must correspond to the model variant purchased.
Wiegand Format
This lists all Wiegand card formats, as defined in the "Install/System/Default Settings/Reader/Card formats"
screen. The format you choose determines the format used by all readers connected to the node that have
"Default Wiegand" (for example, Series 600/700/800 using Default Wiegand) in the name of the Reader
Type, as specified in the "Install/Access Control/Reader" screen.
Video Server Connection
Not used.
Number of Cabs
This is displayed only for an M2100 elevator node.
Select the number of cabs the elevator node is to control (one reader per cab).
If you select one cab, auxiliary outputs 1 to 64 are available to control floors 1 to 64.
If you select two cabs, auxiliary outputs 1 to 16 are for the first 16 access-controlled floors
for cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the first 16 access-controlled floors for
cab 2 (reader 2). Auxiliary outputs 33 to 48 are for the last 16 access-controlled floors for
cab 1 (reader 1). Auxiliary outputs 49 to 64 are for the last 16 access-controlled floors for
cab 2 (reader 2).
If you select four cabs, auxiliary outputs 1 to 16 are for the 16 access-controlled floors for
cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the 16 access-controlled floors for cab 2
(reader 2). Auxiliary outputs 33 to 48 are for the 16 access-controlled floors for cab 3 (reader
3). Auxiliary outputs 49 to 64 are for the 16 access-controlled floors for cab 4 (reader 4).
Options:
246
Symmetry Software Reference Manual
247
Node Definitions ("Install/Access Control/Node")
248
Symmetry Software Reference Manual
Anti-Passback Mode
Specifies the antipassback mode for the node. This is not displayed if the Node Type is an elevator node.
Note: You must also specify the readers to be used for antipassback in the "Install/Access
Control/Reader" screen.
249
Node Definitions ("Install/Access Control/Node")
In addition, if the node's card memory becomes full, the details of the least-recently-used card are
removed from the node. If the card is used again, the details have to be relearnt.
Learn mode maximizes the efficient use of memory in the nodes, but causes a slight delay while the
node learns the details. On suitable readers, the green and red lights flash alternately while the node
learns the details.
Symmetry services must be running at the server to enable a card to be learnt (this will be the case if
Symmetry has been installed and set up correctly). In addition, the Symmetry software must be
running at the client that is communicating with the chain.
Card Usage (Wait Time)
This option is available only if Node Supports Card Usage Remaining has been selected. Use the field to
specify the length of time the node must wait for an access-control decision from the Symmetry software.
Entry/Exit Delay
This option is available if Supports Intrusion Functionality is selected.
The option determines the length of time allowed for a card holder to:
Pass through the entry/exit route after arming an area. An alarm is generated if the card
holder triggers an entry/exit route sensor after the specified time period has expired.
Disarm an area after triggering a sensor in the entry/exit route. An alarm is generated if the
card holder fails to disarm the area within the specified time period.
PC Door Control
This specifies the maximum period of time that a guard can take in the "Home/Identity/Verification" screen
to decide whether to grant or deny access to a transaction from a reader that is in PC door control mode.
See PC Door Control for further information.
Disable Reader Time
This option is not currently supported. It will be used to provide support for BIXI RS485 readers.
Floor Selection Options
This is displayed if the Node Type is an elevator node.
Disabled means that the node is not connected to the elevator control panel to recognize when a floor-
selection button is pressed. When a card is used at the reader, another card cannot be used until the Time
To Select A Floor ("Install/Access Control/Reader" screen) has elapsed; this is to give time for a button to
be pressed.
Common means that the node has one of the inputs to the Elevator Interface Module (such as the input
for the pair of connections Button Row 0, and Common 0) connected to the elevator control panel to
recognize when a floor-selection button is pressed. When a card is used at the reader, another card
cannot be used until the Time To Select A Floor ("Install/Access Control/Reader" screen) has elapsed or
until a floor-selection button is pressed. This option is available only for multiNODE-2 elevator nodes.
Individual means that the node is connected to each button of the elevator control panel to recognize
when a specific floor-selection button is pressed. When a card is used at the reader, another card cannot
be used until the Time To Select A Floor ("Install/Access Control/Reader" screen) has elapsed or until a
floor-selection button is pressed. This mode also enables the selected floor number to be included with the
transaction details. For multiNODE-2 elevator nodes, a monitor point definition must be set up for each
floor button monitored (not necessary for M2000 or M2100 elevator nodes).
Enable Node
Choose Enable Node to allow normal communications to and from the node.
Deselecting Enable Node disables all server-initiated communications to the node (such as downloading
of card data). It may be useful to deselect Enabled while setting up a node that has not yet been installed,
as this may prevent unwanted messages.
250
Symmetry Software Reference Manual
Note: You should not deselect Enable Node for a node that is already installed and in service, as this
may cause a mismatch between the data held at the databases and at the node.
251
Node Definitions ("Install/Access Control/Node")
Communications Tab
Note: This tab is displayed only for an EN node. Use the Discover button before setting up the details of a new
node of this type.
Note: After saving, you can edit the communication settings only if you remove the check mark from Enabled,
save the information and re-open the node definition. Remember to re-enable communications.
Client Connected to
Select the name of the client that will be used to communicate with the node, as defined in the
"Install/System/Clients" screen.
Enabled
Choose Enabled to allow normal communications to and from the node.
Network Address
Enter in this field the IP address or network (DNS) name of the node, as configured using the separate
configuration tool (such as G4Flashnet).
If you have used Discover, this field is automatically populated with the network name of the node, as
configured using the separate configuration tool. You can replace this with the IP address, if you wish.
Gateway IP Address
A gateway is an IP router that forwards traffic to destinations beyond the local network. If the node is on a
separate IP network segment from the client, connected through a gateway, specify the local IP address of
the gateway.
Subnet Mask
Specify the subnet mask number obtained from the network administrator. This number identifies which
network segment the node is on.
Current Password
This displays the current password (if previously set and saved) that the client uses to log into the node.
New Password
You can assign a password of up to 16 alphanumeric characters. Whenever the selected client
communicates with the node, it supplies the password to obtain access to the data held in the node. This is
a security measure to prevent unauthorized access to the data.
It is recommended that you specify a password, but if you leave the field blank, no password is used.
With nodes that have specific firmware (please contact your technical support representative for details), a
Too Many Login Failures alarm is generated if three or more unauthorized login attempts are made while
the node is offline. The alarm is generated when Symmetry reestablishes communications.
Time Difference
Specify the time difference between the client and node. A negative time means that the time at the node
is behind that of the client, and vice versa.
When the system adjusts the time at the node, it uses the Time Difference setting to add or subtract the
correct number of hours to set the correct time.
Time Difference is also used to ensure that any alarms or events are logged with the time at the node,
rather than the time at the client PC. For example, if Time Difference is -01:00, one hour is subtracted
from the time of alarms/events that are received from the node.
Host settings
Primary IP Address
This option is available if you have chosen "Periodic" or "Continuous connection established by
Controller" in Connection Type. For a period connection, enter the IP address of the client specified
252
Symmetry Software Reference Manual
in Client Connected to. For "Continuous connection established by Controller" enter the IP address
of the Symmetry server.
Secondary IP Address
This option is available if you have chosen "Continuous connection established by Controller" in
Connection Type. Enter the IP address of the secondary (backup) Symmetry server, or 0.0.0.0 if
you are not using a secondary server. This is a non-standard feature that should be used only under
guidance from your Technical Support Representative.
Port Number
Enter the port number to use at the Symmetry client/server specified by the Primary/Secondary IP
address.
You may want to change the port number that the node uses if the network administrator has
policies regarding port usage.
It is recommended that you do not change the default of 3001 without consulting technical support.
Note: The port number changes automatically from 3001 to 3002 if you select Continuous-
connection established by Controller for Connection Type.
Options
Connection Type
Choose one of the following options:
Continuous-connection established by server/client
The client will continuously poll the node. If there are two or more continuously-polled nodes or
other devices communicating with the same network port, each is polled in turn.
Periodic
The client contacts the node only when there is data to download (such as new card data) and
at the times specified in the lower area of the tab. The node always initiates communications
with the client immediately on detection of an alarm condition. Events are uploaded only when
the client initiates communications.
Continuous-connection established by Controller
The node will continuously poll the Symmetry server specified in Primary IP Address. If you
select this option, also enter the Remote Interval and MAC Address.
Fallback
Select this option if the node is to use a modem for fall-back communications in the event that the
standard network connection is lost. Selecting this option displays the Fallback tab.
The Baud rate for the fallback modem is set in the LAN tab.
Secondary
Select this option if the node at the head of the chain contains two NIC4 modules. The secondary
NIC module is used if the network connection to the primary fails. Each NIC module uses a separate
IP address. The Communications tab specifies the IP address for the primary NIC module. The
Secondary Connection tab enables you to specify the IP address of the secondary NIC module. The
Continuous connection established by server/client option must be used if dual NIC4
communications is required.
Call Time and Recall Interval
CallTime specifies the time at which the client automatically calls the node for the first time in each
day. If more than one automatic call is required, specify the period between automatic calls in Recall
Interval.
This is for a Periodic connection type only.
253
Node Definitions ("Install/Access Control/Node")
254
Symmetry Software Reference Manual
system name, part number, firmware version, PCB revision, door status, input status, PoE
status and Symmetry online status.
sysUpTime (object ID .1.3.6.1.2.1.1.3.0) - Uptime (milliseconds)
ifType (object ID .1.3.6.1.2.1.2.2.1.3.1) - Network interface type
ifMtu (object ID .1.3.6.1.2.1.2.2.1.4) - Network max transmission unit
ifSpeed (object ID .1.3.6.1.2.1.2.2.1.5) - Network speed in bytes/sec
ifPhysAddress (object ID .1.3.6.1.2.1.2.2.1.6) - Network MAC address
ifInOctets (object ID .1.3.6.1.2.1.2.2.1.10) - Number of received packets
ifInDiscard (object ID .1.3.6.1.2.1.2.2.1.13) - Number of dropped packets
Anti-Passback Mode
The following are available if you select the Continuous polling option:
None if you do not want to use either of the following two options. Selecting None does not
prevent other nodes in the same chain from being in the same antipassback scheme if
Zonal (Chain) is selected in the Setup tab.
Zonal (Global Client) if you want the node to be able to be used in a zonal antipassback
scheme with readers from other nodes that communicate with the same client over a LAN.
Ensure Zonal (Chain) or Zonal is selected in the Setup tab.
Zonal (Global System) if you want the node to be able to be used in an antipassback
scheme with readers from any other nodes in Symmetry. Ensure Zonal (Chain) or Zonal is
selected in the Setup tab.
Click here for an overview of antipassback.
Encryption
This option is displayed only if you have System Admin privileges (as specified in the "Maintenance/User &
Preferences/Roles" screen) and the Encrypted Communications license is installed.
The option specifies the type of encrypted communication to use between the node and the managing
client computer.
Select None to disable encryption, or choose one of the displayed encryption types to enable encryption.
If you enable encryption, make sure that the node supports the selected encryption type.
Reporting Tab
This tab specifies whether each message causes an alarm, event or is not reported at all at the node.
This specification is at the node level, not at the server level. Therefore, although you may define a message as
an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the message is to be
reported as an event by the server. Such an approach may be needed if it is important for a node on a remote
site to communicate the message to the server immediately (only alarms are sent immediately to the server).
In addition, note that the "Operation/Alarms/Routing" screen may block node alarms from being displayed.
See Alarm/Event Messages for details of each message.
LAN Tab
The LAN tab is displayed if you are setting up a node that communicates over a network with the Symmetry
client PC. The tab allows you to specify additional information about the connection.
LAN Chain First Node
Select Yes only if the node is the first node in a chain; that is, it connects directly to the network or to a
PAD device.
Inter-message Timeout and Retry Timeout
These options are grayed out and can be adjusted only under consultation with your Technical Support
representatives.
255
Node Definitions ("Install/Access Control/Node")
256
Symmetry Software Reference Manual
The address of an M2100 ACR or 4DCR-P must be set to 1, 3, 5 or 7 only, since the device
occupies two addresses.
The M2150 8DC occupies four addresses and must be set to address 5.
Symmetry enforces the above addressing rules.
Description
Using the Description field, specify a meaningful description for each controller based on its location or
function. The description will be used when setting up readers, auxiliary outputs and monitor points
connected to the controller. It is also used by the Node Tamper and AC Power Fail alarm/event messages
to indicate the controller that is at fault.
Selecting Use Controller Type As Description causes each description to be automatically set to the
same as the controller type, but using this option is not recommended.
Secondary Connection Tab
This tab is displayed if Secondary is selected in the Communications tab to indicate that the node at the head
of the chain contains two NIC4 modules.
The Communications tab specifies the IP address for the primary NIC module. The Secondary Connection tab
enables you to specify the IP address of the secondary NIC module.
Fallback Tab
This tab is displayed if Fallback is selected in the Communications tab to indicate that the node uses a modem
for fall-back communications in the event that the standard network connection is lost.
The Baud rate for the fallback modem is set in the LAN tab.
Discover
Click this button to display a screen that enables you to locate a discoverable node on the network (e.g. EN or
M4000 node).
Each has a unique MAC address, which is displayed in the screen and printed on a label on the case or
Ethernet port. Select the node, and click OK. Depending on the node type, you may need to use the
Communications tab to set up other communications settings. If the network has a DHCP server, the node is
automatically allocated an IP address.
To be listed in the screen, the node must be on the same subnet as the computer you are using.
If you are defining a new node, only those that have not yet been defined in the Symmetry software are listed.
If you have opened an existing node definition, clicking Discover lists all nodes that have not yet been defined,
and the node you have opened. This enables you to re-assign the current node definition to a new node
(perhaps to replace a faulty unit). The current node assigned to the node definition is marked by an asterisk (*)
in the Current column. You can use this feature to set up node definitions before the hardware is installed.
Note: The Selection screen lists readers with their chain, node, multiNODE-2100/2150 controller and reader
addresses. For example, 1/001/2/4 means chain 1, node 001, controller 2 and reader 4. For readers not
connected to an multiNODE-2100/2150 controller, the controller address is not applicable and therefore the
controller address is shown as "-"; for example, 1/001/-/4.
257
Reader Definitions ("Install/Access Control/Reader")
Note: Set up shared reader groups ("Setup/Device Groups/Shared/Shared Readers") if you want the reader to
be used by more than one company.
Note: Some options documented in this help topic may not be available, depending on the node type you are
configuring.
Note: For M4000 nodes, all reader configuration is carried out in the web interface, not in this screen. The
readers set up in the web interface are automatically imported into this screen.
Prerequisites
The node that the reader is connected to must have been set up using the "Install/Access Control/Node"
screen.
Reader Description
A unique name for this reader.
For M4000 nodes, if a reader (access point) is deleted in the web interface, the name is prefixed with "Del", but
remains undeleted. This allows you to view, modify or remove any locations where the reader is used in
Symmetry, such as in access rights or commands.
If a Hand Geometry Unit (HGU) reader at an HGU node is selected, the description is divided into two 16-
character fields. The reader description is also displayed at the HGU reader as the default message, and the
two fields represent the two-line message at the HGU reader.
Location
Click here for information about this option.
Category
Click here for information about this option.
Tabs
Setup tab
Owned by Company
Select the company that is to own the reader.
Account Number
Click here for information about this option.
Area Number
Click here for information about this option.
Zone Number
Click here for information about this option.
Node Description
Choose the node or controller that the reader is connected to.
Lock Address
This option is displayed only if the node selected in the Description menu is an EN-LDBU.
Specify the address of the reader; this is the EAC Address displayed in the Aperio Programming
Application.
For further information, please refer to the Aperio Locks Configuration and User Guide.
Controller Description
This pull-down list is relevant only if you have selected a multiNODE-2100 or multiNODE-2150 node type.
Choose the controller that the reader is connected to.
258
Symmetry Software Reference Manual
Reader Type
In most cases, this menu selects the reader or card format name, as defined in the Reader/Card Formats
screen.
If available, selecting Display Additional Reader Types increases the number of reader types listed in the
menu.
If you choose a reader type that has "Default Wiegand" in its name (for example, Series 600/700/800
using Default Wiegand), the card format used is defined in Wiegand Format in the "Install/Access
Control/Node" screen.
For ASSA ABLOY locks, you can choose either a DSR PoE or DSR Wifi lock type from this menu.
A Hand Geometry Unit (HGU) reader can be selected if the node type selected is an HGU node.
Overview of Biometric Hand Templates and HGUs
Reader Port Number
This specifies the reader port number that the reader is connected to. Ports that are already used are not
displayed in the pull-down list. The multiNODE-2 and M2000 elevator nodes have just one reader port.
M2100 elevator nodes have four reader ports for up to four cabs.
Click here for information about installing HGU nodes.
MCLP (20 mA), RS 485, Wiegand, Custom Messages (20mA)
Some reader types have different communication options. Choose the communication method used by the
reader. For example, 20mA MultiNODE Current Loop Protocol (MCLP).
Choose Custom Messages (20mA) if the reader is an M2150 intrusion reader. Only certain reader types
can be used as M2150 intrusion readers.
Facility/Customer Code
A node always requires a customer code (otherwise known as facility code) to be provided following a
transaction at a reader. The customer code plus the card number makes the card unique to a specific
company. You can use "Setup/Configuration/Facility/Customer Codes" to assign a customer code to one
or more companies.
Normally, the reader supplies the customer code after reading a swiped card. However if, for example, the
reader is in user-code mode or the card does not store a customer code, the reader is not able to supply
the customer code. In these situations, the customer code defined in this field is used. The node combines
this customer code with card number, finds the corresponding record as set up in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen, then determines whether or not to grant access.
Remember that each person has just one customer code allocated in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. Therefore, all the readers that the person is going to use that do not read a
customer code must have the same customer code.
Every customer code must be allocated to the appropriate companies in the Facility/Customer Codes
screen.
You only need to specify a default customer/facility code if the reader/card format does not supply a
customer code.
Display Additional Reader Types
Choose this option to display additional reader types in the Reader Type menu. With this option not
selected, only the most popular readers are listed.
Supports 4 Line Display
Select this option if the selected reader has a customizable 4-line display. This option is available only if
the reader is an M2150 intrusion reader; that is, Custom Messages (20 mA) is selected.
Reader State
Note that the reader's Card Only/Card+PIN/Disabled mode can also be altered by the use of a command.
Card Only - If selected, card holders and visitors do not have to enter a PIN.
259
Reader Definitions ("Install/Access Control/Reader")
Card + PIN - If selected, card holders and visitors have to enter a PIN after presenting their
card.
Customer Code Only-No Store and Customer Code Only-Store - These modes cause
readers to allow access to any card that has a customer code that is the same as one of the
customer codes stored in the reader's node.
If you select Customer Code Only-Store, each transaction causes the customer code to be
recorded in the log. Otherwise, no log information is stored.
Disabled - If selected, the reader is disabled.
Anti-Passback Options
A Hard antipassback reader logs an antipassback violation as an alarm/event and does not grant access.
A Soft antipassback reader logs an alarm/event, but does grant access. None specifies that the reader is
not an antipassback reader.
Soft and Hard and the antipassback fields do not apply if the node that controls the reader is set up as an
elevator node or has not been set up for antipassback.
The Zonal Data options are available if the reader's node is set up for zonal antipassback. The Timed
Data options are available if the reader's node is set up for timed antipassback.
Using the "Install/Access Control/Node" screen (and the "Install/Access Control/Chains/LAN" screen, if
LAN chains are used), you can specify which nodes to include in the same antipassback scheme. All
readers on these nodes will be in the same antipassback scheme.
Note that the maximum value for Passback Timeout is 63 minutes. An exit antipassback reader is defined
by setting the timeout value to zero. In this case, the card can be used at any time without causing an
alarm or event. This allows for situations where a person enters an antipassback-protected area, then
wishes to exit the area immediately, perhaps, for example, because he or she forgotten something. The
use of an exit antipassback reader also causes the time delay for reuse of the card to be zeroed, so the
person can reenter the antipassback-protected area immediately, without having to wait.
For zonal antipassback, use zone numbers between 1 and 63. Zone 0 is the Symmetry default "neutral"
zone. A card can enter or exit the neutral zone without violation.
Note that zonal (chain) antipassback mode is not available for nodes on dial-up chains. Use zonal (local)
or timed antipassback for nodes on dial-up chains.
Click here for an overview of antipassback.
Intrusion
The intrusion options are available if the intrusion cost option is installed, and are relevant only for M2150
intrusion systems. A suitable Reader Type must also be selected.
Note: Please refer to the M2150 Intrusion Guide for system examples.
Arming/Disarming Reader
Select this option if the reader is an M2150 intrusion reader that will be used to arm and disarm
areas.
Note:
The reader must connect to the same node as the zones in the areas to be armed or
disarmed.
There can be more than one M2150 intrusion reader per node.
Selecting this option does not prevent the reader from being used also as an access-
control reader located outside the protected area.
Assign the reader to an area using the "Setup/Device Groups/Intrusion Areas" screen.
Card holders require area access rights to arm or disarm intrusion areas. The access
rights can be set up in the "Home/Identity/Card Holders" screen.
Card holders require reader access rights if the reader is also used for access control.
260
Symmetry Software Reference Manual
This option is selected and grayed out if the reader is controlling a third-party intrusion
area. M2150 arming/disarming readers can be set up to do this in the
"Install/Intrusion/Intrusion/Device Configuration" screen.
Final Exit
Select this option if the reader door monitor is needed as a final exit sensor. This will cancel the exit
timer of the area associated with the reader when the door monitor is triggered.
Restrict Keypad to assigned Area
When selected, all functions at the reader are restricted to the area the reader is assigned to, as
specified in the "Setup/Device Groups/Intrusion Areas" screen. This means that a card holder is able
to arm, disarm, select, change the arming time and view only the area the reader is assigned to
(providing the area is also in the card holder's access rights). The reader will reflect the status of
only the area that it is assigned to.
Entry/Exit Route
Select this option if you want the exit timer to start when a card holder arms an area at the reader.
Any valid activations of the door monitor (such as from a valid card transaction or exit request) are
ignored while the exit timer is running. The entry timer starts if the door monitor is activated when the
area is armed.
Comms Receiver Alarm Type
This option is applicable if an intrusion license is installed, and is relevant only if a communications
receiver is set up in the "Maintenance/User & Preferences/System Preferences" screen.
Choose whether an alarm generated by the reader should be reported as a burglary, fire or generic
alarm. Only intrusion alarms are relevant.
Guid and Serial Number
These are displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu.
The fields are completed automatically when you select a lock using Discover.
The Guid is the lock ID. If you have the Guid and serial number of a lock (such as from the DSR Support
Tool), you can enter this information directly into the fields rather than using Discover.
Extended Unlock Time, Unlock Duration, Door Ajar Duration
These are displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu
Extended Unlock Time - This unlock time (in seconds) is used for card holders who have Extended Door
Times set in the "Home/Identity/Card Holders" screen.
Unlock Duration - This is the normal length of time (in seconds) that a lock remains unlocked after a
successful "Access Granted" event.
Door Ajar Duration - This specifies the length of time (in seconds) that the door must remain open before
a "Door Held Alarm" is generated.
Double Swipe/Passage Mode
This is displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu.
If you select this setting, card holders who have Passage / Double Swipe Mode selected in the
"Home/Identity/Card Holders" screen will be able to permanently unlock or lock the reader using their card.
Deadbolt Override
This is displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu.
If you select this setting, card holders who have Deadbolt Override selected in the "Home/Identity/Card
Holders" screen will be able to gain access including at times when the lock's deadbolt is thrown. Other
cards that do not have the setting are rejected when the deadbolt is thrown..
261
Reader Definitions ("Install/Access Control/Reader")
Modes tab
Key Card Mode
If enabled, the reader can recognize keycards, as set up in the "Home/Identity/Card Holders" screen. A
keycard holder can switch the reader between keycard-in and keycard-out states (access rights permitting)
by presenting his or her card, followed by PIN with the first and last two digits swapped. For example, this
being 3412 for a PIN of 1234, or 78345612 for a PIN of 12345678. When a reader is in keycard-out state,
all cards except keycards are denied access, irrespective of access rights. When a card reader is in
keycard-in state, normal operation is resumed.
Manual, scheduled and trigger commands can also be used to switch a reader into keycard-in or keycard-
out states.
Duress Mode
Note: This setting is not relevant for Suprema BioLite N2 fingerprint readers (please refer to the Third-
Party Access Devices Configuration & User Guide for details of how to configure duress for these
readers).
If enabled, a card holder or visitor can signal that he or she is gaining access under duress from another
person.
Click here for details of how duress is signaled.
A duress transaction generates the Duress alarm/event message, but still allows access or arms/disarms
the system.
Note: To enable duress signalling, configure the reader to require a PIN to be entered.
Two-Card Timeout
If set to a value other than zero, two cards must be used at the reader within the specified time before
access is granted.
Note: This option is grayed out if the reader is connected to an elevator node.
PC Door Control
Select this option if you want the reader to be in PC door control mode by default. If deselected, the default
mode is automatic door control mode. Selecting or deselecting this option does not affect the ability to
switch the reader between modes.
The option is selected automatically if Enable Random Search is selected.
Click here for further information.
Card Relays Reader
This option is available only when the reader is connected to a Multinode-2 Card Relays node type.
Setting this option specifies that the reader is used for the card relays feature.
Only one reader on a node can be selected as the card relays reader. Therefore, you cannot set Card
Relays Reader for more than one reader connected to the same node.
Understanding and Installing Card-Relay Nodes
Enable Random Search
Determines whether card transactions at the reader will cause random card holder searches. Selecting this
option causes PC Door Control to be automatically selected.
The Level setting determines whether there is a high or low probability of a search at the reader.
See Random Search.
262
Symmetry Software Reference Manual
Note: This setting is not relevant for Suprema BioLite N2 fingerprint readers (please refer to the Third-
Party Access Devices Configuration & User Guide for details of how to configure duress for these
readers).
The fingerprint mode is relevant only if you have selected a Series 800 (S81x) fingerprint reader. Choose
the fingerprint mode:
Disabled - If you do not want the reader to request a fingerprint. The reader will operate as
a standard contactless smart card reader.
Single Fingerprint - If you want the reader to request only one fingerprint. If two fingerprints
are enrolled on a card, but an s81x fingerprint reader is in single-fingerprint mode, either of
the two fingerprints can be used to gain access.
Two Fingerprints - If you want the reader to request two fingerprints.
263
Reader Definitions ("Install/Access Control/Reader")
The fingerprint mode can be overridden using manual, scheduled or trigger commands.
PIN Code Errors
Selecting Inactivate Card on PIN Error causes a card to be blocked (made inactive) if the card holder
enters their PIN incorrectly the number of times specified by Number of Attempts.
Selecting Inhibit Card on PIN Error causes a card to be suspended for a specified period if the card
holder enters their PIN incorrectly the number of times specified by Number of Attempts. The length of
the suspension period is defined by Card Inhibition Period in the "Maintenance/User &
Preferences/System Preferences" screen.
Click here for further details.
Degraded Mode
Specifies the action to take when a door controller cannot communicate with its database.
Customer Code Only allows access to any card that has a customer code that is the same as one of the
customer codes stored in the door controller. This list of customer codes is a copy of the information stored
in the main node.
The customer codes stored in a node are dependent on the person's access rights. A node stores a
person's customer code (as defined in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen) if the person has one of the node's readers in his/her access rights.
In situations where the customer code cannot be provided from the card, Customer Code Only gives only
superficial protection; for example, a proximity card that has no customer code is accepted provided that
the card number is within a card-block range.
Doors tab (available if the reader is not connected to an elevator node)
Unlock Relay Time
Once a door is unlocked, this is the maximum amount of time that the person is given to open the door
before it is relocked. If the door is not opened within this amount of time, the person must present the card
again. If the door is opened, it is relocked as specified by Keep Time.
This time can also be set up in the "Maintenance/Access Control/Door Timing" screen.
For a pictorial representation, see the timing diagrams.
Door Open Time / Door Pre-Held Time
These times are intended to indicate cases of when, for example, a door is jammed open. After the door
has been unlocked, if the door is open after the amount of time specified by Door Open Time, the reader's
pre-held sounder (if fitted) operates until the door is shut. The maximum length of time that the sounder
operates is specified by Door Pre-held Time (which could be zero). The sounder warns that the door
should be closed. If the door is still open at the end of the Door Pre-held Time, the reader generates a
'Door Held Open' event/alarm.
Also, if Valid Card Re-Lock Options in the Options tab is set to Door Closes, the lock is reengaged at
the end of the Door Open Time.
These times can also be overridden in the "Maintenance/Access Control/Door Timing" screen.
It is also possible for card holders to override the default door open time at Series 6xx or later readers,
providing the reader has a keypad. For further information, see About Card Commands.
For a pictorial representation of the timing options, see the timing diagrams.
Extended Unlock Time
This is an alternative unlock relay time for people who have the Extended Door Times option set in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
This time can also be set up in the "Maintenance/Access Control/Door Timing" screen.
Extended Open Time / Extended Pre-Held Time
These specify an alternative door open time and door pre-held time for people who have the Extended
Door Times option set in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
264
Symmetry Software Reference Manual
These times can also be set up in the "Maintenance/Access Control/Door Timing" screen.
Delay Time
Specifies the length of time from a valid transaction or exit request to the door unlocking. The system
introduces this delay to enable the reader's bypass relay to operate, which could, for example, be used to
bypass an alarmed monitor point on the door.
For a pictorial representation, see the timing diagrams.
Keep Time
If Valid Card Re-Lock Options is set to Door Opens, this specifies the length of time from the door
opening to the lock engaging (assuming that the Door Open Time has not expired).
If Valid Card Re-Lock Options is set to Door Closes, it is the length of time from the door closing to the
lock engaging (assuming that the Door Open Time has not expired).
For a pictorial representation, see the timing diagrams.
Hold Time
This option is appropriate only if Bypass Relay Operation is set to Normal or Exit Request Only.
If Valid Card Re-Lock Options is set to Door Opens, this specifies the length of time from the door
closing to the bypass relay being switched off.
If Valid Card Re-Lock Options is set to Door Closes, it is the length of time from the lock engaging to the
bypass relay being switched off.
In both cases, when a door has been jammed open, it is the length of time from when the preheld alarm is
switched off to the bypass relay being switched off.
For a pictorial representation, see the timing diagrams.
Floors tab (available if the reader is connected to an elevator node)
Time To Select A Floor
Use this option to specify the maximum length of time that the floor-selection buttons remain enabled
following the access-control transaction. If a floor button is not pressed within this period of time, the
access-control transaction will need to be repeated before a floor can be selected.
Options tab (available if the reader is not connected to an elevator node)
Valid Card Relock Options
Specifies when the door lock is reengaged following an access-control transaction at a reader. The Door
Closes option is normally used only for locks that have a built-in Hall-effect "door locked" monitor. Different
rules can apply when the door is opened by an exit-request switch; see Exit Request Re-Lock Options.
For a pictorial representation, see the timing diagrams.
Exit Request Re-Lock Options
Specifies when the door lock is reengaged following an access-control transaction at an exit-request
button.
If As Valid Card is selected, the timing as specified for Valid Card Re-Lock Options is used; pressing the
exit-request switch is taken as a normal access-control transaction.
If Follow Exit Request is selected, the timing as specified for Valid Card Re-Lock Options is used,
except t2 and t3 (see timing diagrams 13 to 16) are started from when the exit-request switch is released.
The door lock is relocked only if the exit-request switch is not being pressed.
If Do Not Unlock is selected, the exit-request switch does not cause the door to unlock, but the bypass
relay operates according to timing diagram 1, 5, 9 or 13).
Bypass Relay Operation
Specifies how the reader's bypass relay is to operate. The relay energizes immediately the access-control
transaction occurs. The relay deenergizes according to Hold Time.
Normal - Specifies that the relay is to operate for all valid transactions, including from exit-request buttons.
265
Reader Definitions ("Install/Access Control/Reader")
Exit Request Only - Specifies that the relay is to operate only when the transaction is from an exit-request
button.
Keycard IN Only - Specifies that the relay energizes when a keycard-in transaction occurs, and remains in
this state until a keycard-out transaction. The relay operation is not dependent on other factors, such as
when the door is closed.
Re-evaluate Exit Request on Door Closing - This is for M2150 nodes only. When selected, both the
bypass and release relays will remain energized while the exit-request button remains pressed. Each time
the door is opened then closed within the Door Open Time (while the exit-request is pressed), the timer for
the Door Open Time restarts, which delays any pre-held alarm until the Door Open Time expires.
Do not Unlock if Door is Open - This has the same effect as Exit Request Only, but the door relay is not
energized if the door is already open. A Door Held alarm occurs if the door remains open for longer than
the Door Open Time.
Re-evaluate and Do Not Unlock - This is for M2150 nodes only. This enables both Re-evaluate Exit
Request on Door Closing and Do not Unlock if Door is Open.
By Pass Off - This is displayed only for a reader connected to an EN-2DBC or M1100/M1200/M1400 node
(collectively known as M1000 nodes). Relays marked "AUXILIARY" (M1000) or "OUTPUT" (EN-2DBC) on
the PCB can be used for auxiliary outputs or to bypass devices, but not for both purposes. The Bypass
Relay Operation option determines which of these two purposes the relay is used for. Selecting By Pass
Off enables the relay to be used as an auxiliary output, rather than for bypassing a device. For example, if
you set By Pass Off for reader port 2, this allows the relay to be used as auxiliary output 2. Any other
setting will cause the relay to be used for bypassing. Once you have configured the auxiliary output,
Bypass Relay Operation cannot be changed from By Pass Off.
Inhibit Reader While Door Open
Specifies whether the reader should be inhibited ( disabled) when the door is open following a valid
transaction. This is to ensure that potential conflicts are avoided when using a bi-directional turnstile. If you
select Both and two readers are used at one door, the exit reader will be inhibited as well as the entry
reader (if two readers are used at one door, selecting Yes will inhibit the entry reader only).
Two Readers At One Door
Two readers can be used to control a single door (one for entry and another for exit). To do this, select this
option for the entry reader, which must be an odd-numbered reader. The next even-numbered reader is
automatically selected for the exit reader.
Selecting this option may also be necessary for an HGU readers when used in conjunction with a
companion reader. Click herefor further information.
Exit Request Supervision State
Specifies the level of cable supervision for the reader's associated exit-request input.
In the case of four-state supervision, both short-circuits and open-circuits can be detected. If three-state
supervision is used and the device is normally open, only an open circuit can be detected. If the device is
normally closed, only a short circuit can be detected. Two-state supervision cannot detect cable faults.
This option is set to two-state supervision if Door Loop is selected for Door Monitor Supervision State.
Exit Request Normal State
Specifies the 'normal' (quiescent) state as open or closed dependent upon the type of exit-request device
fitted.
Door Monitor Supervision State
Specifies the level of cable supervision for the reader's associated door-monitor input.
In the case of four-state supervision, both short-circuits and open-circuits can be detected. If three-state
supervision is used and the device is normally open, only an open circuit can be detected. If the device is
normally closed, only a short circuit can be detected. Two-state supervision cannot detect cable faults.
Select Door Loop if M2150 is being used to replace third-party access-control equipment that uses a
single 2-core cable to monitor the lock sensor, door sensor and exit-request switch. Selecting this option
266
Symmetry Software Reference Manual
disables the door's exit-request input, which can be left disconnected. Please refer to the M2150 Design
Guide for further information.
Door Monitor Normal State
Specifies the 'normal' (quiescent) state as open or closed dependent upon the type of door-monitoring
device fitted.
Mute on Door Held
If selected, any door-held sounder for the reader is permanently switched off (muted). This option may be
of use if, for example, the door has a door-held sounder that is independent from any Symmetry hardware.
The option functions only for certain versions of node firmware - please contact your AMAG Support
Representative for details.
Toggle Mode
You can use this option to make toggle mode active or inactive at the reader.
About toggle mode
Toggle Mode Behaviour is available if the reader's node has Node Supports Advanced Toggle Mode
selected in the "Install/Access Control/Node" screen.
Select Double Card Present and specify a Timeout period if you want to be able to activate and
deactivate toggle mode using a card that has Allow Double Card Present Toggle Mode Activation set in
the "Home/Identity/Card Holders" screen. Otherwise, select Single Card Present.
All Cards can Lock when Double Card Present Active is available when Double Card Present is
selected. Select this option if you want any card to be able deactivate toggle mode.
Reporting tab
This specifies whether the message causes an alarm, event or is not reported at all at the reader's node.
This specification is at the node level, not at the server level. Therefore, although you may define a message as
an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the message is to be
reported as an event at the server. Such an approach may be needed if it is important for a node on a remote
site to communicate the message to the server immediately (only alarms are sent immediately to the server).
Note that the "Operation/Alarms/Routing" screen specifies the name of the client that alarms are sent to and at
what times.
See Alarm/Event Messages for details of each message.
Single Messages tab
This tab is displayed if Custom Messages (20 mA) is selected and Supports 4 Line Display is not selected.
That is, the reader is an M2150 intrusion reader that does not support a customizable 4-line display.
You can use the tab to change the default messages displayed at the reader. The left-hand column displays the
default messages. Type the replacement messages in the right-hand column (maximum 16 characters).
4 Line Messages tab
This tab is displayed if both Custom Messages (20 mA) and Supports 4 Line Display are selected. That is,
the reader is an M2150 intrusion reader that supports a customizable 4-line display.
You can use the tab to change the appearance, screens and messages displayed at the reader. The left-hand
column displays the default messages. The right-hand column displays the actual messages used.
To customize a screen/message:
1. Click the message you want to customize. A graphic of the message (as it appears on the screen of the
reader) is displayed.
2. In the graphic, either:
a) Double-click at the position where to want to add or delete text. The character you have selected is
bordered by a white rectangle. Type the new text as required.
or
267
Monitor Point Definitions ("Install/Access Control/Monitor Point")
b) Single-click and drag the mouse pointer to highlight text. You may want to do this for example to
underline several characters or set a flash effect.
Message Source
You can use the Message Source menu to copy the messages from a different reader. You can also set
the reader messages back to their default settings. Select Copy Messages after selecting the appropriate
option from the menu.
The following right-click options are available:
Edit Text
This is displayed only if you have highlighted text by single-click. Select the option to edit the text.
Customize Character
Allows you to customize the appearance of the character.
Select Character
Allows you to replace a selected character with a character from the default character set.
Align Text Left/Center/Right
Aligns the text to the left, center or right of the line.
Underline
Underlines the selected text.
Toggle Case
Toggles the case of the selected text.
Flash All
Causes the selected text to flash on and off.
Flash Background
Causes highlighing in the background to flash on and off. While the highlighting is on, the text is
darkened.
Highlight Background
Causes the background to be highlighted and the text to be darkened.
Clear Effects
Clears flash effects from the selected text.
Single/Double Height
Makes the line single or double height. This is available only for some screens.
Buttons
Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
268
Symmetry Software Reference Manual
Note: The Selection screen lists monitor points with their chain, node, multiNODE-2100/2150 controller and
reader addresses. For example, 1/001/2/4 means chain 1, node 001, controller 2 and monitor point 4. For
monitor points not connected to a multiNODE-2100 or multiNODE-2150 controller, the controller address is not
applicable and therefore the controller address is shown as "-"; for example, 1/001/-/4.
Note: For M4000 nodes, all configuration of monitor points is carried out in the web interface, not in this screen.
The monitor points set up in the web interface are automatically imported into this screen.
Prerequisites
The node that the monitor point is connected to must have been set up using the "Install/Access Control/Node"
screen.
269
Monitor Point Definitions ("Install/Access Control/Monitor Point")
270
Symmetry Software Reference Manual
The exit timer of the area associated with the monitor point terminates two seconds after the monitor point
and all entry/exit zones in the area are in their normal states.
Transaction Reporting
This specifies whether the message causes an alarm, event or is not reported at all at the monitor point's node.
This specification is at the node level, not at the server level. Therefore, although you may define a message as
an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the message is to be
reported as an event at the server. Such an approach may be needed if it is important for a node on a remote
site to communicate the message to the server immediately (only alarms are sent immediately to the server).
Note that the "Operation/Alarms/Routing" screen specifies the name of the client that alarms are sent to and at
what times.
Note: The transaction reporting definition at the node level of Monitor Point Circuit Open and Monitor Point
Circuit Shorted messages cannot be modified from the default of "Event". If you select one of these node
types in the "Install/Access Control/Monitor Point" screen, these messages are removed from the Transaction
Reporting list.
Note: The Selection screen lists auxiliary outputs with their chain, node, multiNODE-2100/2150 controller and
auxiliary output addresses. For example, 1/001/2/4 means chain 1, node 001, controller 2 and auxiliary output
4. For auxiliary outputs not connected to a multiNODE-2100 or multiNODE-2150 controller, the controller
address is not applicable and therefore the controller address is shown as "-"; for example, 1/001/-/4.
Note: For M4000 nodes, all configuration of auxiliary outputs is carried out in the web interface, not in this
screen. The auxiliary outputs set up in the web interface are automatically imported into this screen.
Prerequisites
The node that the auxiliary output is connected to must have been set up using the "Install/Access
Control/Node" screen.
271
Auxiliary Output Definitions ("Install/Access Control/Auxiliary Output")
Location
Click here for information about this option.
Category
Click here for information about this option.
Owned by this Company
Select the company that is to own the auxiliary output.
Node Description
The node or controller that the auxiliary output is connected to.
Controller Description
This pull-down list is displayed only if you have selected a multiNODE-2100 or multiNODE-2150 node type.
Choose the controller that the auxiliary output is connected to.
Auxiliary Output Number
This specifies which output on the node the auxiliary output is connected to. Outputs that are already used are
not displayed in the pull-down list.
Note: M2150 4DCs, 4DCNs and 4DBCs have unusual input/output numbering when a 4IN-8OUT module is
used:
4IN-8OUT first module: inputs 1 to 4; outputs 1 to 4, and 9 to 12.
4IN-8OUT second module: inputs 9 to 12; outputs 5 to 8, and 13 to 16.
The numbering when an 8IN-4OUT is used on an M2150 4DC, 4DCN or 4DBC is as expected:
8IN-4OUT first module: inputs 1 to 8; outputs 1 to 4.
8IN-4OUT second module: inputs 9 to 16; outputs 5 to 8.
8IN-4OUT first module: inputs 1 to 8; outputs 1 to 4.
8IN-4OUT second module: inputs 9 to 16; outputs 5 to 8.
For an M2100 elevator node:
If the elevator node is used for one cab, auxiliary outputs 1 to 64 are available to control floors 1 to
64.
If the elevator node is used for two cabs, auxiliary outputs 1 to 16 are for the first 16 access-
controlled floors for cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the first 16 access-
controlled floors for cab 2 (reader 2). Auxiliary outputs 33 to 48 are for the last 16 access-
controlled floors for cab 1 (reader 1). Auxiliary outputs 49 to 64 are for the last 16 access-
controlled floors for cab 2 (reader 2).
If the elevator node is used for three or four cabs, auxiliary outputs 1 to 16 are for the 16 access-
controlled floors for cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the 16 access-controlled
floors for cab 2 (reader 2). Auxiliary outputs 33 to 48 are for the 16 access-controlled floors for cab
3 (reader 3). Auxiliary outputs 49 to 64 are for the 16 access-controlled floors for cab 4 (reader 4).
On an EN-2DBC or M1100/M1200/M1400 node (collectively known as M1000 nodes), relays marked
"AUXILIARY" (M1000) or "OUTPUT" (EN-2DBC) on the PCB can be used for auxiliary outputs or to bypass
devices, but not for both purposes. The Bypass Relay Operation option in the "Install/Access Control/Reader"
screen determines which of these two purposes the relay is used for. For example, if you set By Pass Off for
reader port 2, this allows the relay to be used as auxiliary output 2. Any other setting will cause the relay to be
used for bypassing.
Pulse Time
When the auxiliary output receives a pulse command, it operates for the specified pulse time, then reverts
automatically to its quiescent state.
The value you can enter here depends on the node type. The system validates the value you enter.
Output relay configuration for the Controls license
272
Symmetry Software Reference Manual
Note: This setting does not apply to a card that is an executive card (as set in the "Home/Identity/Card Holders"
screen). A fixed expiration period of one year applies to executive cards.
Note: A card is cancelled and cannot be used at any reader if it is not used within the Expired keys time
period, as specified in the Visitors tab of the SALTO System\General Options screen.
273
Disconnected Door Screen ("Install/Access Control/Disconnected Door")
Note: You can safely increase this value at an operational site. However, if in the unlikely event of having to
decrease this value, existing cards will not function correctly and will need to be replaced. Re-encoding the
existing cards is not sufficient.
Note: The Audit Openings setting must also be set to "Yes" to store audit rejections.
The number of transactions that can be stored on the card is dependent on the Number Of Card Sectors
To Use setting. If the card becomes full, a new transaction overwrites the oldest transaction. Note that
audit openings and rejections are not stored in separate areas of memory, which means that an audit
openings may overwrite an audit rejection if the memory becomes full.
Last Reject
If set to "Yes", the card will separately store the last "rejected" transaction from an offline door.
The Audit Rejections setting does not need to be set to "Yes" to store the last reject.
274
Symmetry Software Reference Manual
Note: Any existing personal data titles are overwritten when you save changes. For example, if the first
personal data title is currently set to "Gender", and you set "Office" to Personal Data Title 1, the first personal
data title in the "Setup/Identity/Personal Data/Card Holder Titles" screen will change from "Gender" to "Office".
Note: If a setting is changed from "Yes" to "No" for an existing card, the card must be re-encoded.
Refresh
Click this button to update the Symmetry database with any changes made in the SALTO software, such as to
doors, timezones and door groups.
A refresh is also performed when the Symmetry software is restarted.
Options
Panel Description
Specify a name for the intrusion system.
Location and Category
These options are available only if you have selected a Bosch panel.
You can use these menus to specify a location and/or category for the panel.
You can specify a new location/category by typing in the relevant field, or you can select an existing
location/category.
The location and category can be displayed when viewing alarms and events.
Client Name
Select the name of the client that the intrusion system is connected to (serial connection) or is managed by
(LAN connection).
Company
Select the company that is to own the intrusion system.
This option is grayed out for an existing intrusion system if any device associated with it has been added to a
graphic or is assigned to a trigger, scheduled, threat level or predefined command.
275
Intrusion System Configuration ("Install/Intrusion/Intrusion/System Configuration")
Port Name
If the panel communicates to the client though a serial port, select the serial port. If the panel communicates
over a network, select the name of the LAN chain that the panel uses for communications.
If you want to set up a Bosch B9512G or Siemens (Vanderbilt) panel, you can select Create a new port.
Type
Select the make and model of the panel. This affects the options displayed in the lower area of the screen.
Offline Interval
If the alarm panel is offline for the specified period, an Intrusion Panel Timed Out alarm/event message is
generated. A value of 0 disables offline checking.
The option is grayed out and set to zero for some panel types.
Password
For a DMP system, enter the password that the Symmetry software needs to log in to the intrusion system to
establish communications. In DMP systems, this is known as the Remote Key.
System-Specific Options
DMP XR200 (also use for DMP SCS-1R)
Area Account Number
Specify the area account numbers to be recognized from the intrusion system. For each account number,
enter the number in the field and click Add. To remove an area account number, highlight the number and
click Remove.
Refer to the DMP documentation for details of the meaning of area account numbers.
Area Account Description
You can add a descriptive name for the account number.
Panel Account Number
Specify the account number of the intrusion system. This must match the account number configured into
the intrusion system itself.
Panel Account Description
You can add a descriptive name for the panel account.
Enable Ack for SCS
Select this option if you want the Symmetry software to communicate with the intrusion system using the
DMP SCS protocol. Selecting this option changes the protocol to enable the Symmetry software to
acknowledge alarm messages and prevent the intrusion system from sending multiple messages.
This option is applicable if the SCS1 receiver box is used. The option should not be selected if an SCS1
receiver box is not used.
Baud rate
This is displayed only if the intrusion system connects to a Symmetry client through a serial link. Select the
same baud rate that has been set at the intrusion system.
LAN Interface
This is displayed only if the intrusion system connects to Symmetry through a network. Select MSS1, or
iCOM if the intrusion system is fitted with an iCOM pad.
Port
This option is relevant only if LAN Interface is set to iCOM. Specify the iCOM port number as defined at
the intrusion system (for example, 2001).
Each intrusion system managed by the same Symmetry client MUST have a unique iCOM port number.
276
Symmetry Software Reference Manual
DMP XR500N\XR500
Panel Account Number
Specify the account number of the intrusion system. This must match the account number configured into
the intrusion system itself.
Enable Ack for SCS
Select this option if you want the Symmetry software to communicate with the intrusion system using the
DMP SCS protocol. Selecting this option changes the protocol to enable the Symmetry software to
acknowledge alarm messages and prevent the intrusion system from sending multiple messages.
This option is applicable if the SCS1 receiver box is used. The option should not be selected if an SCS1
receiver box is not used.
LAN Interface
This is displayed only if the intrusion system connects to the Symmetry through a network. UDP is
automatically selected.
Alarm Port (UDP)
Specify the alarm port number configured at the intrusion system. Use a different port number for each
intrusion system.
Command Port (IP)
Specify the port number used for commands, as defined at the intrusion system (for example, 3001).
Each intrusion system managed by the same Symmetry client MUST have a unique command port
number.
Full Status Updates
When Full Status Updates is not selected, Symmetry derives the status of zones from messages sent by
the panel. If an "alarm" message is received, Symmetry assumes that the zone is in alarm. If a "trouble"
message is received, Symmetry assumes that the zone is in a fault condition. (The messages sent from
the panel are user configurable and an "alarm" or "trouble" message does not necessarily represent the
actual state of a device.)
Selecting Full Status Updates causes Symmetry to request full status information when a message is
received. To obtain this information, Symmetry must log into the intrusion panel, which can slow down the
system.
DSC 4020, DSC 4030, HISEC CU30 and HISEC ThorGuard
Baud rate
This is displayed only if the panel connects to a Symmetry client through a serial link. Select the same
baud rate that has been set at the panel.
Full Status Updates
When Full Status Updates is not selected, Symmetry derives the status of zones from messages sent by
the panel. If an "alarm" message is received, Symmetry assumes that the zone is in alarm. If a "trouble"
message is received, Symmetry assumes that the zone is in a fault condition. (The messages sent from
the panel are user configurable and an "alarm" or "trouble" message does not necessarily represent the
actual state of a device.)
Selecting Full Status Updates causes Symmetry to request full status information when a message is
received. To obtain this information, Symmetry must log into the intrusion panel, which can slow down the
system.
Galaxy Dimension
Panel Account Number
Specify the account number of the intrusion system. This must match the account number configured into
the intrusion system itself.
277
Intrusion System Configuration ("Install/Intrusion/Intrusion/System Configuration")
Galaxy Type
Specify the model of Galaxy panel.
Ack Port
This is displayed only if the panel connects to a Symmetry client through a LAN.
This port number is hard-coded in the panel.
Alarm Port
This is displayed only if the panel connects to a Symmetry client through a LAN. It defines the port on the
Symmetry client that will receive alarms. The PORT NO setting on the panel (option 56.4.02.2.2) must
match this setting.
Command Port
This is displayed only if the panel connects to a Symmetry client through a LAN.
This port number is hard-coded in the panel.
Baud Rate, Data Bits, Stop Bits, Parity
This is displayed only if the panel connects to a Symmetry client through a serial link. Select the same
settings as set at the panel.
Onboard RIO on line 0
Zone addresses for a Galaxy panel are in the format yxxn, where:
y is the line number (normally 1-4)
xx is the RIO block number (00-15)
n is the zone number (1-8)
If Onboard RIO on line 0 is set for a GD-264 or GD-520, an additional 8 zones are available with
addresses 0011-0018. In this case, the line number is 0.
Siemens (Vanderbilt) SPC
Receiver Port
This is the port belonging to the client (specified by Client Name) that is used to receive alarms from the
panel and send commands from Symmetry.
Enter the Receiver Port specified in the Siemens (Vanderbilt) EDP Receiver definition (as configured in
the "Communications/EDP Settings" screen of the Siemens (Vanderbilt) SPC Pro software). For further
information, please refer to the Intrusion Management Installation and User Guide.
This port must be added to the firewall exceptions at the client.
IP Address
Enter the IP address of the Siemens (Vanderbilt) panel.
Receiver ID
Enter the Receiver ID specified in the Siemens (Vanderbilt) EDP Receiver definition (as configured in the
"Communications/EDP Settings" screen of the Siemens (Vanderbilt) SPC Pro software). For further
information, please refer to the Intrusion Management Installation and User Guide.
EDP Panel ID
Enter the EDP Panel ID, as specified using the Siemens (Vanderbilt) SPC Pro software, in the Settings tab
of the "Communications/EDP Settings" screen. For further information, please refer to the Intrusion
Management Installation and User Guide.
Encrypted/Key
If you have set up the panel for encrypted communications, select Encrypted and enter the key.
Encryption is enabled and the key set up in the Siemens (Vanderbilt) EDP Receiver definition (as
configured in the "Communications/EDP Settings" screen of the Siemens (Vanderbilt) SPC Pro software).
278
Symmetry Software Reference Manual
Time Zone
Select the time zone in which the device is located. This ensures that any alarm/event messages displayed
in the Symmetry software show a date and time that corresponds to the location where the device is
installed.
Symmetry updates the time at the panel when it connects to the panel, including after a period of non-
communication. The time zone specified here determines the time sent to the panel.
The selected time zone also determines the date and time when any daylight-savings time changes occur.
Bosch B9512G
IP Address
Enter the IP address of the Bosch panel. This must be the same as the IPv4 Address specified in the
Bosch RPS Software.
Port
Enter the port number of the Bosch panel Symmetry must use for communications. This must be the same
as the TCP/UDP Port Number specified in the Bosch RPS Software.
Passcode
Enter the passcode of the Bosch panel. This must be the same as the Automation Passcode specified in
the Bosch RPS Software.
Fixed Passcode Length
Enter the required length of passcodes (IDS codes). This must be the same as Passcode Length
specified in the Bosch RPS Software.
If, for example, you specify 4, all IDS codes must be four digits long. A value of 0 is the same as a setting
of Disabled for Passcode Length in the Bosch RPS Software.
Resync
If changes have been made to the configuration of the Bosch panel, it is important to use Resync to keep
Symmetry in alignment with the current configuration of the panel.
To re-sync, click Resync followed by OK.
The re-sync can take several minutes, during which the "Home/Monitoring/Command Centre" screen
shows "Awaiting status information" against the status of the panel.
279
Intrusion Device Configuration ("Install/Intrusion/Intrusion/Device Configuration")
The new names are used only within the Symmetry software and do not affect the names stored at the
intrusion system.
Associate a graphic created in the "Setup/Graphics/Add" screen with an area or zone group. If an
area or zone group icon is added to a graphic, double-clicking the icon in the
"Home/Monitoring/Graphics" screen displays the associated graphic. More than one area or zone
group can be associated with the same graphic.
For an area, use the Permissions button to specify the user roles that are allowed to arm or disarm
the area or display the area in the Command Center. Note: The Ignore/Bypass Permission
Filters option in the "Maintenance/User & Preferences/Accounts" screen may override the
specified permissions for specific users.
If required, select any M2150 arming/disarming readers that are to be used to arm or disarm a
selected area. (Not supported for Galaxy panels.)
Using the Selection Screen
In the Selection screen:
1. Select the intrusion system from the Intrusion System menu.
2. Select Panels, Areas, Zone Groups, Zones or Outputs (as applicable) from the Intrusion Device menu.
Some of these options may not be available, depending on the type of intrusion system.
3. Click Find.
4. Double-click the panel, area, zone or output you want to configure, and make the required changes in the
screen displayed.
The options in the Definition screen are described next.
Options in the Definition Screen
Alias Name
Specify the name to use for the device in the Symmetry software.
Area/Zone Group Graphic
You can associated a graphic with an area or zone group. Please refer to the introduction above for further
information.
Setup tab
Use this tab to name the device.
Controlling Readers tab
You can use this tab to enable M2150 arming/disarming readers to arm or disarm a selected area
controlled by a Bosch 9512G, Siemens (Vanderbilt), DMP XR500N\XR550, DSC PC4030 (via SN4442) or
HISEC (CU30 or ThorGuard) panel.
How to configure the Symmetry software
To use this feature:
1. Define the arming/disarming readers in the "Install/Access Control/Reader" screen.
2. Open the appropriate area from the "Install/Intrusion/Intrusion/Device Configuration" screen.
3. In the Controlling Readers tab, choose the M2150 node from the Symmetry Panel menu.
Any arming/disarming reader connected to the node can be used to arm or disarm the area.
For this to function, a card holder requires only the area to be in their access rights. Readers
that have Final Exit or Entry/Exit Route selected are not listed.
4. Decide whether or not to move readers into the Readers Assigned box. If you move a
reader into the Readers Assigned box, a valid access-control transaction at the reader will
disarm the area and open the door. For this to function, the reader and area must be in the
card holder access rights.
Notes:
280
Symmetry Software Reference Manual
A M2150 arming/disarming reader cannot be used to control both M2150 and third-
party areas. The left side of the tab does not display readers that are already
assigned in an M2150 area.
A reader can be assigned to only one area.
Timeout
This specifies the maximum period of time that the M2150 node waits to receive an arming or
disarming acknowledgement messages from the third-party intrusion system. An acknowledgement
message must be received within the specified period to avoid a "Remote Area Timeout on Arming"
or "Remote Area Timeout on Disarming" event.
Degraded Mode When Offline
The selected option determines system behavior if the third-party intrusion system loses
communication with the M2150 node:
Prevent Access Control only Arm/Disarm - If the area is in an armed state at the
time of the communication loss, card holders are prevented from opening the door. If
the area is in a disarmed state, card holders can open the door, access rights
permitting. The reader displays "Fail-check status".
Continue with Access Control only Arm/Disarm - Card holders can open the door
(access rights permitting), irrespective of whether the area is in an armed or disarmed
state at the time of the communication loss. This allows a repair technician to restore
the communication loss should the third-party intrusion system be located inside the
area. The reader displays "Fail-Doors armed" in the armed state and "Fail-Doors
disarmed" in the disarmed state.
DMP XR200, DSC PC4020 and DSC PC4030 (with SRI) Panels
Introduction
You can use this screen to map transactions from the intrusion system to new Symmetry alarm/event
messages. You can set up different Symmetry alarm/event messages for each intrusion system.
An intrusion system can generate many different transactions, such as those to indicate burglary alarms, fire
alarms and arming/disarming sequences. The Symmetry software can recognize these transactions only if you
use this screen to map the transactions to new Symmetry alarm/event messages.
Each alarm/event message can represent one or more intrusion transactions. For example, you may decide to
create an alarm/event message for burglary alarms from a specified zone, and another for all fire alarms,
irrespective of the zone they relate to.
The system prevents duplicates of the same definition from being created (even if they have different
Description text). However, it is possible to create overlapping definitions. In this case, when a transaction is
received from the intrusion system, the system chooses the definition that is the most specific. Click here for an
example.
The following are examples of DMP transactions. The second of the following two definitions is used if a
burglary alarm occurs for zone 3 in area 2, since it more closely matches the actual transaction.
Example 1:
Event Definition = Zone Alarm
Message Type = Zone: Burglary
Zone Number = 3
Example 2:
Event Definition = Zone Alarm
Message Type = Zone: Burglary
Zone Number = 3
Area Number = 2
In the Selection screen:
281
Intrusion Device Configuration ("Install/Intrusion/Intrusion/Device Configuration")
DMP Options
Select the Event Definition and Message Type.
For DMP panels, each Event Definition and Message Type is represented by a 3-character
mnemonic. If special transactions are being passed from the intrusion system, select Custom and
enter the 3-character mnemonics as necessary.
Note: Leaving any of the fields blank below Message Type means "match all".
Use Message Descriptions - Select this option if you want the Symmetry alarm/event message to
use the embedded text in the DMP transaction, rather than the text in the Description field. Any
DMP user name contained in the embedded string will be mapped to the Who field in the Symmetry
message, with the remaining text mapped to the What field.
282
Symmetry Software Reference Manual
Note: For the Bosch B9512G panel, this screen can be used only to find the current status of devices using the
Resync Status button.
For all but the Bosch B9512G panel, use the screen to upload details of the following configured at the intrusion
system (as appropriate):
panels
areas
zone groups
zones
outputs
users
283
Intrusion System Upload ("Install/Intrusion/Intrusion/Upload Configuration")
The details are uploaded to the Symmetry database and can be displayed in the "Home/Monitoring/Command
Center" screen.
Although you can choose to upload specific data, it is recommended that you use the default All Data setting
and click OK to upload all data.
The Symmetry software checks for changes each time you perform an upload. In this way, you can keep the
Symmetry software in step with any changes at the intrusion system, such as to the number of zones and areas
defined. Changes to names are made only if Upload descriptions for existing devices is selected.
If panels, zones, areas, and other items are removed from the intrusion system's database, they are
automatically removed from the Symmetry database only if not already assigned to a command or graphic in
the Symmetry software. Any items that are not automatically removed are listed in a report generated on
completion of the upload.
Please refer to the Intrusion Management Installation and User Guide for an overview of intrusion management
and step-by-step instructions on how to configure and use the software.
ThorGuard CU Configuration
In the ThorGuard Management Software:
Set "Single Import/Export Event" in the Options tab of the ThorGuard CU Editor.
If "Mask User ID" is not set, make sure that no user profiles have "Login with PIN" selected. If "Mask
User ID" is set, the setting for "Login with PIN" can be set or unset as required.
Siemens (Vanderbilt) System Devices
By default, the upload process automatically creates 21 zones that represent "system devices" under an area
named "System". These zones allow you to use the "Home/Monitoring/Command Center" screen to, for
example, see which system alerts are active and which need to be cleared before areas can be armed.
Options
Intrusion System
Select the intrusion system to upload, as defined in the "Install/Intrusion/Intrusion/System Configuration"
screen.
All Data
Select this option if you want all data from the selected intrusion system to be uploaded.
Specific Data
Select this option to choose specific categories of data to upload. The options, as described below, vary
depending on system selected.
Areas
Zone Groups
Zones
Outputs
Panel
Users
Upload descriptions for existing devices
Deselecting the option (the default) protects any changes you have made to the names in the
"Install/Intrusion/Intrusion/Device Configuration" screen. Select this option if you want the names to be
overwritten each time you perform an upload.
Remove Symmetry cardholder assignment if intrusion user no longer exists
Selecting this option causes the Symmetry software to remove all intrusion users from its database that no
longer exist in the intrusion system. The intrusion users will be removed from any assigned card holder access
rights.
284
Symmetry Software Reference Manual
Report destination
A report is produced on completion of the upload. Using the pull-down list, choose whether to send the report to
the screen, printer or file. If you send the report to a file, a dialog is displayed that enables you to specify the
report file name.
Resync Status
Clicking this button obtains the current status (for example, armed/disarmed status) of zones, areas and other
items from the intrusion system and updates the status as shown in the "Home/Monitoring/Command Center"
screen. Under normal circumstances, it should not normally be necessary to select this option.
Options
Database Location
Specify the IP address of the computer that holds the ThorGuard database. This is normally the same as the IP
address of the ThorGuard server.
Database Name
Specify the name of the ThorGuard database. This is specified in the ThorGuard Database options, which are
accessed from the ThorGuard client user interface (select File/Database Options).
ThorGuard Server Address
Specify the IP address of the ThorGuard server.
ThorGuard Server Port
Specify the port number Symmetry should use at the ThorGuard server. This is normally 4451. The port
number is specified in the IP Listen Port field, which is displayed in the ThorGuard server settings.
User Logon
Specify the user name of an operator of the ThorGuard client.
User Password
Specify the password of an operator of the ThorGuard client.
285
Status Color Configuration Screen ("Install/Intrusion/Intrusion/Status Color Configuration")
Options
System Type
Choose the intrusion system.
Device
Choose whether to set up the colors for area, zone or zone group status.
Status
The meaning of each status is self-explanatory, with perhaps the exception of the following:
Area Normal - The area is no longer in an alarm state.
Area Armed with Reduced Security - Click here for details.
Area Has Problems - A fault, tamper or alarm condition exists.
Zone Normal - The zone is no longer in an alarm state.
Zone In Fault - Click here for details.
Zone In Tamper - Click here for details.
Zone Group Armed with Reduced Security - Click here for details.
Zone Group Normal - The zone group is no longer in an alarm state.
Zone Group Has Problems - A fault, tamper or alarm condition exists.
Color options (displayed by double-clicking a status):
Color
Select the color (relevant only if Selected Color is selected).
Selected Color
Choose this if you want the selected status to be represented by the selected color.
No Color
Choose this if you do not want the selected status to be represented by a color.
Use Arm/Disarm Color
Choose this if you want the selected status to be represented by the armed or disarmed color. The Flash
option can be used to distinguish between the armed/disarmed status and the status you are currently
setting up.
286
Symmetry Software Reference Manual
Flash
Choose this if you want the border/fill to flash when the selected status occurs.
287
Communications Receiver Accounts Definition ("Install/Intrusion/Communication Receiver/Accounts")
If a description is provided, the "Home/Monitoring/Alarms" screen displays the zone description rather than the zone
number in any alarm messages that relate to the zone. This makes it easier to understand the meaning of alarm
messages displayed in the "Home/Monitoring/Alarms" screen.
For a general overview and further details of the Bosch DD6600 communications receiver interface, please refer to
the Intrusion Management Installation and User Guide.
Introduction
The Digital Video Device Selection screen is displayed when you select "Install/Video & Audio/Digital Video". You
can use the screen to set up devices such as digital video servers, recorders and cameras.
The area of the left side of the screen lists the types of digital video device you can configure.
288
Symmetry Software Reference Manual
Introduction
Purpose of this Screen
This screen enables you to define the settings for a camera attached to a selected Axis video server. The
screen is available only if a Symmetry camera license is installed.
General Options
Description
Enter a unique name for the device.
Video Recorder
Select the Axis video server that the camera is connected to, as defined in the "Install/Video & Audio/Digital
Video"-Axis Video Servers screen.
Video Channel
Select the video channel that the camera is connected to on the recorder. Each camera connects to a separate
video channel. Any channel previously selected is not available in the list.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Configuration Settings Tab
This tab displays the web interface of the device.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Advanced Settings Tab
Live Video Format
This is not used. The video format must be MPEG4 (do not change it in the web interface).
289
75xx Camera / 79xx Encoder (HD)
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
See Alarm/Event Messages for details of each message.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.
Introduction
Purpose of this Screen
This screen enables you to define the settings for an SD or HD 75xx camera or 79xx encoder.
Setting up a new Device
To set up a new device:
1. Attach the device to the network.
2. Define the IP address of the device using the supplied tool.
3. Click Discover.
All devices of the type you are adding that have not yet been defined in the Symmetry software are listed.
(Once you have saved the screen, the device will no longer be listed when you click Discover.)
If prompted, enter user name and password. The username and password of the default administrator
account are root and pass respectively.
4. Select the device, then click OK.
Note: You may be prompted to install additional software when you add the first device. Choose to install the
software.
General Options
Description
Enter a name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are root and pass respectively.
290
Symmetry Software Reference Manual
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new device, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface and view live video.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the device (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a device on the network of the type you are configuring. Please refer to "Setting up a
new Device" above. The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Advanced Camera Properties Tab
HTTP Port
This is the port at the camera used to receive information from the Symmetry software. The port must be
the same as defined in the camera web interface.
Camera Transaction Port
This is the port at the camera used by the Symmetry software to listen for camera events. The port must
be the same as defined in the camera web interface.
SSL
Select this option if SSL (encrypted communication) is enabled at the camera.
Session Type
Select Unicast or Multicast networking.
Using multicast can greatly reduce network traffic, but care must be taken to ensure that the network
switches are compatible with multicast before any change is made.
Multicasting works by placing the task of reproducing data on a switch rather than on the source camera.
When a second client requests video from a camera, the data is sent from a switch rather than from the
camera, which reduces load on the camera and vastly decreases network traffic between the camera and
switch. Multicasting works by the camera having an IP address that is in a specific range used for
multicasting.
Session Name, Friendly Name and Firmware Version
This information is obtained automatically from the camera.
291
Axis IP Camera ("Install/Video & Audio/Digital Video")
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Reporting Tab
You can choose whether to enable or disable each message that can be generated by the device.
See Alarm/Event Messages for details of each message.
Introduction
Purpose of this Screen
You can use this screen to define the settings for an Axis IP camera. The screen is available only if a Symmetry
camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models and firmware versions
supported.
Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.
292
Symmetry Software Reference Manual
General Options
Description
Enter a unique name for the device.
Network Address
Enter the IP address or network (DNS) name of the device, as configured in the camera.
293
Axis IP Camera ("Install/Video & Audio/Digital Video")
Note: After finishing the tasks you need to carry out, make sure you reverse the changes you made in the
Username and Password fields; that is, leave the fields blank or enter the username and password of an Axis
"Viewer" user.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
For an Axis IP camera, the status is Online only after entering an Axis Administrator username and password
and clicking Connect. An online status is not required for an Axis IP camera to operate properly.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Configuration Settings Tab
This tab displays the web interface of the device. The interface is displayed only if an Axis "Administrator"
username and password have been entered.
294
Symmetry Software Reference Manual
You may want to use the web interface to add a "Viewer" user or make other configuration changes to the
camera.
The Video format selected in the Live View page is used only for displaying video in the tab. The video format
for displaying video in the Virtual Matrix is specified in the Advanced tab.
Advanced Tab
Enable Live Audio
Selecting this option enables users to listen to audio from the camera from the "Home/Video &
Audio/Virtual Matrix" screen (assuming the camera supports audio).
Enable Audio Recording
When selected, audio is recorded by the Symmetry NVR.
Enable Multicast
Select this option if you want the camera to use multicast networking.
Using multicast can greatly reduce network traffic, but care must be taken to ensure that the network
switches are compatible with multicast before any change is made.
Multicasting works by placing the task of reproducing data on a switch rather than on the source camera.
When a second client requests video from a camera, the data is sent from a switch rather than from the
camera, which reduces load on the camera and vastly decreases network traffic between the camera and
switch. Multicasting works by the camera having an IP address that is in a specific range used for
multicasting.
Live Video Format
Select the video format for live video (MPEG-4 is always used during recording):
MJPEG - Motion JPEG is gives good picture quality, but requires greater bandwidth than
MPEG-4.
MPEG4 - This is the default selection, since the format gives a good compromise between
picture quality and bandwidth, but up to 1000 ports need to remain open in a specified
range. MPEG-4 is recommended for live viewing and for applications where bandwidth and
storage limitations are important factors. The ATEME decoder is used.
MPEG4 RTSP Tunnelled - This uses the RTSP protocol to stream video from the camera.
By default, the camera uses port 554.
MPEG4 HTTP Tunnelled - This uses a relatively high bandwidth. However, by default port
80 is used, which may be preferable in some networks.
MPEG4 (Axis) - This uses the Axis MPEG4 decoder. Use this only if directed to do so, since
this prevents certain features such as privacy zones from being used.
H264 - This provides the best compression performance. It gives improved picture quality
with low bandwidth requirements. The Intel decoder is used.
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
295
Axis Video Servers ("Install/Video & Audio/Digital Video")
Introduction
Purpose of this Screen
You can use this screen to define the settings for an Axis video server. The screen is available Symmetry
camera license is installed.
Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.
General Options
Description
Enter a unique name for the device.
296
Symmetry Software Reference Manual
Address
Enter the IP address or network (DNS) name of the device.
Username and Password
Enter the username and password of the default administrator account.
Connect
You can enter the IP address of the device and click Connect to access its web interface.
Owned by Company
Select the company that is to own the device.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the server (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
The status is Online only after entering an Axis Administrator username and password and clicking Connect.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Configuration Settings Tab
This tab displays the web interface of the device. The interface is displayed only if an Axis "Administrator"
username and password have been entered.
If this tab does not display the web interface, the Axis Media Control may be out of date. Please refer to "Before
Using this Screen" above.
Advanced Settings Tab
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
See Alarm/Event Messages for details of each message.
297
ONVIF Camera
ONVIF Camera
Introduction
Purpose of this Screen
This screen enables you to define the settings for an ONVIF camera.
Setting up a new Device
To set up a new device:
1. Attach the device to the network.
2. Define the IP address of the device using the supplied tool.
3. Click Discover.
All devices of the type you are adding that have not yet been defined in the Symmetry software are listed.
(Once you have saved the screen, the device will no longer be listed when you click Discover.)
If prompted, enter user name and password.
4. Select the device, then click OK.
Note: You may be prompted to install additional software when you add the first device. Choose to install the
software.
Note: Symmetry supports "Digest Authentication" for ONVIF cameras. This provides a more secure method of
authenticating with the camera over HTTP, and is configured in the camera's web page.
General Options
Description
Enter a name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new device, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface and view live video.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
298
Symmetry Software Reference Manual
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the device (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a device on the network of the type you are configuring. Please refer to "Setting up a
new Device" above. The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Media Tab
This tab displays a live image from the camera and provides the following options:
Media Profiles (Live/Recording)
Choose the video and audio quality for live viewing and recording. Click the button to the right of each
menu to action any change and see a live view of the result.
You can use the Media Profiles tab to create new profiles.
Streaming
Select Unicast or Multicast networking.
Using multicast can greatly reduce network traffic, but care must be taken to ensure that the network
switches are compatible with multicast before any change is made.
Multicasting works by placing the task of reproducing data on a switch rather than on the source camera.
When a second client requests video from a camera, the data is sent from a switch rather than from the
camera, which reduces load on the camera and vastly decreases network traffic between the camera and
switch. Multicasting works by the camera having an IP address that is in a specific range used for
multicasting.
You can specify the multicast settings in the Media Profiles tab (Video Encoder Settings sub-tab).
Audio
Live
Selecting this option enables users to listen to audio from the camera from the "Home/Video &
Audio/Virtual Matrix" screen.
Recording
When selected, audio is recorded by the Symmetry NVR.
Device Web Page
Click to open the camera web interface in a browser.
Time Zone Tab
Candidate Time Zone and Information
When you navigate to the tab, Symmetry reads the time zone information from the camera. The
Information box displays whether the camera is adequately synchronized with the Symmetry server
(within 10 seconds). Changing the time zone causes the Information box to report whether or not the time
299
ONVIF Camera
at the camera would be synchronized with the Symmetry server if the time zone were to be used at the
camera.
This setting does not affect any time zone setting in the web interface and is not saved.
Make sure that the time zone at the camera is set correctly to ensure the correct time of alarms and
events.
Refresh
Refreshes the information displayed.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Events Tab
You can choose whether to enable or disable each message that can be generated by the device.
The Recognized Events are those that are reported by the Symmetry software using the same message text
that you see in this screen. See Alarm/Event Messages for details of each message.
The Unrecognized Events are those that the camera is capable of sending, but which are reported as
"General Alarm".
Offline Monitoring Tab
Enable Offline Monitoring and Interval
The Enable Offline Monitoring option is relevant only if the device is assigned to a Symmetry NVR.
Selecting the option will cause the Symmetry NVR to periodically check whether the device is online and
generate camera online/offline alarms as appropriate. The time period between checks is determined by
Interval.
Media Profiles Tab
This tab allows you to create or edit profiles. Each profile is stored in the camera and specifies a set of video
and audio settings, such as frame rate, resolution and encoding format. Once you have created profiles, you
can use the Media tab of the ONVIF Camera screen to select the profiles to use for Symmetry live and
recorded video.
The Media Profiles tab contains several sub-tabs:
Profile Settings
Profile
Select an exiting profile to edit, or:
Click to refresh the Profile menu so that it matches the profiles stored in the
camera.
Click to add a new profile. After clicking this button, enter the name of the profile
in the Profile field, select the video and audio configurations from the pull-down
menus, then click Send to Device.
Video - Encoder Configuration
Choose the video encoder configuration, as set up in the Video Encoder Settings tab. This
determines the frame rate, resolution, etc. used for video when the profile is used. To save changes,
click Send to Device.
Video - Source Configuration
Choose the hardware source for the video (if applicable).
300
Symmetry Software Reference Manual
301
Panasonic IP Camera ("Install/Video & Audio/Digital Video")
Bitrate
The output bit rate in kbps.
Session Timeout
Audio streaming timeout.
Multicast
Selecting this option displays multicast settings. The actual mode used by Symmetry is specified in
the Media tab.
The IP Address is the multicast address.
Port is the RTP multicast destination port.
TTL is the Time to Live or Hop Limit.
Multimedia Settings
You can use this tab to change settings such as the brightness and contrast of video from the camera, if
the camera supports these changes.
Oncam/PTZ Tab
This tab is for ONCAM Grandeye cameras. It allows tours through PTZ positions.
Please refer to your AMAG support representative for further information.
PTZ Tours Tab
This tab is for ONCAM Grandeye cameras.
Please refer to your AMAG support representative for further information.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
The tab is not available for ONCAM Grandeye cameras.
See Using the Privacy Zones Tab.
Introduction
Purpose of this Screen
You can use this screen to define the settings for a Panasonic IP camera. The screen is available only if a
Symmetry camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models supported.
Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.
302
Symmetry Software Reference Manual
All Panasonic IP cameras that have not yet been defined in the Symmetry software are listed. (Once you
have saved the camera definition, it will no longer be listed when you click Discover.)
If prompted, enter a camera user name and password. The username and password of the default
administrator account are admin and 12345 respectively.
Note: When the camera is connected to the network, it broadcasts a discovery message for 20 minutes.
If the camera has been connected to the network for a longer period, disconnect and reconnect it to
restart the discovery message.
General Options
Description
Enter a unique name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are admin and 12345 respectively.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new camera, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device , you can access its web interface, view live video, set up privacy
zones, etc.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a Panasonic IP camera on the network. Please refer to "Setting up a new Camera"
above. The device must be on the same subnet as the computer you are using.
303
Panasonic IP Camera ("Install/Video & Audio/Digital Video")
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Configuration Settings Tab
This tab displays the web interface of the device.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Advanced Tab
Live Video Format
This is not used. The video format must be MPEG4 (do not change it in the web interface).
Alarm Port
This specifies the port that the Symmetry software uses to receive motion and monitor point alarms. The
Panasonic Alarm Protocol port number specified in the camera's web interface must specify the same
number.
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
Note: The IP Camera Offline and IP Camera Online messages relate to messages sent directly from the
camera, which may appear only after the camera has returned to an online state. Using the Enable Offline
Monitoring option, a Symmetry NVR can independently monitor the online/offline status of the camera.
See Alarm/Event Messages for details of each message.
Enable Offline Monitoring and Offline Monitoring Interval
The Enable Offline Monitoring option is relevant only if the device is assigned to a Symmetry NVR.
Selecting the option will cause the Symmetry NVR to periodically check whether the device is online and
generate camera online/offline alarms as appropriate. The time period between checks is determined by
Offline Monitoring Interval.
304
Symmetry Software Reference Manual
Introduction
Purpose of this Screen
You can use this screen to define the settings for a Sony IP camera. The screen is available only if a Symmetry
camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models supported.
Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.
General Options
Description
Enter a unique name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are admin and admin respectively.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new camera, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface, view live video, set up privacy
zones, etc.
Owned by Company
Select the company that is to own the device.
305
Sony IP Camera ("Install/Video & Audio/Digital Video")
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Location
Click here for information about this option.
Category
Click here for information about this option.
Discover
Click this button to locate a Sony IP camera on the network. Please refer to "Setting up a new Camera" above.
The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Configuration Settings Tab
This tab displays the web interface of the device.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
See Alarm/Event Messages for details of each message.
Enable Offline Monitoring and Offline Monitoring Interval
The Enable Offline Monitoring option is relevant only if the device is assigned to a Symmetry NVR.
Selecting the option will cause the Symmetry NVR to periodically check whether the device is online and
generate camera online/offline alarms as appropriate. The time period between checks is determined by
Offline Monitoring Interval.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.
306
Symmetry Software Reference Manual
Introduction
Purpose of this Screen
You can use this screen to define the settings for a Symmetry IP camera. The screen is available only if a
Symmetry camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models supported.
Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.
General Options
Description
Enter a unique name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are root and pass respectively.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new camera, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface, view live video, set up privacy
zones, etc.
Owned by Company
Select the company that is to own the device.
307
Symmetry IP Camera ("Install/Video & Audio/Digital Video")
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a Symmetry IP camera on the network. Please refer to "Setting up a new Camera"
above. The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Tabs
Configuration Settings Tab
This tab displays the web interface of the device. Click PLAY to view live video.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Advanced Tab
Live Video Format
This is not used. The video format must be MPEG4 (do not change it in the web interface).
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
308
Symmetry Software Reference Manual
General
Overview of this screen
This screen allows you to assign digital video cameras to Symmetry Network Video Recorders (NVRs). You
can assign each camera to one or more NVRs.
You can access this screen in three different ways:
By selecting "Install/Video & Audio/Digital Video/NVR Cameras Assignment" in the toolbar.
By clicking Assign in the "Install/Video & Audio/Digital Video-NVR" screen. The name of the NVR is
automatically inserted in the NVR field of the Filters section, which by default, causes the screen
to list only the NVR you were defining.
By clicking Assign Cameras in the "Camera not Assigned" dialog, which is displayed when saving a
camera that is not assigned to an NVR. The name of the camera is automatically inserted in the
Camera field of the Filters section, which causes the screen to list only the camera you were
defining.
The number of cameras currently not assigned to any NVR is displayed next to Unassigned Cameras. The
value displayed is not affected by the filter settings.
For an introduction to the Symmetry NVR and its web interface, please refer to About the Symmetry NVR.
Using this screen
About the Camera and NVR columns
If no filters are applied in the Filters section, the left column (labelled Camera) lists the names of all NVR-
compatible cameras (such as AXIS IP cameras). The camera name is displayed in orange if the camera is
not assigned to any NVR.
There is one additional column for each NVR defined using the "Install/Video & Audio/Digital Video-NVR"
screen.
Assigning cameras to NVRs
To assign the cameras to NVRs, simply select the appropriate checkboxes. You can assign the same
camera to more than one NVR if you wish.
You can assign/unassign multiple cameras at the same time using Assign Selected Cameras or
Unassign Selected Cameras (see below).
Using filters
You can use the fields and menus in the Filter section of the screen to choose the cameras and NVRs to
list in the screen. For example, entering text in the Camera field causes only those cameras names that
contain the text to be displayed.
For details of the filters, please refer to "Filter Options" below.
If you have accessed this screen from the "Install/Video & Audio/Digital Video-NVR" screen or from a
camera definition screen, the name of the NVR or camera is automatically inserted as a filter. This means
that by default, the screen lists only the NVR/camera you were defining.
309
Camera Views ("Install/Video & Audio/Camera Views")
Displaying statistics
Clicking the name of an NVR (or any cell in the NVR's column) displays statistics about that NVR in the
lower area of the screen. The statistics include the number of cameras assigned to the NVR, the date of
the oldest recording and the date of the oldest tagged recording. This information is retrieved each time
you open the screen.
Screen Options
Filter Options
Camera
Typing into this field automatically filters the list of cameras to show only those that contain the typed text.
NVR
Typing into this field automatically filters the list of NVRs to show only those that contain the typed text.
Location
The upper Location menu allows you to list only those cameras that have the selected location. The lower
Location menu allows you to list only those NVRs that have the selected location.
Category
The upper Category menu allows you to list only those cameras that have the selected category. The
lower Category menu allows you to list only those NVRs that have the selected category.
Show unassigned only
Select this option to list only those cameras that are not yet assigned to an NVR.
Clear filter
Click this button to clear all filters. All Symmetry NVRs and NVR-compatible cameras will be listed.
Assign Selected Cameras
You can select multiple cells (using the Ctrl and Shift keys in the normal way) and click Assign Selected
Cameras to assign the cameras to the NVRs.
Unassign Selected Cameras
You can select multiple cells (using the Ctrl and Shift keys in the normal way) and click Unassign Selected
Cameras to unassign the cameras.
General
Overview of this screen
This screen enables you to set up camera views.
For an overview of camera views and how to use them, please refer to "About Camera Views and Camera
Associations".
To create a new camera view, click New in the Selection screen, choose the camera you want to create the
camera view for, click > (or drag and drop or double-click the camera name), configure the View Type and
Preset as applicable, then click Save.
Note: If you are not able to access this screen, enable permissions to it using the "Maintenance/User &
Preferences/Roles" screen.
Note: Deleting a camera also deletes any camera views set up for that camera.
310
Symmetry Software Reference Manual
Selection Screen
Using the Selection screen
You can use the Selection screen to create a new camera view or to find an existing camera view to edit. Click
here for an overview of Selection screens and how to use them.
Only those camera views belonging to the currently-selected company are available.
311
Camera Associations ("Install/Video & Audio/Camera Associations")
General
Overview of this screen
This screen enables you to associate cameras (as set up in the "Install/Video & Audio/Digital Video" screen)
and camera views (as set up in the "Install/Video & Audio/Camera Views" screen) with a selected device such
as a reader.
Only those devices, cameras and camera views belonging to the currently-selected company are available.
For an overview of camera views and camera device associations, please refer to "About Camera Views and
Camera Associations".
Using the screen
To use this screen:
1. Select the device in the Selection screen, and click Open.
2. In the Definition screen, choose the cameras and/or camera views you want to associate with the
device and click > (or drag and drop or double-click the name of each camera and camera view).
3. Specify the priority order of the cameras and camera views. This determines:
The order that cameras and camera views are displayed in cells of the "Home/Video &
Audio/Virtual Matrix" screen when viewing live video.
The camera or camera view that is opened in the Video Playback screen when
viewing recorded video.
Reports
You can generate the following reports from the "Reports/Configuration/Reports" screen:
Camera/camera view associations by device
Device associations by camera/camera view
Camera views
Note: If you are not able to access this screen, enable permissions to it using the "Maintenance/User &
Preferences/Roles" screen.
Note: Deleting a camera or camera view disassociates the camera or camera view from the device.
Selection Screen
Using the Selection screen
Use the Selection screen to select the device that you want to associate with one or more cameras and camera
views, and click Open.
Only those devices belonging to the currently-selected company are listed.
Filter by and Matching
You can use Filter by and the Matching field to reduce the number of items listed. For example, if you select
Location from Filter by, and enter "North" in the Matching field, only items whose location includes "North" are
listed.
After entering text in the Matching field, press Enter or click to action the filter.
Leaving the Matching field empty means "match all". So, if you select Location from the Filter by menu and
leave Matching empty, this will cause all items to be listed that have a location specified.
The following Filter by options are provided:
312
Symmetry Software Reference Manual
Note: Click here for a general overview of Selection screens and how to use them.
313
CCTV Switcher Definitions ("Install/Video & Audio/CCTV/Switcher")
This screen is applicable only if a license is installed. The screen allows you to specify the details of each
CCTV switcher being used.
314
Symmetry Software Reference Manual
This screen is applicable only if a Digital Video Management license is installed. The screen allows you to
specify the details of each camera that is connected to a CCTV switcher.
See Overview of CCTV switching for further information.
315
CCTV Ancillary Definitions ("Install/Video & Audio/CCTV/Ancillary")
This screen is applicable only if the system is using an external CCTV switcher unit. The screen allows you to
name each camera's ancillary output relays. Typically, the relay operates a lamp, wiper or washer pump, which
can be switched on or off using:
Scheduled, trigger or manual commands.
The "Home/Video & Audio/CCTV Cameras" screen.
The "Home/Monitoring/Graphics" screen.
It is possible to use ancillary output relays for other purposes, such as to control lights or other equipment for
the Controls license.
Note: ancillary devices connect to the switcher unit or camera. They are not driven from an auxiliary output at a
node.
316
Symmetry Software Reference Manual
The "Install/Video & Audio/CCTV/Switcher" screen specifies the number of ancillary devices per camera the
switcher supports.
Pulse Time
If you specify a value other than zero, the ancillary output relay will energize only for the specified length of
time. After this time period, the ancillary output de-energizes, unless already de-energized from an action by a
user of Symmetry. For example, if the ancillary output is being used to control a lamp for the Controls license,
selecting an On button in the "Home/Monitoring/Controls" screen will de-energize the Off relay.
This screen is applicable only if the system is using an external CCTV switcher unit. The screen allows you to
name each monitor connected to a selected switcher unit.
For further information, see:
Overview of CCTV switching or
Overview of Setting Up a Commend Control System
Note: for the Controls license, you must use monitor numbers 1, 2 and 3 only. These will be available for
selection in the "Operation/Controls/Control Groups" screen, irrespective of the current company selected.
317
CCTV Control Intercom Definitions ("Install/Video & Audio/CCTV/Control Intercom")
A control input could, for example, be used to detect whether a barrier is open or closed.
Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls and
Intercom System. New is grayed out if your system is set up with a Intercom System port definition.
318
Symmetry Software Reference Manual
If Commend 200/700 system hardware is being used (as identified by the appropriate setting in multimax.ini),
enter the Commend address of the intercom input (up to four characters). Some addresses may be reserved by
the Commend hardware and therefore should not be used.
If Commend 416 system hardware is being used (as identified by the appropriate setting in multimax.ini), select
the address from the list. The intercom address is between 0004 and 9999, excluding 0096 to 0098 (0001 to
0003, and 0096 to 0098 are reserved for internal functions). The range of addresses in the list may be limited
by a separate setting in multimax.ini. Intercom addresses previously selected are not available in the list.
Client Name
If the intercom is to be sited next to a PC where the "Home/Controls" screen is used (that is, the intercom is to
be a guard's "master intercom"), choose the name of the client. If the intercom is not a master intercom, choose
None.
Call Request Setting
This option determines the operation of the audio link for Select Call mode in the "Home/Monitoring/Controls"
screen.
Select Duplex if you want the audio link between a caller's remote intercom and the guard's intercom to be
automatically opened when the caller generates a call request at a remote intercom.
Select Simplex if you want the audio link to be established only when the guard presses the intercom button in
the "Home/Monitoring/Controls" screen in response to the new call request.
Call Request from this Input
This option is relevant to Select Call mode in the "Home/Monitoring/Controls" screen.
If you select None, a caller can start a call by pressing a button at the remote intercom.
If the road contains a vehicle sensor to start the call automatically, select the input of the Commend system that
the sensor is connected to. This input must be set up in the "Install/Video & Audio/CCTV/Control Input" screen.
Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls and
Intercom System. New is grayed out if your system is set up with a Intercom System port definition.
319
Client Definition ("Install/Video & Audio/Intercom/Clients")
Call Number
This option is available only if the Commend 200/700 system hardware is being used, as specified by the
relevant parameter in the multimax.ini file.
Enter the address of the output at the Commend hardware (up to four characters).
Controller No.
This option is available only if the Commend 416 system hardware is being used, as specified by the relevant
parameter in the multimax.ini file.
Select the address of the I/O controller that the control output relay is connected to.
Control Output No.
This option is available only if the Commend 416 system hardware is being used, as specified by the relevant
parameter in the multimax.ini file.
Select the address of the control output relay on the I/O (controller) card. Control output addresses previously
selected are not available in the list.
Pulse Time
If you specify a value other than zero, the control output relay will energize only for the specified length of time.
After this time period, the relay de-energizes, unless already de-energized from an action in the
"Home/Monitoring/Controls" screen (for example, selecting Open de-energizes the relay used to close the
barrier).
Note: For a Zenitel Pulse system, there can be a maximum of two intercom clients per Pulse server.
Note: The same Symmetry system cannot be set up for both Commend Controls and intercoms.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
320
Symmetry Software Reference Manual
Type
Specify the type of intercom system. You cannot change the type of an existing intercom client.
Owned by Company
Select the company that is to own this client definition.
Location
Click here for information about this option.
Category
Click here for information about this option.
General Tab:
Station Number
Enter the number known to the intercom control unit that identifies the intercom being used at the
Symmetry client (for example, F117). Each intercom port on the intercom control unit is identified by a
station number (known as the device ID or directory number in Zenitel Pulse system).
Show as a Call Station
Selecting this option causes the client's intercom to be used as an intercom call station, in a similar way as
intercoms defined in the "Install/Video & Audio/Intercom/Stations" screen.
A button will appear for the client's intercom in the "Home/Video & Audio/Intercom Control" screen (for
Stentofon Alphacom) or "Home/Video & Audio/Intercom" screen (for Zenitel Pulse), and you will be able to
add the client's intercom to graphics.
Selecting the option allows other intercom clients to make calls to this client, and allows you to set up
trigger commands triggered by calls from this client.
Client Name
Select the Symmetry client.
Extended Properties Tab:
This tab is used for any options that are specific to the selected type of intercom.
Network Address
For a Zenitel Pulse intercom system, specify the IP address or DNS name of the intercom that is being
used at the Symmetry client.
321
Call Station Definition ("Install/Video & Audio/Intercom/Stations")
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Tip: The Call Request ID of an intercom can be determined from the "Home/Monitoring/Activity" screen.
Intercom Command
You can choose a DAK or DTMF button. During a call from the intercom, pressing the specified button at
the Symmetry intercom client that is handling the call will cause Symmetry to issue the command specified
by the Command option.
The selected DAK/DTMF button must be configured correctly for each relevant intercom using the intercom
system's software, as documented in the Intercom Management Installation & User Guide.
Command
This enables you to associate a command with the intercom. There are two types of command:
Pulse output - Switches on the auxiliary output selected in the menu to the right for a
predefined period of time (as specified by the installer), then switches it off. Only those
auxiliary outputs belonging to the currently selected company are available.
Access Granted - Performs the same action as a valid access-control transaction at the
reader selected in the menu to the right (that is, it opens the door at the specified reader).
Only those readers belonging to the currently selected company are available.
322
Symmetry Software Reference Manual
Note: Default View is relevant for 360-degree cameras that support dewarping, such as CompleteView
cameras. Each dewarped view can have different presets, as configured in the camera definition screen
in Symmetry.
323
Network Video Recorder (NVR) ("Install/Video & Audio/Digital Video")
Symmetry uses the selected camera settings when video from the camera is displayed in the "Home/Video
& Audio/Intercom Control" screen (Stentofon Alphacom) or "Home/Video & Audio/Intercom" screen (Zenitel
Pulse).
Extended Properties Tab:
This tab is used for any options that are specific to the selected type of intercom.
Network Address
For a Zenitel Pulse intercom system, specify the IP address or DNS name of the intercom.
Introduction
About this screen
You can use the NVR definition screen to set up a Symmetry NVR in the Symmetry software and access its
web interface. You need to set up the NVR in this screen before you can assign any cameras to it.
You may want to access the web interface to perform various management tasks, such as to add new
repositories (storage folders) or set up purge rules. Once you have connected to the NVR, the web interface is
displayed in the central part of this screen.
For an introduction to the Symmetry NVR and its web interface, please refer to About the Symmetry NVR.
General Options
Description
Enter a name for the Symmetry NVR. This is displayed in the Symmetry software and in the NVR's web
interface.
Notes Button
This option is common to many Definition screens. Click here for further information.
About the Previous and Next Buttons
When you are in the Definition screen, you can use the following icons located in the top-right corner of the
screen to display the previous or next record in the database:
If you have made any changes, you are prompted to save those changes before the previous or next record is
displayed.
Address
This specifies the IP address or name of the PC that runs the Symmetry NVR. Enter a machine name only if
your network uses a Domain Name Server (DNS).
Port
This specifies the http port used by the Symmetry software to communicate with the NVR. It must be the same
as specified when installing the NVR software (default 8080). It is the same port used to access the NVR web
interface. It is not used by cameras to access the NVR.
Connect
Click this button to connect to the NVR using the username and password provided. The NVR web interface
should be displayed in the central part of the screen if the connection is successful.
324
Symmetry Software Reference Manual
Status
The current status of the NVR (Online or Offline) is displayed near the top-right corner of the screen.
If the NVR is currently offline, any changes you make are automatically sent to the NVR when it is online.
Username and Password
Enter the username and password of an account defined in the web interface of the NVR. The account is used
to:
Provide access to the web interface.
Enable Symmetry to communicate with the NVR (such as to assign cameras and send commands).
It is mandatory to enter a valid username and password. The username and password of the default account
are installer and install respectively.
Note: NVR user credentials are local to each NVR. There is no sharing of user credentials between NVRs.
Note: The username and password used by the NVR to send alarms and events to the Symmetry software is
defined in the Digital Video tab of the "Maintenance/User & Preferences/System Preferences" screen.
Location
Click here for information about this option.
Category
Click here for information about this option.
Enable Offline Monitoring and Offline Monitoring Interval
Selecting Enable Offline Monitoring enables the Symmetry software to periodically check whether the NVR is
offline. Selecting the option enables Offline alarms\events to be generated for the NVR. The time period
between checks is determined by Offline Monitoring Interval.
Enabling or disabling this setting has no effect on whether the NVR reports camera online/offline alarms. Each
camera has a separateEnable Offline Monitoringsetting, which determines whether or not the camera is
monitored by the NVR for online/offline status.
Assign
Clicking this button displays the "Install/Video & Audio/NVR Cameras Assignment" screen, which allows you to
assign cameras to the NVR. The NVR is able to record video from only assigned cameras.
The current NVR will be automatically selected in the NVR Cameras Assignment screen.
Copy/Delete/Notes/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.
325
Global Connection ("Install/Global/Global Connection")
326
Symmetry Software Reference Manual
If encrypted (https) communications and/or a specific port number are required, the following will need to be
carried out at the head office:
1. Open the Symmetry installation folder (by default, \Program Files\Security Management System).
2. Using Notepad, edit the file named G4T.Global.CommsService.exe.config.
3. In the file, search for http://*.
4. If you want to use a specific port:
a) Add a colon and the port number after the * in http://* (for example, http://*:8080/).
b) Add the TCP port to the Windows firewall exceptions.
5. If you want to use https, change http to https.
6. Save the changes.
7. Restart the service named Symmetry Global Communication Service at the head office.
Use SSL
Select this option if encrypted communication (https) is being used between the region and head office.
Online/Offline
The status indicator displays Online if your regional Symmetry server is communicating with the head office
server. Offline is displayed if this is not the case.
Region Name
The name you specify here must match the name of the region specified in the "Install/Global/Regions" screen
at the head office, otherwise your regional server will not be able to communicate with the head office server.
The name is not case-sensitive.
Password
The password you specify here must match the password specified in the "Install/Global/Regions" screen at the
head office, otherwise your regional server will not be able to communicate with the head office server.
The password is case-sensitive.
Test Connect
After entering the connection details, click this button to test whether your regional server can communicate
with the head office. If successful, the status indicator should show Online.
Please refer to the Global Edition Installation & User Guide for information about troubleshooting
communication problems.
Apply default card permissions from
The role you select here determines the permissions needed to access the details of any new card holders
created at the region via the head office.
If you open the selected role in the "Maintenance/User & Preferences/Roles" screen, and click Default
Permissions, you can choose the roles that will have access to any new card holders created.
327
Maintenance Menu
Note: Your password may have been set up to expire a specified number of days after you have changed it.
This is set up in the "Maintenance/User & Preferences/Accounts" screen. You are warned that the password is
about to expire each time you log in during a warning period (normally 3 days) before the expiry date.
General
Overview of this screen
Introduction
A user role defines a set of access permissions to menus, screens and options in the Symmetry software.
You can allow users view-only access, modify access, delete (full) access or no access at all.
Each user must be allocated a user role (in the "Maintenance/User & Preferences/Accounts" screen),
which then determines permissions that the user has to the menus, screens, tabs and options in the
Symmetry software. More than one user can have the same user role.
A user role also specifies a company group, which determines the companies that the user is able to
administer. Some users, such as installers, may be given a company group that allows access to all
companies in the system.
Notes:
Any changes you make to a user role take effect when users who have the user role log in.
If you create a new role (either by clicking New in the Selection screen, or by coping an
existing role), the new role will not have access to any commands in the
"Home/Monitoring/Command Center" or "Home/Monitoring/Graphics" screens until you
assign commands to the role using the "Maintenance/User & Preferences/Command Roles"
screen.
328
Symmetry Software Reference Manual
You cannot delete the Visitor Management role. Please refer to the visitor management
overview (click here) for further details of the Visitor Management role.
Give access to the User Roles screen only to high-ranking system administrators, since any
user who has access to the screen can create or modify privileges, which can exceed the
privileges they hold themselves (except for screens in the Install menu).
The Tree View
The User Roles Definition screen displays a tree view of settable permissions. You can expand or collapse
the branches of the tree to view their contents in the normal way.
You can set user access permissions for each entry listed in the tree.
Expanding the tree view reveals an entry for each menu, sub-menu and screen in the Symmetry software.
For some screens, such as "Home/Identity/Card Holders", there are also entries for tabs, options or
features of the screen.
At the bottom of the tree, there is an Options branch, which contains various permissions that are not
directly related to a specific screen.
Setting Permissions
You can set the permissions to a screen by selecting the entry in the tree, then the View, Modify, Delete
or None button (or the equivalent option from the right-click menu).
Selecting a menu or sub-menu then View, Modify, Delete or None sets the same privilege level for all
options in that menu. You may be warned that privileges cannot be set for chargeable options - this may
be displayed because you do not have a license for the option or because the option has not yet been set
up correctly.
If there is no access to a menu or feature, it will not be displayed to users who have the user role.
Entries for tabs and options in the tree view have a check box. Some have two states: checked (tab/option
will be displayed to users) or unchecked (tab/option will not be displayed). Others have three states:
checked (option will be displayed), unchecked (option will be greyed out) and red crossed (option will not
be displayed).
Colors
The color of any item in the tree indicates the permissions for that item:
Black - This color is used only for menus. It indicates that the screens within the menu have
a mixture of different permissions.
Orange - Indicates that the role has view-only access to the screen/feature (or to all screens
in the menu).
Blue - Indicates that the role has modify access to the screen/feature (or to all screens in the
menu).
Green - Indicates that the role has delete access to the screen/feature (or to all screens in
the menu).
Red - Indicates that the role has no access to the screen/feature (or to all screens in the
menu). In this case, the screen/menu will not be displayed to users who have the role.
Using the Selection screen
The Selection screen is displayed when you select Roles from "Maintenance/User & Preferences". You can
use the Selection screen to create a new user role or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
Special Permissions
The following are permissions that are perhaps not obvious:
Home Menu
"Home/Monitoring/Alarms"
Allow Alarm Masking
329
User Roles Screen ("Maintenance/User & Preferences/Roles")
Select this option if you want users who have the role to be able to mask alarms.
Show Masked Alarms
Select this option if you want the users to be able to see the Masked Alarms tab in the
"Home/Monitoring/Alarms" screen. Please refer to Masking Alarms for further information.
Show All Alarms Filter
This determines whether or not the All Alarms tab is displayed in the Alarms screen.
Restrict alarm counts to selected filters
With this option set, alarm counts, alarm sounds and other indications of alarm conditions will
change only for alarms that a user is currently able to view when opening the Alarms screen.
If the All Alarms tab is hidden in the Alarms screen (by deselecting Show All Alarms filter)
and activity filters are applied that cause the Alarms screen to display only certain alarms, then
only those alarms can affect alarms counts, etc.
If the option is not selected and the All Alarms tab is hidden, alarms counts and indicators may
include alarms that you are not able to see in the Alarms screen.
Note that alarms from active maintenance zones do not affect alarm counts and other alarm
indicators.
Note: If you click the Role Filters button in the Roles screen and select a filter for Alarm
filter, any alarm that is blocked by the filter cannot affect alarm counts or other indications of
alarms to the user, irrespective of the Restrict alarm counts to selected filters setting.
"Home/Monitoring/Graphics"
Select Send Predefined Commands Only if you want only predefined commands (as set up in
"Operation/Commands/Predefined") to be available in this screen.
If the user role has no access to "Home/Monitoring/Graphics", this does not disable the automatic
displaying of an alarm graphic when acknowledging an alarm.
"Home/Monitoring/Command Center"
This has Send Commands and/or Request Status permissions for each type of item that can be
displayed in the tree view of the Command Center. These permissions determine whether the users
will be able to send commands and/or view the status of the specified device type.
Deselecting Send Commands overrides any permissions for users to use commands, as set up in
the "Maintenance/User & Preferences/Command Roles" screen.
The Intrusion Systems section include:
Allow Zone Bypass when Arming - Select this to enable users to bypass intrusion
zones that are in an active state using the Bypass Active Zones setting. This setting
is applicable to M2150 intrusion systems and intrusion systems supported by the Full
Intrusion Management interface. This setting does not affect the ability to bypass
zones individually.
Allow Node Lock Out Command - Select this to enable users to switch on lock-out
mode.
Note: The Change Company option is always available in the "Home/Monitoring" menu if the user has
more than one company in his/her company group.
330
Symmetry Software Reference Manual
Card Holder Notes - This is available for the "Home/Identity/Card Holders" screen
and determines access to notes added using the following icon:
Card Holder\VisitorShow PIN Code - Deselect this option if you want the PIN and
IDS code to be hidden in the screen. Deselecting the option also removes the PIN
Code and IDS Code options from the "Reports/Identity Reports/Cards" screen.
The personal data options (for example, Card Holder Personal Data 11-20) affect the
personal data titles available in both the Selection and Definition screens.
Card Holder\Visitor Print Button - The button to print a person's badge.
Bulk Card Delete All - This enables the Delete All button in the "Home/Identity/Bulk
Card Amendments" screen.
Giving a user delete access to "Home/Identity/Visitors" enables the user to create visitor personal
data from the Visitors screen without the need to have permissions to the "Setup/Identity/Personal
Data/Visitor Data" screen.
Similarly, giving users delete access to the Card Holder or Bulk Card Amendments screen enables
them to create card personal data in those screens without having permissions to the Card Holder
Data screen.
These can be expanded to reveal settable permissions for specific options or tabs.
The following require special mention:
Card Holder Notes - This is available for the "Home/Identity/Card Holders" screen
and determines access to notes added using the following icon:
Card Holder\VisitorShow PIN Code - Deselect this option if you want the PIN and
IDS code to be hidden in the screen. Deselecting the option also removes the PIN
Code and IDS Code options from the "Reports/Identity Reports/Cards" screen.
The personal data options (for example, Card Holder Personal Data 11-20) affect the
personal data titles available in both the Selection and Definition screens.
Card Holder\VisitorPrint Button - The button to print a person's badge.
Card Holder\VisitorCopy Button - The button to copy a card holder or visitor.
Bulk Card Delete All - This enables the Delete All button in the "Home/Identity/Bulk
Card Amendments" screen.
Giving a user delete access to "Home/Identity/Visitors" enables the user to create visitor personal
data from the Visitors screen without the need to have permissions to the "Setup/Identity/Personal
Data/Visitor Data" screen.
Similarly, giving users delete access to the Card Holder or Bulk Card Amendments screen enables
them to create card personal data in those screens without having permissions to the Card Holder
Data screen.
"Home/Identity/Verification"
This provides the following permissions:
Allow Temporary Cardholder Access Rights - Selecting this permission enables
users to grant access to a card holder located in the database, even if the card
holder's access rights do not allow access through the door.
Application Menu
Select Print Screen Button if you want the Print option to be available from the Symmetry button in the
top-left corner of the screen. The Print option prints the currently-active screen on the default Windows
printer.
331
User Roles Screen ("Maintenance/User & Preferences/Roles")
Options
Allow user to open files attached to notes - Select this if you want users to be able to open or delete
files attached to notes using the Notes button (available in most definition screens).
Record Video - Select to enable users to record video, such as from the "Home/Video & Audio/Virtual
Matrix" screen or by issuing commands.
Hide Privacy Zones - Selecting this option disables any privacy zones set up for cameras in the
"Install/Video & Audio/Digital Video" screen; that is, live or recorded video will be displayed to users without
areas being blurred or blacked out.
Export Video With Privacy Zones - Select to enable users to export video that contains privacy zones.
Video can be exported as an MPEG4 file when replaying it from, for example, the "Home/Video &
Audio/Video Playback" screen. Privacy zones are removed from any exported video clips.
Listen To Audio - Select to enable users to listen to audio from cameras in the "Home/Video &
Audio/Virtual Matrix" screen.
Allow external commands to be added to the Ribbon Bar - Select to allow users to add executable
programs to the ribbon bar using the Customize Quick Access Toolbar screen.
Allow local file browsing - This option applies only when using the Symmetry Remote Desktop Services
(RDS) Client Access software, as described in the RDS/Citrix Client Access Installation and User Guide.
Enabling this option enables users to browse files (such as card holder images) on RDS browser
machines.
Assign System Admin Privileges - Enabling this option gives System Admin privileges to any user who
has the role. With System Admin privileges, a user can, for example:
Clear alarms that have not yet been reset (e.g. if an alarm sensor has not been reset).
Circumvent any permissions set up using the Permissions button in screens.
Use the Encrypt button in the "Install/Access Control/Client Ports" screen, or the
Encryption button in the "Install/Access Control/Nodes" screen.
Use the Export NAC option in the "Maintenance/Access Control/Node Status" screen to
specify the nodes to upgrade using the Symmetry Upgrade Manager. When disabled, the file
browse location is restricted to the RDS web server.
Create Hyperlink - Select to allow hyperlinks to be inserted when defining alarm instructions in the
"Operation/Alarms/Alarm Instructions" screen.
Activate Hyperlink - Select to allow hyperlinks to be activated when defining alarm instructions in the
"Operation/Alarms/Alarm Instructions" screen or when viewing an alarm instruction in, for example, the
"Home/Monitoring/Alarms" screen.
128 Bit Badge Identity Editing - For engineering use only.
332
Symmetry Software Reference Manual
Alarm Processing
Clicking this button displays the Alarm Processing screen, which allows you to categorize alarm types defined
in the "Operation/Alarms/Reporting" screen as "Acknowledge and Clear" (the default) or "Acknowledge Only"
for the role.
Alarms that belong to alarm types categorized as "Acknowledge Only" can be acknowledged but not cleared by
users who have the role.
Role Filters
You can use this button to choose "role filters"; that is, activity filters for the role. The filters are defined in the
"Setup/Configuration/Activity Filters" screen.
The purpose of selecting filters here is to limit the alarms and events that can be displayed in the
"Home/Monitoring/Alarms" and "Home/Monitoring/Activity" screens to users that have the role. You may, for
example, want users who have the role to be able to view only alarms that originate from selected readers (as
defined by the selected filter).
Alarm filter
If you select a filter, an alarm can appear in the "Home/Monitoring/Alarms" screen only if it passes the rules
defined by the filter. An alarm cannot appear in the Alarms screen (irrespective of the tabs and filters
selected in the Alarms screen) unless it passes the rules defined by the filter (or you choose <None>). The
message "Warning role filters are applied" appears near the top of the Alarms screen if Alarm filter is
active for the user. Any alarm that is blocked by Alarm filter cannot affect alarm counts or other
indications of alarms to any user that has the role.
Activity filter
An alarm or event can appear in the "Home/Monitoring/Activity" screen only if it passes the rules defined
by the selected filter. An alarm or event cannot appear in the Activity screen (irrespective filter selected in
the Activity screen) unless it passes the rules defined by the filter selected here.
Auto Logoff Time
Users who have the role are logged off automatically from Symmetry if there is no keyboard or mouse activity
after number of minutes specified by Auto Logoff Time. This is a security measure to prevent unauthorized
use of the system. If a user is logged off, alarms are displayed on the logon screen (if appropriate to the type of
client you are using.
If you specify a value other than zero (0), the setting in this screen takes priority over the same setting in the
"Maintenance/User & Preferences/Client Preferences" screen.
A value of zero (0) causes the value of Auto Logoff Time set in the "Maintenance/User & Preferences/Client
Preferences" screen to be used instead.
Expand
This button fully expands all contents of the currently-selected item in the tree view.
Collapse
This button fully collapses the currently-selected item in the tree view.
Hide
This button is available only for certain checkboxes, such as those in the "Home/Identity/Card Holders/Card
Details" branch. Selecting the button causes a red cross to be inserted into the checkbox to indicate that the
option will be hidden from users who have the role.
Disable
This button removes the check mark from a checkbox selected in the tree view.
Enable
This button adds a check mark to a selected checkbox in the tree view.
333
User Accounts Screen ("Maintenance/User & Preferences/Accounts")
View
Select this option if you want users with the user role to be able to have only view access to the information
displayed by the selected screen/menu.
Modify
Select this option if you want users with the user role to be able to have only view and modify access to the
information displayed by the selected screen/menu. This privilege will enable users to modify records, but not
delete them.
Delete
Select this option if you want users with the user role to be able to have full access to the information displayed
by the selected screen/menu. This privilege will enable users to view, modify and delete records.
None
Select this option if you want users with the user role to have no access to the selected screen (or to all screen
in the selected menu).
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Directory
This button is available only if a license for the "Directory/LDAP Authentication Module" is installed. Clicking the
button displays the Directory Settings screen.
General
Overview of this screen
A user is a person who is allowed to use Symmetry. Each user has a name, password and user role.
Before using this screen, make sure that the user roles have been set up in the "Maintenance/User &
Preferences/Roles" screen.
Note: Any changes you make to a user's settings take effect when the user next logs in.
Note: Certain options, such as User Name and Password are disabled if the user has been automatically
created by the "Directory/LDAP Authentication Module".
334
Symmetry Software Reference Manual
335
User Accounts Screen ("Maintenance/User & Preferences/Accounts")
Home Screen
You can select a "Home Screen" defined in the "Maintenance/User & Preferences/Home Screens" screen.
The screens defined in the selected Home Screen will be displayed automatically when the user logs in.
Selecting Lock Position prevents the user from being able to close, adjust the size or change the position
of the home screens.
Task List Assignment
This option is relevant to task processing and assignment, such as in the "Home/Monitoring/Tasks" screen.
The option affects:
The tasks the user is able to view and process. This is dependent on the user's role, the role
or user the task is assigned to, and the selected Task List Assignment setting:
All Users - The user is able to view and process any task, irrespective of the user or
role it is assigned to.
Same User Profile - The user is able to view and process any task assigned to the
user's own role, or any user who has that role.
User Only - The user is able to view and process only tasks assigned to the user or to
the user's own role.
The users and roles to which the user is able to assign tasks. This is dependent on the
user's role, and the selected Task List Assignment setting:
All Users - The user is able to assign tasks to any user or role.
Same User Profile - The user is able to assign tasks to the user's own role or to any
user who has that role.
User Only - The user is able to assign tasks only to himself/herself.
Ignore/Bypass Permission Filters
Select this option if you want the user account to bypass any permissions set up in the Permissions screen
for items such as card holders, cameras, readers and reader groups.
Click here for further information.
Enable Permissions
Select this option if you want the Permissions button to be available in screens that the user will use.
Click here for further information.
Authorize Change of Threat Level
This option is applicable only for threat levels that have Requires Authentication set in the
"Setup/Configuration/Threat Levels" screen.
When changing a threat level (for example, in the "Home/Monitoring/Change Threat Level" screen), if the
level selected has Requires Authentication set, two users that have the Authorize Change of Threat
Level privilege must enter their usernames and passwords. The change of threat level is actioned only if
the usernames and passwords are correct.
This option is not available at Card Handler Clients.
Enable Clear All Alarms
Selecting this option will enable the user to use the Clear option in the "Home/Monitoring/Alarms" or
"Home/Video & Audio/Virtual Matrix" screen to clear all displayed or selected alarms, except those that
need a reset. The privilege takes effect at the user's next login.
To clear alarms that need a reset, the user's role requires Assign System Admin Privileges to be set in
the "Maintenance/User & Preferences/Roles" screen.
Instant Replay
This option specifies the maximum period of recorded video that can be reviewed in the Video Replay
screen, when accessed by selecting either of the following:
336
Symmetry Software Reference Manual
Instant Replay in the "Home/Video & Audio/Virtual Matrix" screen. For further information,
refer to the help for the Video Replay screen.
Associated Playback Video when replaying video associated with a device that is in alarm
or in a graphic. For further information, please refer to About Camera Views and Camera
Associations.
The option is available only if a Digital Video Management license is installed.
337
Command Roles Screen ("Maintenance/User & Preferences/Command Roles")
General
Overview of this screen
You can use this screen to specify the commands that user roles, and therefore users, have access to as
manual commands within Symmetry. For example, you could specify that the "Card Only" command is available
only to the "System Manager" and "Installer" roles, which would prevent users with other user roles from being
able to use these commands in the "Home/Monitoring/Command Centre" and "Home/Monitoring/Graphics"
screens. The screen has no effect on the availability of commands within the
"Operation/Commands/Scheduled" or "Operation/Commands/Trigger" or "Operation/Commands/Predefined"
screens.
The "Assigned User Roles" box (in the User Roles tab) lists the user roles that have permission to use the
commands listed in the "Assigned Commands" box (in the Commands tab).
Users have access to all commands assigned to their user role, and this may be through more than one
command role, as the same user role can be in more than one command role.
The command roles listed in the Selection screen, and the user roles listed in the Definition screen, are not
dependent on the currently-selected company or your company group.
You can use the "Reports/Configuration/Reports" screen to list the commands assigned to each user role.
Using the Selection screen
The Selection screen is displayed when you select Command Roles from "Maintenance/User & Preferences".
You can use the Selection screen to create a new user role or to find an existing one to edit. Click here for an
overview of Selection screens and how to use them.
Using the screen
To specify the commands that selected user roles can use as manual commands:
1. In the User Roles tab, select the user roles by including them in the "Assigned User Roles" box.
2. In the Commands tab, select the commands that you want the selected user roles to be able to
use. You can do this by including the commands in the "Assigned Commands" box.
The Typical Usage column lists the typical usage of each command. Some commands have more than
one typical usage. For these, when commands are listed in alphabetical order, the Typical Usage column
shows the usages comma-separated; for example, "Camera, Intercom". Some commands have no typical
usage.
You can move roles from "Available User Roles" to "Assigned User Roles" as follows:
1. Select the user roles in the "Available User Roles" box. You can control-click or shift-click in the normal way
to select multiple items.
338
Symmetry Software Reference Manual
2. Click >, double-click or drag and drop to the "Assigned User Roles" box.
You can move roles from "Assigned User Roles" to "Available User Roles" as follows:
1. Select the user roles in the "Assigned User Roles" box. You can control-click or shift-click in the normal way
to select multiple items.
2. Click <, double-click or drag and drop to the "Available User Roles" box.
Available Commands
Click here for a description of each command.
General
This screen enables you to switch on/off various settings that affect all Symmetry clients.
Tabs
Settings
Route Holiday/Advance/Retard Checks to
Advance and Retard Check 7 Days Prior
Limit Invalid Logon Attempts
Allow Use of Old Passwords
Strong Password
Minimum Password Length
Filter by Company
Command Line Logon
Verbose Bulk Card Amendment Logging
Default Language Pack
Save User Screen Positions
Show Door Status on Graphics
Monitor Point Status on Graphics
No of Card Holder Activity Images
Email Notification of Visitor Signing in
Mandatory Intrusion Comments
Enable Comments on Graphic
339
System Preferences Screen ("Maintenance/User & Preferences/System Preferences")
340
Symmetry Software Reference Manual
341
Client Preferences Screen ("Maintenance/User & Preferences/Client Preferences")
General
Overview of this screen
Tabs
Settings
Auto Logoff Time (Mins)
Enable Logon Cancel Button
Auto Display Graphic On Call Request
Enable Alarm Banner
Visitor Selection By Today
Show Background Image
Background Image File Name
Default Fingerprint Acceptance Threshold
Force Fingerprint Verification
Selection List Rows Limit
342
Symmetry Software Reference Manual
Filter by Company
Alarm Settings
Default Alarm Sound / Custom Default Alarm Sound File
You can use this menu to choose a default alarm sound for this client. The sound is used if an alarm is
displayed at the client and no alarm sound is selected in the "Operation/Alarms/Definitions" screen. If you
select Custom, you can choose a sound of your choice (media wave file) by clicking Find Sound. Custom
Default Alarm Sound File shows the media wave file you have selected using Find Sound. Select None
if you do not want a default sound.
There are some useful "wav" files in the Program Data\Security Management System\Sounds folder.
Show Chain Name with Alarms
Selecting this option causes a "Chain" column to be displayed in the "Home/Monitoring/Alarms" and
"Home/Video & Audio/Virtual Matrix" screens. The chain name is displayed if the alarm has originated from
a node located on a LAN, hardwired or dial-up chain.
The chain name is not displayed in the "Home/Monitoring/Activity" screen.
Auto Show Graphic on any Alarm
Select this option if you want the "Home/Monitoring/Graphics" screen to be automatically displayed when
an alarm occurs at any device that has a graphic.
If a graphic hierarchy has been defined, Display Lowest Graphic Level determines whether the highest-
level or lowest-level graphic containing the device is displayed.
A graphic is displayed only if the "Home/Monitoring/Alarms" screen is not open (if the
"Home/Monitoring/Alarms" screen is open, the software assumes that the user would prefer to continue to
use this screen).
Note: You can use Display Graphic on Alarm in the "Operation/Alarms/Definitions" or
"Operation/Alarms/Reporting" screen to display a graphic only when a selected device goes into alarm.
Selecting Auto Show Graphic on any Alarm applies to all devices and overrides Display Graphic on
Alarm.
Display Lowest Graphic Level
This option is relevant if Auto Show Graphic on any Alarm is selected above, or if Display Graphic on
Alarm is selected in the "Operation/Alarms/Definitions" or "Operation/Alarms/Reporting" screen. If the
option is selected, the lowest-level graphic containing the device will be displayed. If the option is not
selected, the highest-level graphic containing the device will be displayed.
343
Client Preferences Screen ("Maintenance/User & Preferences/Client Preferences")
Note that this option only prevents the displaying of the statistics at the client computer. If you want to stop
the alarm statistics processing at the server to obtain performance benefits, deselect Enable Alarm
Statistics in the "Maintenance/User & Preferences/System Preferences" screen.
Reset Alarm Statistics
Sets Alarms received since last reset in the "Home/Monitoring/Alarms" screen to zero.
This option is not available if Show Combined Alarm/Acknowledgement Screen is selected.
Enable Simulated Transactions
Selecting this option enables a user who is logged into the Symmetry software at the client to simulate
alarms/events using keyboard shortcuts. For example, pressing CTRL and F1 simulates a Door Forced
transaction for the first reader (ID=1) attached to the first node (ID=1) defined in the database.
This option may be useful for demonstrating alarms and activity in the Symmetry software.
Note: For this feature to work, the readers and monitor points must connect to the first node that was set
up in the database (database ID=1). The feature will not work if you have deleted this node, even if you
delete all nodes and set up another.
344
Symmetry Software Reference Manual
345
Home Screens Definition ("Maintenance/User & Preferences/Home Screens")
CCTV Connections
This tab is displayed only if enabled in the "Maintenance/User & Preferences/Roles" screen. The tab allows you
to configure CCTV switchers.
General
Introduction
You can use this screen to store the names and positions of the currently open screens. This information is
stored as a named "Home Screen". Note that a Home Screen can actually contain the names and positions of
more than one screen.
If a user is assigned a Home Screen in "Maintenance/User & Preferences/Accounts", the screens it contains
are automatically displayed when the user logs in. The user can also select Home in the Window menu to
display the screens (all other screens will be closed).
Screen Options
New
Clicking New stores the names and positions of the currently open screens, except "Maintenance/User &
Preferences/Home Screens". You are prompted to enter a name for the Home Screens definition.
Update
Clicking Update displays a dialog that enables you to change the name of the currently selected Home Screen,
and/or the screens it stores. Select Save current window layout for this Home Screen to change the Home
Screen definition to include only the names and positions of the currently open screens.
Delete
Click Delete to delete the currently selected Home Screen.
Close
Click Close to close this screen.
General
Use this screen to force card data to be downloaded to all nodes. A node is a 'black box' that controls and holds
data for one or more readers.
Use this screen prior to a service call if you find that one or more cards inexplicably do not function as expected.
The node may have become out of step with the data on the server (for example, due to a communications error),
and using this screen may cure the problem.
Screen Options
No Immediate Download
Select this option if you want to select OK to save the Automatic Download settings without causing an
immediate download by card number, company or chain name.
346
Symmetry Software Reference Manual
347
Download a Chain ("Maintenance/Download/Chain")
348
Symmetry Software Reference Manual
349
Door Timing Screen ("Maintenance/Access Control/Door Timing")
General
Overview of this screen
Use this screen to alter various door-related times, such as the length of time that a door is allowed to remain
open after access has been granted.
You are able to alter times only for the readers assigned to the currently selected company. The installer
defines the readers that are assigned to each company.
The door times specified in this screen override the settings made in the "Install/Access Control/Reader"
screen.
It is also possible for card holders to override the default door open time at Series 6xx and later readers,
providing the reader has a keypad. For further information, see About Card Commands.
Note: This screen cannot be used to change door timings for doors controlled by ASSA ABLOY DSR locks.
Screen Options
Reader Description
Use this pull-down list to choose the reader that controls the door.
Unlock Relay Times
Once a door is unlocked, this is the maximum amount of time that the person is given to open the door before it
is relocked. If the door is not opened within this amount of time, the person must present the card again.
Door Open Time and Door Pre-held Time
These times are intended to cases of when, for example, a door is jammed open. After the door has been
unlocked, if the door is open after the amount of time specified by Door Open Time, the reader's pre-held
sounder (if fitted) operates until the door is shut. The maximum length of time that the sounder operates is
specified by Door Pre-held Time (which could be zero). The sounder warns that the door should be closed. If
the door is still open at the end of the Door Pre-held Time, the reader generates a 'Door Held Open'
event/alarm.
It is possible for card holders to override the default Door Open Time at Series 6xx and later readers (providing
the reader has a keypad). For further information, see About Card Commands.
Extended Unlock Time
This is an alternative unlock relay time for people who have the Extended Door Times option set in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Extended Open Time and Extended Pre-held Time
These specify an alternative door open time and door pre-held time for people who have the Extended Door
Times option set in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Previous
Use this button to move alphabetically backwards through the readers.
If you do not select OK before selecting Previous, any changes you have made are lost.
Next
Use this button to move alphabetically forwards through the readers.
If you do not select OK before selecting Next, any changes you have made are lost.
350
Symmetry Software Reference Manual
General
You can use this screen to upload all events stored at nodes at a remote site; that is, in a "dial-up chain" or
periodically-accessed "LAN chain". The installer normally sets up your system to collect the data automatically at
regular intervals, but you may want to upload the data manually if you receive a Node Buffer >75% Full or Node
Buffer Overflow alarm, or if you need to produce a history report of recent activity at the site.
Click here for details of Node Buffer >75% Full.
Click here for details of Node Buffer Overflow.
Once you have started an upload, you can continue to use the system while the upload takes place.
Note: The upload can take some time. Before starting an upload, note that normal communications with other
chains that use the same PC port are suspended. For example, if you add new card holders or change their details,
this information is not sent to other chains that use the same PC port until the upload is complete. In addition, if the
other chains do not have access to a secondary dial-in modem, new alarms are not delivered until the upload is
complete.
The number of retries, time between retries and the maximum connect time are the same as for a scheduled call to
the site, as set up by the installer.
Screen Options
Dial-Up Site/LAN Chain Name - Choose the dial-up chain or LAN chain that is to have its events uploaded. Only
LAN chains that are set up for Periodic access in the "Install/Access Control/Chains/LAN" screen are included.
351
Encode Cards Screen ("Maintenance/Access Control/Encode Cards")
General
Overview of this screen
This screen enables you to encode a card number and other information onto a magstripe card. If required, you
can encode a range of cards.
The computer port used by the magstripe encoder is defined by the installer.
When you have selected or entered the required information in the screen, select OK to begin the encoding
process. Any existing encoded information on the card is overwritten.
Note: You can encode smart cards using the Encode button in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
Screen Options
Facility/Customer Code
Use this pull-down list to select the facility/customer code to encode on the card(s). Facility/customer codes are
defined in "Setup/Configuration/Facility/Customer Codes".
The customer codes allowed to be encoded on a card are specified in an encrypted file.
Select Format
Select the encoding format, track number (cards may have more than one magnetic track) and bpi (bits per
inch) setting. Micromax always uses 75bpi.
The formats are defined in the "Install/System/Default Settings/Reader/Card Formats" screen, but only certain
formats are supported for encoding.
The installer can set up the default track in an ini file.
Start Card Number
Specify the card number to encode on the first card.
End Card Number
Specify the card number to encode on the last card. If you want to encode just a single card, specify the
required card number in Start Card Number only.
Card Issue Number
Specify the card issue number if the card format requires an issue number. 0 is the first issue number 9 is the
maximum issue number.
The Card Issue Levels setting in the "Maintenance/User & Preferences/System Preferences" screen
determines whether or not an issue number is needed.
Instruction Messages
This box displays messages and prompts as the cards are being encoded.
352
Symmetry Software Reference Manual
OK
Click to start encoding.
Cancel
This takes you out of the Encode Cards screen without performing any encoding action. It also allows you to
abort an encoding session.
General
Overview of this screen
This screen enables you to use a magstripe encoder to read the card number and customer code (if applicable
to the card technology) that is encoded on a magstripe card. The computer port used by the reader is defined
by the installer.
Click OK to start the process.
Screen Options
Select Format
Select the encoding format and track number (some cards have more than one magnetic track). The installer
can set up the default track in an ini file.
Instruction Messages
This box displays messages and prompts during the process.
Data Read
The encoder unit reads the customer code and card number on the card.
If the customer code is known to the system, the corresponding name of the company is displayed.
General
Overview of this screen
This screen enables you to read the encoded details of a smart card.
The computer you are using must be connected to a Smart Card Encoder, as selected in the
"Install/System/Client Ports" screen. The screen cannot be used to read cards presented to an S81x fingerprint
encoder, or 821/822 encoder.
Select OK to begin the process.
Screen Options
Select Sector to use
DES Fire Encoding
User PIN Active
Format
Site number
User PIN
353
System Time Screen ("Maintenance/Time/System Time")
Instruction Messages
Data Read
General
Overview of this screen
This screen enables you to view the current date and time and the daylight-saving adjustments that are set up
in Windows at this computer. The settings have been defined using Date/Time in the Windows Control Panel.
You can also use the screen to send the current date and time to all nodes in the system (not just those
connected or controlled by this computer).
The time at nodes connected by a permanent link to the controlling client PC is automatically updated
approximately every half hour. The time at nodes on dial-up chains is updated whenever the controlling client
PC connects to the chain. You can send the current time to all nodes on the system by selecting Send Time To
Controllers.
About the Advance/Retard Check dialog
A Clock Advance/Retard Check dialog is automatically displayed when a user logs in at any time during the 7-
day period prior to the advance/retard date. The dialog is displayed only when logging in at the client PC
specified by Route HolidayAdvance/Retard Checks to in the "Maintenance/User & Preferences/System
Preferences" screen.
The dialog enables the user to check that the advance/retard date is correct before it occurs. The dialog has
OK and Cancel buttons. Selecting OK prevents the message from being displayed again for the
advance/retard date (details of the user who selects OK are saved in the History log). Selecting Cancel causes
the message to be displayed again at the next login.
Screen Options
Current Time
This displays the current date and time, the computer's time zone and whether the computer is currently
running within standard or daylight-saving time.
Standard Time
This box shows information only if the computer's clock has been set up in Windows to adjust automatically for
daylight-savings time changes. The box shows the adjustment date, time and value to take the computer from
daylight-savings time to standard time.
The adjustment date, time and value are determined automatically within Windows from the selected time zone.
The displayed date is in the current year; this will automatically change at the beginning of the next year.
Daylight Saving Time
This box shows information only if the computer's clock has been set up in Windows to adjust automatically for
daylight-savings time changes. The box shows the adjustment date, time and value to take the computer from
standard time to daylight-savings time.
The adjustment date, time and value are determined automatically within Windows from the selected time zone.
The displayed date is in the current year; this will automatically change at the beginning of the next year.
Send Time To Controllers
Select this option if you want to update the date and time at all nodes in the system (not just those connected or
controlled by this computer) when you select OK.
354
Symmetry Software Reference Manual
Note: Some types of devices (such as fingerprint enrollment readers) are not able to be monitored.
Use the Find button in the Selection screen to find the port(s) to monitor. Select the port(s), then click OK. A
separate window is displayed for each port selected. You can use All or Clear in the Selection screen to
select/deselect all ports listed.
Note: If a node is disconnected then reconnected to the network, it may take a while for the node to accept
messages from Symmetry. A "connection refused" message appears repeatedly until the connection is
accepted.
355
System Licenses ("Maintenance/Licensing/System Licenses")
Show Tests
For engineering use only.
Overview
This "Maintenance/Licensing/System Licenses" screen enables you to install and register licenses for optional
software modules, or for packages that extend the capabilities of the Symmetry software.
The screen lists the licenses that are installed, their serial number and their status.
The "Reports/Configuration/System Configuration" screen shows the supported number of readers, clients,
cameras and other devices. This depends on the licenses purchased and the version of the Symmetry software that
is being used.
Adding a License
If you want to add a license:
1. Click Add. A dialog is displayed.
2. Enter the serial number given to you when the license was purchased.
3. Follow steps 3, 4 and 5 above.
Deleting a License
You can delete an inactive license by selecting the license and clicking Delete.
If you need to delete an activated license, please contact your AMAG support representative.
356
Symmetry Software Reference Manual
357
Maintenance Zones Screen ("Maintenance/Maintenance Zones/Maintenance Zones")
Column Headings
License Code
Shows the license code that was previously entered in the New License Code field to provide the license.
License Type
Indicates whether the license is a standard or visitor license.
Allocated Machine
Shows the network name of the machine that has been allocated the license.
Buttons
Add
Click this button after entering a new license code in New License Code.
If you have used Delete, you are not able to use Add for a period of 60 seconds.
Delete
Choose a license code in the list then click Delete if you want to delete all licenses added using that license
code. You can add the licenses again by entering the license code in New License Code and clicking Add.
Release
This is relevant only for visitor RDS/Citrix client licenses. You can select a license and click Release to release
the license from the allocated machine and return it to the pool of available licenses.
After using Release, the button is disabled for a period of 60 seconds.
General
Overview of this screen
You can use this screen to define maintenance zones.
Using the Selection screen
The Selection screen is displayed when you select Maintenance Zoness from "Maintenance/Maintenance
Zones". You can use the Selection screen to create a new maintenance zone or to find an existing one to edit.
Click here for an overview of Selection screens and how to use them.
358
Symmetry Software Reference Manual
Active
Select this option if you want the maintenance zone to be active.
Available Nodes
This box lists the nodes that are not yet in the maintenance zone.
A node cannot be in more than one maintenance zone.
Selected Nodes
This box lists the nodes that are in the maintenance zone.
>>/<</Delete/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.
359
Hyperlinked Main Topics
Configurations
Alarm and output controllers can be used in the following configurations:
In multiNODE-2 systems, a single ACR can be connected to a 2-reader node (MDU-2) that either
has no DCUs or only one 2-reader DCU (the ACR occupies the address space of 4 readers, and
therefore it is not possible to connect two ACRs to an MDU-2):
In multiNODE-2 systems, a single ACR can be connected to a 4-reader node (MDU-4) that uses no
DCUs:
In multiNODE-2100 systems, one ACU and an optional 4DCU, or two ACUs, can be fitted inside the
same cabinet with a DBU:
360
Symmetry Software Reference Manual
In multiNODE-2100 systems, one or more alarm controllers can connect remotely to a multiNODE-
2100 DBU (refer to the M2100 Engineering Guide).
In multiNODE-2150 systems, one or more alarm/output controllers can connect remotely to a
multiNODE-2150 database unit (refer to the M2150 Design Guide).
Introduction
IfCommand Card Holder is selected in the "Home/Identity/Card Holders" screen, the card holder is recognized as
a command-card holder and is able to perform special operations at keypad readers (Series 6xx or later) that have
been defined as Card Command readers in the "Install/Access Control/Reader" screen.
The type of operation that can be performed depends on how the Command Mode option has been set up for the
reader in the "Install/Access Control/Reader" screen:
If set to Card Commands, command-card holders are able to generate "Card Command"
alarm/event messages by pressing the star or tick key, entering a number in the range 1 to 99,
then making the access-control transaction (access rights permitting). The sequence *9, for
example, generates the Card Command 9 alarm/event without opening the door. The alarm/event
can be made use of by trigger commands, for example to arm or disarm an intruder alarm.
Some readers have an LED (light-emitting diode) marked with a switch symbol. This is intended to indicate
the current status of an intruder alarm or other device that has been switched on/off by a card command.
If set to User Initiated PIN, command-card holders are able to change their PIN at the reader. The
new PIN must be the same length as the existing PIN. For a keycard, Symmetry disables keycard
functionality if the new PIN is invalid as a keycard PIN (e.g. 1111).
If set to User Initiated Door Time, command-card holders are able to override the reader's
associated door open time while performing an access-control transaction at the reader. The
override applies only for the current transaction; the door reverts to the default door open time (as
defined in the "Maintenance/Access Control/Door Timing" screen) for the next normal access-
control transaction at the reader.
Note: Only readers connected to a node with the Node Supports User Initiated Door Times / PIN Changes
option set in the "Install/Access Control/Node" screen can be set up with User Initiated PIN or User Initiated
Door Time. Node Supports User Initiated Door Times / PIN Changes requires the node to be installed with
the appropriate firmware.
Card command mode can be enabled or disabled for a reader by using the Card Command Mode On and Card
Command Mode Off commands (such as from the "Home/Monitoring/Command Center" screen).
361
About the Directory/LDAP Authentication Module
Card commands cannot be executed at readers that are in Customer Code Only mode, or readers connected to
elevator nodes or Micronodes.
362
Symmetry Software Reference Manual
The Directory Link screen also contains the Allow Local Symmetry User Authentication option. When the option
is set, it allows the Logon screen to be used to log on using the username and password of a user defined locally in
the Symmetry software.
Note: "Maintenance Mode" (which can be set in the "Install/Access Control/Node" screen for an M2150
intrusion node) causes alarms from an intrusion node to be sent as events. If an intrusion node is in
Maintenance Mode and is also in an active maintenance zone, Symmetry receives only events from the node
and processes them as described above.
363
About the Service Monitor
The following describes how to use filters to view alarms and/or activity from nodes in an active maintenance zone.
To view maintenance zone alarms in the "Home/Monitoring/Alarms" screen:
1. Click Select Filters.
2. Select the auto-generated filter that has the same name as the maintenance zone.
3. Move the filter to the Filters Shown box.
To view maintenance zone alarms and events in the "Home/Monitoring/Activity" screen:
1. From the Filter menu, select the auto-generated filter that has the same name as the maintenance zone.
Creating a Custom Filter for Maintenance Zones
You can define custom filters in the "Home/Monitoring/Alarms" to include maintenance zone(s). This allows you to,
for example, create a single filter that includes all maintenance zones, or a filter that includes maintenance zones
and other types of alarm.
To create a filter that includes a maintenance zone:
1. Click Filters in the "Home/Monitoring/Alarms" screen.
2. Click New, then:
a) Enter a filter name.
b) For Column Name, choose Where.
c) For Operator, choose Equal to.
d) For Value Type, choose Maintenance Zone.
e) In the Value field, select the maintenance zone.
f) Click Apply Rule.
g) Continue to define the filter (for example, repeat steps b) to e) for the second maintenance zone and
click Add AND.
3. Click OK, then Close.
4. Click Select Filters in the "Home/Monitoring/Alarms" screen.
5. Select the new filter.
6. Move the filter to the Filters Shown box and click OK.
364
Symmetry Software Reference Manual
Note: The Service Monitor can be disabled by the installer (as described in the Software Installation Manual).
The green indicator in the top-left corner of the icon flashes red if any of the services used by Symmetry have
stopped.
Double-clicking the icon displays the following dialog, which shows the current status of the services:
The fields and options in the dialog have the following meanings:
Network Name - The name of the PC on which the services are running.
Polling Interval - This determines how often the Service Monitor refreshes the dialog (to reflect the
current status of the services).
Stop - Stops the selected service.
Start - Re-starts the selected service.
Refresh - Refreshes the dialog straight away.
Show All Services - When selected, all Windows services are listed. When unselected, only those
services relevant to Symmetry are listed.
Close - Closes the dialog. This does not stop the services, and you will still be able display the
dialog again by double-clicking the icon in the System Tray.
365
About the Symmetry NVR
Introduction
The Symmetry Network Video Recorder (NVR) is PC-based software that is able to record and store video in any
accessible folder (repository) on the network. The NVR records video from all digital video cameras that are
assigned to it. Typically, the repositories use separate network-attached storage, but it is allowable to use any local
or network-accessible disk.
The Symmetry NVR also stores sound provided with H.264 video streams, if supported by the camera and
Symmetry camera plug-in. The sound can be replayed in the Symmetry "Home/Video & Audio/Video Playback"
screen.
The following illustration shows one possible example of a Symmetry architecture that includes an NVR.
There can be multiple NVRs in the same system. Each requires a separate PC, which can be a Symmetry server,
client or any other suitable PC on the network. An NVR can be shared by more than one Symmetry company.
Video stored by an NVR can be replayed using the "Home/Video & Audio/Video Playback" screen.
Each NVR stores the details of the cameras that are assigned to it. Any changes in the Symmetry software are
automatically downloaded to the NVR.
The NVR is able to mark recordings as tagged, bookmarked, user and standard.
366
Symmetry Software Reference Manual
Recording Video
It is possible to record video to a Symmetry NVR using any of the following in the Symmetry software:
"Home/Monitoring/Command Centre"
"Home/Monitoring/Graphics"
"Home/Video & Audio/Virtual Matrix"
"Operation/Commands/Scheduled"
"Operation/Commands/Trigger"
"Operation/Commands/Predefined"
"Setup/Configuration/Threat Levels" (commands)
"Operation/Alarms/Commands"
367
Acknowledge Alarm Screen ("Home/Monitoring/Alarms")
General
Overview of this screen
Use the Acknowledge Alarm screen to:
Find out the instructions you should follow when an alarm is generated.
Add comments to record the actions you take.
Acknowledge a new (default RED) alarm.
Clear a previously-acknowledged (default GREEN) alarm. Depending on settings, an alarm that is
acknowledged but has not yet been reset (default BLUE) can clear automatically - see "Clear"
below.
The screen is displayed if you have:
1. Opened an alarm in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen.
2. Highlighted an alarm in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen,
viewed an associated graphic in the Graphic screen, then selected the Acknowledge option in the
Graphic screen.
The system ensures that only one user can acknowledge or clear an alarm if it is displayed at more than one
client PC in the same Symmetry system at the same time - the system grays out the relevant options in the
Acknowledge Alarm screen if the alarm is currently being acknowledged or cleared at another client.
What do the alarm messages mean ("WHAT" column)?
See Alarm/Event Messages for details of each message.
Panels
Alarm Details
The Alarm Details panel displays details of the alarm and, if applicable, the image of the card holder or visitor
who caused the alarm. Refer to the help for the "Home/Monitoring/Alarms" screen for further information about
the alarm details.
This panel can be hidden by reducing the size of the screen.
Alarm Instructions
The Alarm Instructions panel displays the instructions you should follow when the alarm is generated. These
are defined in the "Operation/Alarms/Definitions" screen.
If the instructions include several different instructions, you can use the controls at the top and bottom of the
scroll bar to move between the previous/next alarm instruction. A splitter in the window separates each
instruction.
You can use the button to display the instructions in a separate window. This window provides a Zoom
option. The window retains its size, location and zoom state when you close it, so that it appears the same if
you open it again.
You can use the right-click menu to copy information into the clipboard.
Comments
The Comments box enables you to add a comment while acknowledging the alarm:
Click Select Standard Comment to add a predefined comment (as configured in the
"Operation/Alarms/Comments" screen) at the cursor position. You can use the button
368
Symmetry Software Reference Manual
several times to add more than one comment. Alternatively, type comments directly into the
Comments box.
It is mandatory to select or enter a comment before you can acknowledge or clear an alarm
if Alarm Comments Mandatory is selected in the "Maintenance/User & Preferences/Client
Preferences" screen.
The system makes available comments belonging to the company that owns the device that
is in alarm, or if the alarm is not related to a company, all comments belonging to all
companies.
You can use the right-click menu to cut, copy and paste text.
Previous Comments
The Previous Comments panel displays any previous comments you may have entered for the alarm.
Each comment is preceded by the name of the user who entered the comment, and the date and time the
comment was added.
You may see the following comment:
Client: failed to acknowledge alarm within <X> minutes
Alarm Escalated to Client: <PC Name><Time and Date>
This indicates that the alarm was not acknowledged within a specified period of time, and therefore was
redirected to the named client PC (<PC Name>). This feature is set up in the "Operation/Alarms/Routing"
screen.
You can use the button to display the comments in a separate window. This window provides a Zoom
option. The window retains its size, location and zoom state when you close it, so that it appears the same
if you open it again.
Command button
Clicking the Command button causes the system to execute the command associated with the selected alarm
(as set up in the Alarm Commands screen).
The command may, for example, cause the CCTV camera image at the alarm location to be displayed on a
CCTV monitor.
The Command button is grayed if the alarm has no command set up in the Alarm Commands screen. The
button is also grayed out if the alarm is a dial-in alarm.
Card button
This button is enabled if the selected alarm/event was caused by a person whose card is known to the system.
Click the button to display the card details in the "Home/Identity/Visitors" or "Home/Identity/Card Holders"
screen.
Replay button
This button is enabled if the selected alarm/event has a tagged video clip created using a Record Video
command. Click the button to replay the clip.
Graphic button
This button displays the highlighted alarm on a graphic. Normally, the graphic is a plan of the building, and can
be used to quickly identify the location of the alarm
Screen Buttons
Clear
Clears the alarm. Any new comments you have added are saved. Unless you have System Admin privileges
(as specified in the "Maintenance/User & Preferences/Roles" screen), you cannot clear an alarm that needs to
be reset first, such as an alarm from a monitor point.
369
Acknowledge Multiple Alarms Screen ("Home/Monitoring/Alarms")
If Auto Clear Alarm on Reset is selected in the "Maintenance/User & Preferences/System Preferences"
screen, an alarm that requires a reset can clear automatically after you have attempted to clear it manually.
For further information, please refer to "Auto Clear Alarm on Reset".
You cannot clear alarms that belong to an alarm type categorized as "Acknowledge Only" in the Alarm
Processing screen.
Mask
This button is available if the Allow Alarm Masking privilege is set in your user role ("Maintenance/User &
Preferences/Roles" screen) and you are acknowledging an unmasked alarm.
You can use the button to mask the selected alarm (without acknowledging it).
Please refer to Masking Alarms for further information.
Clear Mask
This button is available if you are acknowledging a masked alarm from the Masked Alarms tab.
You can use the button to clear the mask from the selected alarm (without acknowledging it).
Please refer to Masking Alarms for further information.
Connect/Disconnect
This button is enabled if a Call Request alarm has been generated from an intercom connected to a Stentofon
Alphacom Intercom System. You can use Connect to make an audio link between your intercom and the
intercom making the call request.
When you select Connect, the button changes to Disconnect, which allows you to disconnect the link. The link
is automatically disconnected when you close the Acknowledge Alarm screen.
The button is grayed out if the alarm is already being viewed in the Acknowledge Alarm screen at another
client.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Print
Prints details of the alarm to the default printer.
OK
Returns you to the previous screen, saves any new comments and acknowledges the alarm (if it is not already
acknowledged).
Cancel
This takes you out of the screen without performing any action.
General
Overview of this screen
The Acknowledge Multiple Alarms screen is displayed if you have highlighted more than one alarm, then
selected Open. You can highlight more then one alarm if Enable Multiple Alarm Selection is selected in the
"Maintenance/User & Preferences/Client Preferences" screen.
You can use the screen to:
Acknowledge alarms. Any of the alarms selected that are new (default RED) are acknowledged
when you click OK.
Clear a previously-acknowledged (default GREEN) alarm. Depending on settings, an alarm that is
acknowledged but has not yet been reset (default BLUE) can clear automatically - see "Clear"
below.
370
Symmetry Software Reference Manual
Add comments to record the actions you take (for example, "Guard sent to investigate"). Comments
can be shown in history reports, which may need to be produced at a later stage.
Note: It is mandatory to select or enter a comment before selecting OK or Clear if Alarm Comments
Mandatory is selected in the "Maintenance/User & Preferences/Client Preferences" screen.
General
Overview of this screen
This screen displays on a by-day basis, all alarms and events stored in the log.
By default, the screen displays alarms and events generated by a device or person associated with any
company in your company group. However, if Filter by Company in the "Maintenance/User &
Preferences/Client Preferences" screen is selected, only those alarms and events that belong to the currently-
selected company are displayed. In both cases, information that is not specific to a particular company is also
displayed.
By default, the screen shows the most recent record at the top of the screen. Items are displayed in reverse
order if the ActivityAndSystemReverseOrder ini file setting is set to "1".
You may see the following icon in the left-hand column:
371
Activity History Screen ("Home/Monitoring/Activity")
This indicates that the alarm has a tagged video clip created using a Record Video command. You can replay
the clip by clicking the Replay button.
Right-click menu
You can use the right-click Data option to choose the columns to display, and the Configure option to change
the column order.
What do the messages mean?
Adding comments to an alarm\event
Double-clicking an alarm\event message displays the Add Comment screen, which allows you to record
comments against the transaction.
372
Symmetry Software Reference Manual
Filters
Selecting the button displays the Activity Filters screen, which you can use to define activity filters for the
Alarms, Activity and Virtual Matrix screens.
You can apply one of the filters to the Activity History screen using the Filter menu near the top-right corner of
the screen.
Cancel
This button is displayed when the system is searching the database. Select Cancel if you wish to cancel the
search.
Close
373
Adding and Editing Card Details
Note: You can also access a person's details from the "Home/Monitoring/Alarms", "Home/Video & Audio/Virtual
Matrix" or "Home/Monitoring/Activity" screen by selecting an alarm/event caused by that person and selecting
the Card option.
Clicking on a column header in the Selection screen sorts the entries by the heading selected. Clicking again
sorts in the opposite direction.
Note: The Card Holders By Company option in the "Maintenance/User & Preferences/System Preferences"
screen determines whether you can view only those card holders who belong to the currently-selected
company. For further information, refer to "Card Holders by Company".
Note: If a person's details are being edited by another user, you will be given view-only access only.
Note: The "Home/Identity/Bulk Card Amendments" screen can be used to make changes to several cards in
one operation.
Note: In a Symmetry Global Edition system, card holders can be created at the head office. Any card holder
created at the head office who is given access rights to a region is automatically created at the region. Most
fields and options for card holders created at the head office are grayed out at the regions. Please see the
Global Edition Installation and User Guide for further information.
Note: Card details may not be downloaded to nodes on dial-up or LAN chains depending on the Delay Cards
to Dial-Up/LAN Chains setting in the "Maintenance/User & Preferences/System Preferences" screen.
374
Symmetry Software Reference Manual
If you want to overwrite an existing person's card details, open the existing record from the
Selection screen, present the card to the encoder and press the Smart Card icon next to the
card number.
Save the captured details.
Details Captured
The system reads all appropriate data from the card, including the card number and customer/facility code.
The system attempts to read the card's encoded card number. If this is not present or cannot be read, the
system reads the card serial number.
If the card contains more than one set of card details, the system reads only the first record.
Importing Card Details from a Text File or Database Table
If the [BioEnrolment] section is included in multimax.ini (as documented in the Symmetry Software Installation
Manual), card details can be imported from a text file. The process is as follows:
1. Create a new card holder or visitor, or open an existing record.
2. Make sure that the text file contains the card details to import.
3. With the card holder or visitor record still open, save the text file. The card details from the file are
automatically imported. Symmetry deletes the file.
4. If necessary, make additional changes to the card details or settings.
5. Save the card details.
The required format of the file and other information is provided in the Symmetry Software Installation Manual.
Card details can also be imported from a CardTransfer table in the Symmetry database. For further information
about this method, please refer to your product support representative.
Note: The methods described above are not the same as standard Symmetry card imports as described in the
Data Connect Manual.
Alarm/Event Messages
Note: the installer is able to alter the alarm/event text displayed. Not all of the messages are selectable/viewable in
all screens.
Messages A-D
Messages E-M
Messages N-Z
375
Alarm/Event Messages A-D
376
Symmetry Software Reference Manual
377
Alarm/Event Messages N-Z
378
Symmetry Software Reference Manual
379
Alarm/Event Messages N-Z
Server Online
Server Restarted
SNTP Clock Adjusted
Start of forced closing (online)
Start of office mode
Start of office mode (online)
Start of privacy
Startup Transaction
Station Busy
Station Cleared
Station Fault
Station Free
Storage Media Check Failed
Storage Media Check OK with Errors
Storage Media Corrupted
Storage Media Hardware Failure
Storage Media Hardware Lifetime Warning
Storage Media Not Present
Storage Media Quota Reached
Successful Clock At Point
System Alarm
Task: <name>
Time modified (daylight saving time)
Too Many Login Failures
Transaction Log Running at Capacity
Trigger Operation
Unknown Card
Unknown Fingerprint
User Access Denied
User Access Granted
User Added
User Alarm
User Alarm Activated
User Alarm Deactivated
User Code Lockout
User Deleted
User Edited
User PIN Changed
Valid Card Transaction
VCA
Video Connected
Video Disconnected
Video Loss Detected
Video Lost
Video Picture Loss
Video Picture Restored
Video Purged Early, Check NVR Config
Video Reconnected
Video Server Restarted, Unexpected Error
Video Signal Loss
Video Signal Restored
Visitor Card Holder Deactivated
Warning Overwriting Standard Recordings
Warning Overwriting Tagged Recordings
Warning: Simulated Transactions Active
Wrong Hand Template
380
Symmetry Software Reference Manual
Note: A Clear button is displayed in the "Home/Monitoring/Alarms" screen if you have System Admin privileges
(as specified in the "Maintenance/User & Preferences/Roles" screen) or have permission to clear all alarms (as
specified in the "Maintenance/User & Preferences/Accounts" screen). This button is not affected by the settings
in this screen; the button can still be used to clear all alarms, even if some have an alarm type categorized as
"Acknowledge Only".
Default Appearance
If Show Combined Alarm/Acknowledgement Screen is not selected, the Alarms screen shows an alarms list
and, optionally, a graphical area that contains alarm statistics:
381
Appearance of the Alarms Screen ("Home/Monitoring/Alarms")
382
Symmetry Software Reference Manual
Alarms are easier to acknowledge. Selecting an alarm and clicking the Acknowledge button
acknowledges the alarm.
Alarm instructions are easier to view. Selecting an alarm immediately displays the instructions for
that alarm.
Comments are easier to enter and review. You can enter new comments for an alarm by selecting
the alarm and entering the new comments in the Comments box. All previously-entered
comments are displayed in the Previous Comments box.
For task alarms, the lower area of the screen presents similar information to that available from the
"Home/Monitoring/Tasks" screen:
General
This screen allows you to assign access rights, and view the current access rights already assigned. The screen is
displayed when you choose to assign access rights from the "Home/Identity/Card Holders",
"Home/Identity/Visitors", "Home/Identity/Bulk Card Amendments" or "Setup/Identity/Badge Designer" screen.
Access rights can be used, for example, to specify the readers and times that card holders are allowed to gain
access. Access rights can include any number of the following access right types:
Access Codes
Reader Groups
Readers
Floor Groups
Intrusion Areas
Intrusion Users
Global Access Codes
Disconnected Doors
Disconnected Door Groups
Note: You can set up access rights for an output group by right-clicking on the controlling reader. The reader must
be attached to a Card Relays node. The output group contains the auxiliary outputs to enable when the card holder
is granted access from the reader. Click here for further information.
383
Assign Access Rights Screen
Note: Access codes that are currently inactive are shown grayed out. An access code can be made inactive by
using Force Access Code Inactive or the Schedule tab in the "Operation/Times/Access Codes" screen.
Select
Use this menu to select the type of access right to add.
Filter by and Matching
You can use Filter by and the Matching field to reduce the number of items listed. For example, if you select
Location from Filter by, and enter "North" in the Matching field, only items whose location includes "North" are
listed.
After entering text in the Matching field, press Enter or click to action the filter.
Leaving the Matching field empty means "match all". So, if you select Location from the Filter by menu and
leave Matching empty, this will cause all items to be listed that have a location specified.
The following Filter by options are provided (depending on the option selected from the Select menu):
Description - The name of the items, as listed in the top-left box. For example, if you have selected
Reader Groups from the Select menu, Description refers to the name of the reader groups.
Location - The location of the device, as specified by the Location field in the device (e.g. reader)
definition. For an item such as a reader group that can not have a location defined, the top-left box
will list all (e.g. reader groups) that include an item (e.g. reader) whose location includes the
Matching text.
Category - The category of the device, as specified by the Category field in the device (e.g. reader)
definition. For an item such as a reader group that can not have a category defined, the top-left
box will list all (e.g. reader groups) that include an item (e.g. reader) whose category includes the
Matching text.
Readers - The name of a reader. If, for example, you select Reader Groups from the Select menu,
the top-left box will list all reader groups that include a reader whose name includes the Matching
text.
Floors - The name of a floor. If, for example, you select Floor Groups from the Select menu, the
top-left box will list all floor groups that include a floor whose name includes the Matching text.
Reader Groups/Floor Groups/Intrusion Areas - These are available (in addition to the above) if
you select Access Codes from the Select menu. If, for example, you select Floor Groups, the
top-left box will list all access codes that include a floor group whose name includes the Matching
text.
384
Symmetry Software Reference Manual
Hide Assigned...
Select this checkbox if you want to exclude from the top-left box (Available items) all items that have already
been assigned to the access rights, as displayed in the top-right box.
Group by
This menu allows you to group the assigned access rights listed in the top-right box:
None - The access rights are listed separately in order of their name that appeared in the top-left
box (Available item). The type of each access right is given.
Time Code/Intrusion User - The access rights are grouped by their time code or intrusion user.
Type - The access rights are grouped by their type.
Note: The list may not include all items of the selected type, depending on your permissions and the
permissions assigned to the items (using the Permissions button) when they were defined.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed. A message at a bottom of the list indicates when there are
unlisted items available that match the specified Filter by filter.
385
Assign Access Rights Screen
User Number
Each user defined in an intrusion panel requires a user number, which uniquely identifies that user.
The default user number displayed is the next free user number across all panels selected. If no
users have been defined in the selected intrusion panels, the default is 2.
When you add the access right, Symmetry checks whether the user number already exists. Each
selected panel is checked in turn to determine whether the user number already exists, and if it
does, you are prompted whether to overwrite the existing user details in that panel.
Use Cardholder PIN Code
Selecting this option:
Copies the card holder's PIN to the User Code/Pass Code field.
Causes the user code (pass code) to be automatically updated at the selected
panel(s) whenever the card holder PIN is changed in the Card Details tab.
You can edit the User Code/Pass Code field with this option set. If you do this, you will be prompted
whether or not to change the card holder's PIN when you add the access right.
Note: if the user has rights to more than one panel, the user code (pass code) must be the same
across all panels that have Use Cardholder PIN Code set. Symmetry checks this condition when
you add the access right. The reason for this condition is to enable the user code (pass code) to be
automatically updated across all panels if the card holder's PIN is changed in the Card Details tab.
If you change the PIN in the Card Details tab, but the new PIN is not usable as a user code (pass
code) at a panel, you are prompted whether to remove the link between the card holder PIN and
user code (pass code). If you choose to remove the link, Use Cardholder PIN Code is automatically
deselected for that panel.
If Card Holder Show PIN Code is not selected in your user permissions ("Maintenance/User &
Preferences/Roles" screen), the PIN is not displayed (for security reasons).
If you perform an upload and the user code (pass code) of an intrusion user has changed, Symmetry
checks whether that user has Use Cardholder PIN Code set. If this is the case, the option is
automatically deselected, since the user code (pass code) and card holder PIN are no longer the
same.
Use Cardholder IDS Code
Selecting this option:
Copies the card holder's IDS Code to the User Code/Pass Code field.
386
Symmetry Software Reference Manual
Causes the user code (pass code) to be automatically updated at the selected
panel(s) whenever the card holder IDS Code is changed in the Card Details tab.
You can edit the User Code/Pass Code field with this option set. If you do this, you will be prompted
whether or not to change the card holder's IDS Code when you add the access right.
Note: if the user has rights to more than one panel, the user code (pass code) must be the same
across all panels that have Use Cardholder IDS Code set. Symmetry checks this condition when
you add the access right. The reason for this condition is to enable the user code (pass code) to be
automatically updated across all panels if the card holder's IDS Code is changed in the Card Details
tab.
If you change the IDS Code in the Card Details tab, but the new IDS Code is not usable as a user
code (pass code) at a panel, you are prompted whether to remove the link between the card holder
IDS Code and user code (pass code). If you choose to remove the link, Use Cardholder IDS Code
is automatically deselected for that panel.
If Card Holder Show PIN Code is not selected in your user permissions ("Maintenance/User &
Preferences/Roles" screen), the IDS Code is not displayed (for security reasons).
If you perform an upload and the user code (pass code) of an intrusion user has changed, Symmetry
checks whether that user has Use Cardholder IDS Code set. If this is the case, the option is
automatically deselected, since the user code (pass code) and card holder PIN are no longer the
same.
User/Pass Code
Each intrusion user requires a user code (pass code for Bosch panels), which is the code that the
user enters to access the intrusion options at the selected panel(s).
No two users can have the same user code (pass code) at the same panel - Symmetry checks this
condition when you add the access right. It is possible for a user to have different codes at different
panels if Use Cardholder PIN Code is not selected.
For DMP panels, the user code must be between 3 and 6 characters long. It must not start with a 0,
and if it is a 3-character code, it must not start with 98.
For ThorGuard panels, the user code is 6 characters long.
For Bosch B9512G panels, the pass code must not be within a value of 2 of any other pass code.
This is a requirement for Bosch duress, even if duress is not used. Symmetry checks this condition
when you add the access right.
User Name
Each intrusion user requires a user name.
The default name is the last name and first initial of the card holder.
Profile
Each user in the intrusion system requires a user profile number, which determines the options that
are made available at the panels. You can assign only one of the uploaded profile IDs.
This field is not available for Bosch B9512G panels.
Default Area Authority
This field is available only for Bosch B9512G intrusion panels.
Each user in the intrusion system requires an area authority level (1-14), which determines the
options that are made available at the panels. The authority level will apply to all areas for the user.
Note: When you upload users from the panel to Symmetry (using the
"Install/Intrusion/Intrusion/System Configuration" screen), any user configured at the panel with an
Authority Level of zero will not be uploaded.
387
Assign Card Relay Output Group Screen
General
This screen enables you to associate an output group with the selected reader. The selected reader is attached to a
Card Relays node.
Note: You may not be able to select certain reader groups, depending on the permissions assigned when they
were defined (using the Permissions button).
Screen Options
Available Card Relay Output Groups
Add >>
Adds the selected output group to the access rights.
<< Remove
Removes the selected output group to the access rights.
Assigned
This area lists the output group currently selected.
388
Symmetry Software Reference Manual
General
This screen lists all devices of the selected type that have been detected on the network, but which have not yet
been configured in the Symmetry software. That is, the IP address of each device listed does not correspond to a
device in the Symmetry database.
Select the device you want to configure, then click OK.
Depending on the device type, you may be prompted whether to use the existing configuration settings stored in the
device, or the default settings for a new device.
The details displayed include the Media Access Control (MAC) address of the device. This is defined at time of
manufacture and cannot be changed. The MAC address is printed on a label attached to the device.
Introduction
This screen enables you to set up a rule for hiding or showing the selected object on displayed or printed badges.
The object is hidden or shown, depending on the value of one or more personal data titles in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen. For example, the rule can specify that a logo
should be displayed if the value of a personal data title matches specified text.
Any object in the Badge Designer that has a rule, is marked with a red dot in its bottom-right corner.
General
Overview of this screen
This screen enables you to preview a badge before printing it on the badge printer.
389
Blocked Cards Caused by PIN-Entry Errors
If the printer has an in-built encoder, you can also encode the card number, customer code and issue number
onto the badge.
If you are using a Card Handler Client, the customer code is obtained from the ENX\SMX file.
Note: The card details are stored in the database when you select the Badge button in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.
Screen Options
Setup
Click this button to set up the printer options. Click here for details.
Print
Select this button if you want to print (and optionally encode) the card.
You may not have access to this button, depending on your user permissions, as set up in the
"Maintenance/User & Preferences/Roles" screen.
Badge Design
This displays the badge design selected in the Card Details tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. The design determines the appearance of the badge, and is set up using the
"Setup/Identity/Badge Designer" screen.
Encoder Format
If the badge printer allows you to encode a magstripe card, select the encoding format using this pull-down
menu. The formats are defined in the "Install/System/Default Settings/Reader/Card Formats" screen.
Track
This is relevant only for magstripe cards. If the badge printer allows you to encode the card, select the track
number to use (cards may have more than one magnetic track).
The installer can set up the default track in an ini file.
bpi
This is relevant only for magstripe cards. If the badge printer allows you to encode the card, select the bpi (bits
per inch) setting. Micromax always uses 75bpi.
Smartcard Format
DES Fire Encoding
User PIN Active
Select Sector to use
Site number
User PIN
390
Symmetry Software Reference Manual
Extent of Blocking
The extent of the blocking depends on the setting of Delete PIN Errors Globally in the "Maintenance/User &
Preferences/System Preferences" screen:
If Delete PIN Errors Globally is selected, the card is blocked at any reader. A card made inactive
can be re-activated by changing its status to "Active" in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
If Delete PIN Errors Globally is not selected, the card is blocked at the reader where the PIN was
entered incorrectly, and at all other readers connected to that reader's node. The card will continue
to be able to be used at readers connected to other nodes, and the status of the card will be
"Active". A blocked card can be un-blocked at the affected node by downloading the card using the
"Maintenance/Download/Cards" screen.
391
Card Layout Screen
Note: It is assumed that you switch between the front and rear views by flipping the badge over along its
horizontal axis (hold the badge's right-hand edge and flip to the left).
EXAMPLE 1: Badge with a magstripe on the rear side (side 2) along the top.
Badge design as displayed on the screen:
EXAMPLE 2: Badge with a magstripe on the rear side (side 2) along the bottom.
Badge design as displayed on the screen:
Note: For a smart card, the front is assumed to be the non-chip side.
392
Symmetry Software Reference Manual
Grid - Select Show Grid to display the grid points on the screen. Choose Snap To Grid if you want the ends or
corners of the objects you draw or move to snap to the grid points. In the Grid Spacing box, enter the distance
between grid points.
OK - Applies the changes you have made.
Cancel - Exits without applying any changes.
Card Number
The card number is the card's unique number for the selected customer/facility code. The card number is often
printed on the front of the card.
There can be several different codes on a card used for access control:
The card number.
The card's issue number, if defined in the Card Details tab. Not all card technologies enable an issue
number to be included on the card.
The customer code, which identifies the company that the card belongs to. Not all card technologies
enable the additional security of a customer code to be included on the card.
If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System Preferences"
screen, the unique combination of card number, customer code and card issue level cannot be the same as for any
other card that was previously encoded.
393
Commands
Click the button to begin enrollment of the person's mobile device. The device must be Bluetooth-enabled and must
have the Symmetry Blue mobile app installed. Once enrolled, the device ID allocated by the app is shown in the
Card Number field.
If the device is not available, you can enter the device ID directly into the Card Number field.
Once the mobile device is enrolled, you can click Encode to encode the card holder's details to the mobile device.
Commands
Note:
The commands available depend on the screen you are using.
The Send Commands permission in your user role ("Maintenance/User & Preferences/Roles"
screen) determines the types of commands you can send from the "Home/Monitoring/Command
Center" screen.
The "Maintenance/User & Preferences/Command Roles" screen specifies the commands you can
use as manual commands through the "Home/Monitoring/Graphics" and
"Home/Monitoring/Command Centre" screens.
Clients
Return to Schedule
Switch Matrix View
394
Symmetry Software Reference Manual
Intrusion Systems
The following commands are available for M2150 intrusion systems and intrusion systems supported by the Full
Intrusion Management interface:
Outputs
Output Off [Bosch B9512G, Siemens (Vanderbilt), DSC, DMP and ThorGuard systems only]
Switches off the output.
Arms all areas.
Output On [Bosch B9512G, Siemens (Vanderbilt), DSC, DMP and ThorGuard systems only]
Switches on the output.
Arms all areas.
Return to Schedule [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Arms all areas.
Panels
Arm Area [Bosch B9512G systems only]
Arms all areas.
Disarm Area [Bosch B9512G systems only]
Disarms all areas.
Lock Out Node [M2150 systems only]
Causes the M2150 intrusion node to go into lock-out mode.
Set Clock [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Sets the date and time at the panel to be the same as at the PC.
Set Service Mode [CU30 and ThorGuard only]
Enables an installer to log into the panel from a keypad.
Unset Service Mode [CU30 and ThorGuard only]
Unsets service mode.
Silence Alarm [Siemens (Vanderbilt), ThorGuard and CU30 systems only]
Silences alarm sounds.
395
Commands
396
Symmetry Software Reference Manual
397
Commands
displayed in the Graphics screen only if Enable Comments on Graphic is selected in the
"Maintenance/User & Preferences/System Preferences" screen. The Mandatory Intrusion Comments
option in the "Maintenance/User & Preferences/System Preferences" screen determines whether the
information is mandatory.
Enable
This cancels the effect of Disable. For all but Siemens (Vanderbilt) panels, it also cancels the effect of
Bypass.
Silence Alarm [DMP systems only]
Silences an alarm caused by the zone.
Return to Schedule [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Un-bypass [Siemens (Vanderbilt) only]
This cancels the effect Bypass.
Zone Groups
Arm Zone Group [ThorGuard and CU30 systems only]
Arms the zone group.
Disarm Zone Group [ThorGuard and CU30 systems only]
Disarms the zone group.
If you are sending the command from the "Home/Monitoring/Command Center" or
"Home/Monitoring/Graphics" screen, you can use a displayed Action Taken prompt to specify the reason
why you are sending the command. This prompt is always displayed in the Command Center, but is
displayed in the Graphics screen only if Enable Comments on Graphic is selected in the
"Maintenance/User & Preferences/System Preferences" screen. The Mandatory Intrusion Comments
option in the "Maintenance/User & Preferences/System Preferences" screen determines whether the
information is mandatory.
Return to Schedule [DSC, DMP, HISEC and ThorGuard systems only]
Passback/Anti-Passback
Set All Cards to Neutral
Set All Cards to a Specific APB Zone
Patrol Tours
Patrol Hold
Patrol Reset
Patrol Start
Predefined Commands
Activate
398
Symmetry Software Reference Manual
Card Only
Card+PIN
Customer Code Only
Customer Code Only-No Store
Disable Fingerprint Mode
Disable (Reader)
Disable Push Button
Enable (Reader)
Enable Push Button
Grant Access
Keycard In
Keycard Mode Off
Keycard Mode On
Keycard Out
Lock Door
Manual Door Control Enabled
Office Mode Off
Office Mode On
Random Search On/Off
Re-enable Stopped Cards
Remove IDS Block
Return to Schedule
Single Fingerprint Mode
S600 Alarm LED Flash/Off/On/Pulse
S600 Reader Buzzer Off/On/Pulse
S600 Switch LED Flash/Off/On/Pulse
Toggle Mode Activate\Deactivate
Two Fingerprints Mode
Unlock Door
User Code + PIN
User Code Disable
User Code Only
IDS Code + PIN
IDS Code Disable
IDS Code Only
Serial Devices
Message name
Return to Schedule
Server
Run Command Line
Change Threat Level
399
Create Bookmark Screen
ThorGuard
Activate Input
Activates the ThorGuard virtual input that has the specified address.
Deactivate Input
Deactivates the ThorGuard virtual input that has the specified address.
General
Overview of this screen
This screen enables you to bookmark a recording, so that it can be easily found and replayed in the
"Home/Video & Audio/Video Playback" screen.
Note: You are prompted to confirm the bookmark if the settings will cause it to extend beyond the beginning
and/or end of the clip you are viewing.
General
Overview of this screen
This screen enables you to maintain the import database, which is used as a data interface between the source
database and Symmetry's live databases.
Screen Options
Import Database Password
This is optional. If you enter a password, when the data is being imported from the import database to
Symmetry's live databases, the system checks that the encrypted password in each record is the same as this.
If the match is not successful, the record is not imported into the live databases.
The purpose of entering a password is to prevent unauthorized records in the database from being imported.
This password is saved when you select OK; there is no need to re-enter the password each time you enter the
screen.
400
Symmetry Software Reference Manual
Date Range
General
This screen enables you to define the date range during which advanced access rights apply. It is displayed when
you assign the first of a set of rights to an advanced access rights section (such as Advanced 1). Subsequent
assignments in the same section use the existing date range defined.
You can also access this screen to change the date range by selecting the relevant advanced rights title in the
Access Rights card tree view then selecting the Dates button.
Screen Options
From/To
Specify the date range over which the advanced access rights apply. You can enter the date range, or choose
the date using the Calendar button.
General
About the Default Badge Access Rights Screen
The Default Badge Access Rights screen enables you to associate a set of normal access rights with the badge
design. When a person is assigned the badge design in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen, the access rights defined for the badge design are automatically assigned to
the person's normal access rights.
The access rights are displayed in a graphical tree view. You can expand the branches of the tree to view their
contents in the normal way.
Access rights determine the doors or elevator floors that the person has access to, and the times that access is
allowed. The access rights can contain any number of the following access right types:
Access Codes
Global Access Codes
Reader Groups
Readers
Floor Groups
Disconnected Door Access Rights (Doors and Door Groups)
Note: You can set up access rights for an output group by right-clicking on the controlling reader. Click here for
further information.
401
Default Permissions Screen
Screen Options
Page View/Normal View
Expand
Collapse
Assign
Remove
Threat
Reset
OK
Cancel
Definition Screens
Introduction
About Definition screens
Many options display two screens - the Selection screen (for example, the Card Holder Selection screen) and
the Definition screen (for example, the Card Holder Definition screen). The Definition screen is the screen that
is displayed when you choose to edit an existing item listed in the Selection screen, or create a new one.
This topic describes options that are common to many of the Definition screens.
402
Symmetry Software Reference Manual
Common Options
>
Use this button to add to the list.
1. Select the items to add (from the left-hand side of the screen).
2. Click >. Double-clicking or using drag an drop may have the same effect.
<
Use this button to remove items from the list.
1. Select the items to remove in the box on the right-hand side of the screen.
2. Click <.Double-clicking or using drag an drop may have the same effect.
Copy
If you have selected an existing entry from the Selection screen, you can use this button to copy the details to
create a new entry. After selecting Copy, enter the new details, then select OK/Save.
Delete
If you have selected an existing entry from the Selection screen, you can use this button to delete the entry.
You are not normally able to delete an item if it is being used in another item (for example, you cannot delete a
reader if it is used in a reader group).
Notes
The Notes button opens a Notes screen, which allows you to record or read any notes relating to the screen
you are currently using.
Notes icon
The icon has a different use from the Notes button. Selecting the icon enables you to write a note for the
individual record you are editing. For example, if you are using the Card Holders Definition screen, you can
select the icon to write a note about the individual card holder you are editing. If you select the Notes button
in the same screen, you can write a note that is displayed no matter which card holder you are editing.
The icon changes to if a note already exists.
Permissions
You can use the Permissions button to select the user roles (as defined in the "Maintenance/User &
Preferences/Roles" screen) that will have access to use the item you are defining. The Permissions button is
available if Enable Permissions is selected in your user permissions ("Maintenance/User &
Preferences/Accounts" screen).
A user who have System Admin privileges (as specified in the "Maintenance/User & Preferences/Roles" screen
) is not subject to these permissions.
Click here for further information about setting permissions.
Apply
Saves the changes without exiting the screen.
OK/Save
This takes you out of the screen and saves changes.
Cancel/Close
This takes you out of the screen without saving any changes.
403
Directory Settings Screen ("Maintenance/User & Preferences/Roles")
General
Introduction
This screen is available only if a license for the "Directory/LDAP Authentication Module" is installed. The screen
is displayed by clicking the Directory button in the "Maintenance/User & Preferences/Roles" screen.
The screen allows you to:
Link a directory group to the Symmetry role.
Specify default settings for any new Symmetry account that is created with this role.
The settings in this screen are used when Symmetry creates a new Symmetry user account for a directory
user, which occurs when a directory user who is new to Symmetry starts or logs in to Symmetry (depending on
the configuration in the Directory Link screen).
For further details of how Symmetry user accounts are created, please refer to "About the Directory/LDAP
Authentication Module".
Screen Options
Filter
You can use this box to filter the directory groups listed in the screen. You can use wildcards in the fields.
Group selection box
This box lists the directory groups on the directory server (in excess of 1000) that match the Filter settings.
Select a directory group. This links the group to the Symmetry role.
A directory group can be linked to only one role. When you save the details, Symmetry checks that the directory
group is not already linked to another role.
Directory Logon
If you have permissions to browse the Active Directory, the screen should automatically display a list of
directory groups. If you do not have permissions, you can enter the username and password of a directory user
that does.
The username must be in the format <domain>\<username>. For example, technology\alanc. Alternatively,
enter a User Principal Name (UPN), such [email protected].
Options
The Options area defines the default settings for any new Symmetry user account created by the
Directory/LDAP Authentication Module for the selected role.
For details of these options, please refer to the help for the "Maintenance/User & Preferences/Accounts"
screen.
OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
404
Symmetry Software Reference Manual
Introduction
You can set up scheduled commands to disable or enable Door Alarm Reset, Door Forced and Door Held Open
alarms. You need to select Door or Door Group in the Device menu of the "Operating/Commands/Scheduled"
screen to set up these commands.
You may want to disable door alarms at times of the day where such alarms do not need to be reported.
The following Disable commands are available:
Disable All Door Alarms - suppresses Door Alarm Reset, Door Forced and Door Held Open
messages.
Disable Door Alarm Resets - suppresses Door Alarm Reset messages
Disable Door Forced Alarms - suppresses Door Forced messages.
Disable Door Held Alarms - suppresses Door Held Open messages.
If a Disable command is executed at the Symmetry server, and the condition (e.g. Door Forced) is set up to be
reported as an alarm, it is reported as an event instead. If a Disable command is executed at a node, the condition
is not reported as either an alarm or event. The Options tab of the "Operating/Commands/Scheduled" screen shows
where the command will be executed.
A corresponding Enable command is available for each Disable command. Note that if a door is open when an
Enable command is actioned, no Door Forced or Door Held Open message is issued to indicate that the door is still
open.
Node Configuration
Door and Door Group are in the Device menu of the "Operating/Commands/Scheduled" screen only if there are
nodes that have Node Supports Disabling of Door Alarms set in the "Install/Access Control/Nodes" screen.
You will find that a reader is not listed in the Location menu if the node that controls the reader does not have
Node Supports Disabling of Door Alarms set.
When set up for a single reader, the command can be executed at the node, and the node definition
("Install/Access Control/Node" screen) must specify that the node supports the feature.
405
Email Tab ("Operation/Alarms/Definitions" and "Operation/Alarms/Reporting")
commands that are inactive, have a validity period that does not include the current date, or
are inactive due to the current threat level.
Introduction
Purpose of the Tab
Use this tab if you want details of the alarm to be sent by email.
The Email tab in the "Operation/Alarms/Definitions" screen displays any default entries set up in the
"Operation/Alarms/Reporting" screen.
Note: Email details for node and system alarms must be defined in the "Operation/Alarms/Reporting" screen,
since they cannot be defined in the "Operation/Alarms/Definitions" screen.
Note: To enable email alarms, you must set up alarm routing to the E-Mail Alarms client in the
"Operation/Alarms/Routing" screen. The "Operation/Alarms/Routing" screen prevents/allows email alarms from
being generated based on time of day and day of week.
Options
Email Profile
Choose an email profile set up in the "Setup/Configuration/Email Profiles" screen. This specifies the recipient's
email address and the settings necessary to connect to the email server.
Encode Screen
General
Overview of this screen
This screen is accessed by clicking Encode in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen and enables you to encode the card details to a smart card, or to a mobile device (installed with the
406
Symmetry Software Reference Manual
Symmetry Blue app, or the mobile app for use with the Suprema BioLite N2 integration) that is being used as a
pseudo-card. Note that a mobile app for use with the Suprema BioLite N2 integration is not widely released.
The information encoded can include the card number and customer code, and any biometric data captured.
The computer port used by the encoder is defined in the "Install/System/Client Ports" screen.
When you have selected or entered the required information in the screen, select OK to begin the encoding
process. Any existing encoded information on the card or mobile device is overwritten. Progress messages are
displayed in the screen.
The customer codes you are allowed to encode are determined by the supplied "enx" and "smx" files.
Screen Options
Encoder Type
Select Sector to use
DES Fire Encoding
User PIN Active
Format
Site number
User PIN
Encode PIN
Encode Fingerprint
Encoding Onto
Instruction Messages
Screen Buttons
Format
Erase
Filter By
Overview
The Filter by options enable you to choose which card-based alarms/events to include in the report. You can,
for example, use Filter by to choose to include only alarm/event records belonging to a specific person, or card
holders with a specified Last Name.
Note that although an alarm/event message may pass your Filter by selection, other filter options in this screen
may prevent the alarm/event message from being included in the report.
Certain alarms/events such as "Door Forced" are not associated with a specific card. These types of
alarm/event records are not affected by the Filter by selection, except when Visitor Last Name is selected (in
this case, such alarms and events are not included in the report).
If you do not want to filter out certain cards, select Last Name and leave the field blank.
You can use wildcards in any box where you can type text. This allows a range of records that meet the
wildcard criteria to be included in the report.
Filter By Options
Card Data Title
This is available only if a company is selected, or your company group has only one company.
If you select the option, the report will include only those card-based records that have information defined for
the selected Card Data Title. If you also type information in the Card Data box, only records that have
matching personal data for the Card Data Title are included in the report. Visitors are excluded from the report.
407
Filter Selection Screen
Card Number
If you choose this option and leave Card NumberandFacility/Customer Code blank, the report will include all
records that match the other filters specified on this screen. The report will include both visitors and standard
card holders.
If you enter a card number in the box, any card-based record must match the number specified here to be
included in the report.
If you select Card Number, you can, if required, also select a facility/customer code. You can also select a
facility/customer code without having to enter a card number; in this case, only people who have the selected
facility/customer code will be included in the report.
Employee Reference
If you choose this option and enter an employee reference number in the box, only records that are related to
the specified employee reference will be included in the report. Visitors will be excluded from the report.
Last Name
If you choose this option and enter a card holder's last name in the box, only records that are related to the
specified card holder will be included in the report. Visitors will be excluded from the report.
Transaction Name
This filter is applicable only if the Disconnected Doors license is installed, as described in the Disconnected
Doors Installation and User Guide.
Select this filter to include only specified SALTO event message(s). Choose the event from the Transaction
Name menu, or type a wildcard expression in the field.
Visitor Data Title
This is available only if a company is selected, or your company group has only one company.
If you select the option, the report will include only those visitor cards that have information defined for the
selected Visitor Data Title. If you also type information in the Visitor Data box, only records that have
matching personal data for the Visitor Data Title are included in the report.
Visitor Last Name
Select this option if you want the report to include only alarms/events relating to visitor cards. If you choose this
option and enter a visitor's last name in the box, the report will include only those visitor records that match the
specified name. The report will not include non-card-based records such as "Door Forced".
408
Symmetry Software Reference Manual
General
This screen is displayed by clicking in the "Home/Identity/Verification" screen, or in the "Home/Identity/Visitors"
screen (next to the Visitor Escort option). You can use this screen to select a card holder.
409
Fingerprint Enrollment Acceptance Thresholds
Graphics Icons
The following icons appear in graphics:
Door. If Show Door Status on Graphics is selected in the "Maintenance/User & Preferences/System
Preferences", this icon is displayed on a graphic when a door is closed.
Door open. If Show Door Status on Graphics is selected in the "Maintenance/User &
Preferences/System Preferences", this icon is displayed on a graphic when a door is open.
Reader
Monitor Point. If Monitor Point Status on Graphics is selected in the "Maintenance/User &
Preferences/System Preferences" screen, this icon is displayed on a graphic when a monitor point is not
in alarm.
Monitor Point. If Monitor Point Status on Graphics is selected in the "Maintenance/User &
Preferences/System Preferences" screen, this icon is displayed on a graphic when a monitor point is in
alarm.
Auxiliary Output, such as an auxiliary output from an access-control controller, or an output from an
intrusion panel.
Camera
Camera Group
Reader Group
410
Symmetry Software Reference Manual
Intrusion Zone. For all intrusion systems, the icon border (green, red or blue) indicates whether the
zone is in the alarm state. Other status information (disabled, bypassed, force armed, fault and tamper)
is displayed only for intrusion systems supported by Full Intrusion Management.
Note: The following shows the default border colors; the colors can be changed in the
"Install/Intrusion/Intrusion/Status Color Configuration" screen. Please refer to the
"Install/Intrusion/Intrusion/Status Color Configuration" screen for details of all possible border colors and
their meaning. The border may also be set up to flash, depending on the state.
Enabled (click here for details). The small indicator is blue when the zone is enabled (not
bypassed or disabled).
Disabled (click here for details). The small indicator is green and the icon is grayed out.
Bypassed. The small indicator is green and the icon is grayed out, with a large cross.
Zone has unacknowledged alarm (solid, default red border). Double-clicking the icon
enables you to acknowledge and clear the alarm.
Zone has an acknowledged alarm, but the detector is still activated (solid blue
border).
Zone has acknowledged alarm that is not cleared (solid green border when the icon is
not selected).
Dashed border - This indicates that the zone has Fault or Tamper condition. Click here
for details. The color depends on the acknowledged/cleared status (as above).
Corners highlighted - This indicates that the zone has a Tamper condition. Click here for
details. The color depends on the acknowledged/cleared status (as above).
Intrusion Area or Zone Group. Double-clicking the icon displays an associated graphic, if configured in
the "Install/Intrusion/Intrusion/Device Configuration" or "Setup/Device Groups/Intrusion Areas" screen, as
appropriate. By default, the border of the icon is red when there is an unacknowledged alarm in the
"Home/Monitoring/Alarms" screen (click theAcknowledgebutton in the "Home/Monitoring/Graphics"
screen to acknowledge the alarm.
The color of the background indicates its status (available only for M2150 intrusion systems and intrusion
systems supported by Full Intrusion Management).
Note: The background and border colors are configured in the "Install/Intrusion/Intrusion/Status Color
Configuration" screen. Please refer to this screen for the color meanings, as the colors used vary
between intrusion systems. The border may also be set up to flash, depending on the state.
Intrusion Panel (available only for Galaxy and intrusion systems supported by Full Intrusion
Management).
Intrusion Transaction. This icon is used to display the status of an intrusion transaction alarm, as set up
in the "Install/Intrusion/Intrusion/Device Configuration" screen.
Intercom Call Station. The following border colors have special meaning:
Pale blue (icon flashing) - Call request received from intercom.
Orange (icon flashing) - Successful connection to intercom.
Olive (icon flashing) - Waiting to connect to intercom (for example, handset needs to be
411
Introduction to Serial Messages and Devices
picked up).
Monitor Point Group
Floor Group
Serial Device.
An icon is available for any port set up for serial messages in the "Install/System/Serial Devices/Port
Settings" screen. Users can right-click the icon in the "Home/Monitoring/Graphics" screen and choose a
command to send to the device.
Predefined Commands
To send a predefined command from the "Home/Monitoring/Graphics" screen, right-click on the
predefined commands icon and choose Send Command (or double-click). If you double-click, the icon
border flashes once (in red) to confirm the command has been sent. You can add more than one of the
same predefined command to a graphic in the "Setup/Graphics/Setup" screen.
Threat Level.
Changes the threat level to that shown in the tooltip.
Elevator Floor
Introduction
Serial messages are used to provide an interface between Symmetry and any other device that accepts ASCII-
based text messages. The interface could, for example, be used to set or unset a third-party system.
Each text message can include up to 200 characters and can be sent to the external device via a manual,
scheduled or trigger command. If required, manual commands can be sent from the "Home/Monitoring/Graphics"
screen.
The external device can be connected to a Symmetry client PC, or to a serial port of a Symmetry node (controller).
Intrusion Systems
DMP XR200 and DSC PC4020 intrusion systems allow the Symmetry software to download commands containing
user-definable messages. The commands can, for example, be sent as Symmetry manual, scheduled or trigger
commands. The messages are definable in a text format and could be used to perform actions such as arming and
412
Symmetry Software Reference Manual
disarming areas or displaying messages at keypads. The commands are sent to the intrusion system via the same
serial or network link used to transfer transactions from the intrusion system to the Symmetry software.
Use the following procedure to set up the system for serial messages.
1. If the external device is to be connected to the serial port of a Symmetry client PC, set up a "Serial Device"
port definition in the "Install/System/Client Ports" screen.
2. Use the "Install/System/Serial Devices/Messages" screen to specify the text message(s) that are to be sent
to the external device.
3. Use the "Install/System/Serial Devices/Port Settings" screen to name the serial device and set up the port
that it is connected to - this may be a serial port of a Symmetry client PC (as specified in step 1), or the
serial port of an RS232/NIC module in a node.
Note: If you choose a node in the "Install/System/Serial Devices/Port Settings" screen, fallback dial-up
communications is not available if the node is equipped with only one serial port.
4. Send the serial messages to the device by issuing manual commands (for example, from the
"Home/Monitoring/Command Center" screen or from graphics), or by setting up scheduled or trigger commands
("Operation/Commands/Scheduled" or "Operation/Commands/Trigger").
Note: If the external equipment is connected to a node, scheduled or trigger commands are supported
only for multiNODE-2 SMD, M2100 and M2150 nodes.
General
Overview of this screen
You can generate an Intrusion Areas report by selecting the Report button in the "Setup/Device
Groups/Intrusion Areas" screen.
The report displays all alarms, events, changes and commands that have affected the selected area between
specified dates.
413
Intrusion Status Toolbar
Note: Clicking any button except Acknowledge Alarms opens the "Home/Monitoring/Command Center" screen,
with only the relevant objects displayed according to the button clicked.
Acknowledge Alarm - Total number of unacknowledged alarms (from any source), excluding masked and
task alarms. The background is red when there is at least one unacknowledged alarm. Clicking the button
displays the "Home/Monitoring/Alarms" screen.
Area Alarms - Total number of areas that are currently in an alarm. An area alarm is counted only if the
area is armed.
All Problems - Total number of alarm, tamper, fault, panel offline, zone group with problem and area with
problem conditions.
Areas Armed - Total number of areas that are currently armed.
Areas Security Reduced - Indicates the number of armed areas with security reduced (click here for
details).
Areas Disarmed - Total number of areas that are currently disarmed.
Zone Alarms - Total number of zones that are currently in an alarm condition.
Zone Tampers - Total number of zones in a tamper condition (click here for details).
Zone Faults - Total number of zones that are currently in a fault or tamper condition.
Zones Disabled - Total number of zones that are currently disabled (click here for details).
Zones Force Armed - Total number of zones that have been force armed by the intrusion system (click
here for details).
License Activation
This screen is displayed if the Symmetry client license has not been activated. The screen allows you to activate
the software.
To activate the software:
1. Enter the Serial Number of the license, as provided on the Software License Certificate. A Registration
Key is displayed when you have entered a valid serial number.
2. Obtain an activation code in one of the following ways:
414
Symmetry Software Reference Manual
Automatically over the internet by selecting Activate your license via the Internet. Note: A
license can be activated online up to three times before needing to be reset by Customer
Support.
By clicking the link. You will be prompted to log in and register your details. The login
username and password are provided on the Software License Certificate. You will need the
Serial Number and Registration Key displayed near the top of the dialog.
By phone using one of the numbers displayed.
When you have the activation code, write it down in the space provided on the Software License
Certificate.
3. Click OK.
Lock-Out Mode
Lock-out mode is available if M2150 intrusion nodes are being used.
Lock-out mode locks selected configuration data at a specified node, and prevents the node from accepting any
changes to that data in the Symmetry software, although the changes remain in the database. For example, you
can use lock-out mode to prevent a node from accepting any new card holders, or changes to existing card holders.
You may want to prevent configuration changes for security reasons.
You can choose the types of configuration changes to lock using the Lock Out button in the "Install/Access
Control/Node" screen.
The node generates a "Command Rejected - Node Locked Out" alarm/event message if a change to locked data is
attempted.
415
Lucent and Avaya Data Import Screen ("Operation/Data/Data Import")
General
Overview of Lucent\Avaya Import
This Data Import option enables data held in a Lucent\Avaya database to be imported into Symmetry's
database. The remote database on the Lucent\Avaya server holds the details of all card holders and
modifications to the details of existing card holders.
The import process makes a dial-up connection to the remote Lucent\Avaya database, then downloads the
required information to a Microsoft SQL Server import database. The import database is the standard
"gateway" for data import into Symmetry. Symmetry then imports the data from the import database and
creates or modifies the card holder records as appropriate.
You do not need to start dial-up networking yourself; the Data Import process does it for you automatically. You
may find it useful to display the Dial-Up Networking Monitor (from the Control Panel) while communications are
taking place.
Note: The import process can overwrite existing card-holder records in Symmetry. This occurs if the card
number of a card being imported already exists for the selected company in Symmetry.
Field Mapping
The following table shows how fields in the Lucent\Avaya database map to fields in Symmetry:
416
Symmetry Software Reference Manual
MODIFYDATE Date that the data record was Personal Data Field 7
last modified.
CREATEDATE Date that the data record was Personal Data Field 8
created.
STATUS Current employee status. A = Personal Data Field 9
Active. I = Inactive (see Note
2).
TRANSACTIONTYPE Transaction type (see Note 3). Personal Data Field
10
Note 1: If an Immediate All Cards import is started and the ACCESSSTATUS is "D" (Denied), the selected
reader group and time code are NOT given to the card holder.
Note 2: This automatically sets/unsets the Active/Inactive status in the "Home/Identity/Card Holders" screen.
Note 3: The transaction type codes that can be displayed in Personal Data Field 10 are:
INSERT - New personnel record inserted.
MODADD - Location code modified.
MODIFY - Some change was made to the personnel record, other than a location code.
Screen Options
DBase
Company
Facility/Customer Code
Reader Group
Time Code
Select Region for Employees
Include Executives
Include Contractors By Location Code
Immediate All Changes
Timed All Changes
Immediate All Cards
Start/End Date
OK
Cancel
Masking Alarms
Introduction
The "Home/Monitoring/Alarms" and "Acknowledge Alarms" screens contain a Mask button, which allows you to
mask a selected alarm for a specified length of time. Masking an alarm removes it from the All Alarms tab and
from any filter tabs, and moves it to the Masked Alarms tab. Masked alarms are also not displayed in the
"Home/Video & Audio/Virtual Matrix" screen.
Masking an alarm can be useful if, for example, you want to remove from view an alarm that cannot be cleared.
This can occur if a device is faulty and cannot be reset to its normal state.
Masking an alarm does not affect its status, as indicated by the red/green/blue color.
Masked alarms can be opened, acknowledged and cleared in the same way as unmasked alarms. Masked
alarms are included in activity reports, but are not included in the total number of unacknowledged alarms.
Alarm forwarding, as set up in the "Operation/Alarms/Routing" screen is disabled for masked alarms.
Masked alarms are not displayed in graphics.
The person who masked an alarm can be determined from the comments information in the alarm details.
417
Muster Reset
Privileges required
The Masked Alarms tab is displayed only if you have the Show Masked Alarms privilege in the
"Maintenance/User & Preferences/Roles" screen.
The Allow Alarm Masking privilege is required to mask an alarm.
How to mask an alarm or clear the mask
You can mask an alarm by selecting an alarm in the All Alarms tab or in a filter tab and clicking Mask.
Alternatively, click Mask after opening an alarm that has not already been masked.
A Clear Mask button is available in the Masked Alarms tab or after opening a masked alarm. This button clears
the mask and returns the alarm to the All Alarms tab.
About the Mask Alarm dialog
Selecting Mask displays a dialog that allows you to specify:
The duration of the mask. The alarm returns to the All Alarms tab when the specified period expires.
The Username and Password of a second user. These are enabled if Alarm masking requires
second user is selected in the "Maintenance/User & Preferences/System Preferences" screen. If
switched on, this feature requires both the logged-in user and another user to authorize an alarm
mask.
Note: Both the logged-in user and second user require the Allow Alarm Masking privilege set in the
"Maintenance/User & Preferences/Roles" screen.
Muster Reset
This dialog is displayed if you have clicked Reset in the "Home/Identity/Muster" screen, there are still people in the
area, and the Allow selected Cards from Muster Area during Muster Reset checkbox is selected in the muster
definition. The dialog lists everyone who is still in the area, and their card number.
The dialog allows you to select people to remove from the muster. If you reset the muster and re-run it immediately,
any person you have chosen to remove will not be included in the new muster report (unless they have re-entered
the area using a card transaction).
You can use the checkbox in the header to select or deselect everyone listed.
Clicking OK resets the muster.
Clicking Cancel exits the dialog without resetting the muster.
Notes Screen
General
This screen allows you to record or read any notes relating to the screen you are using or the item you are editing.
Note: All options in the Edit menu are available when using the Notes screen.
Screen Options
Files Tab
This tab shows the names of any files attached to the note. The tab also contains:
Add File - Allows you to add a new file to the list.
Delete File - Allows you to delete a selected file.
Open File - Opens the selected file.
418
Symmetry Software Reference Manual
Delete File and Open File are grayed out if Allow user to open file attached to notes is deselected in your
user permissions (as set in "Maintenance/User & Preferences/Roles").
Delete
This button deletes the displayed note.
Print
This button prints the displayed note.
Open Screen
Use this screen to open the required file.
Note: This is a standard Windows dialog box. If you need further help, click on the question-mark at the top-
right corner of the dialog, then on the area of interest in the dialog.
Look in - Use this pull-down list and the box in the center of the dialog to navigate to the file you want to open. For
example, if the file is located in C:\Program Data\Security Management System\, you can select the C: from the
Look in pull-down list, then double-click on "Program Files", followed by "Security Management System" to
navigate to the correct folder.
The buttons to the right of theLook inpull-down list enable you to move up one position in the folder hierarchy,
create a new folder and view information in the dialog box as a list or with full details.
File name - You can use this field to type the name of the file you want to open.
List files of type - Select the type of file you want to open.
Open - This opens the selected file.
Cancel - This takes you out of the screen without performing any action.
Open as read-only - Not relevant.
Note: You might not have access to the Access Rights tab, depending on your user permissions, as set up in
the "Maintenance/User & Preferences/Roles" screen.
419
Overview of the Access Rights Tab
Note: If you select a badge design, any access rights assigned to the badge design in the
"Setup/Identity/Badge Designer" screen are automatically shown in the Normal Rights branch of the tree
view. Any changes you make in the Access Rights tab override the access rights defined for the badge
design.
Advanced Rights
Note: When you first select the Access Rights tab, the top level of the advanced rights branch is
displayed only if advanced rights are assigned to the card owner. If no advanced rights are set, select the
Show All button to set up the advanced rights.
Advanced access rights allow you to change the normal access rights over a specified period of dates. For
example, to allow access to a different area of the building during a temporary assignment.
There can be up to 16 advanced access rights. When you add an advanced access right, you specify the
date period over which it is to run. The date ranges may overlap, in which case the access rights are
additive for the duration of the overlap period.
The effect of advanced access rights is dependent on the setting of the Advanced Access Rights
Additive option in the "Maintenance/User & Preferences/System Preferences" screen. If the option is set,
any defined advanced rights add to the normal access rights. If the option is not set, any defined advanced
rights completely override the normal access rights during the date period.
The default titles for advanced rights are Advanced 1 to Advanced 16. You can change these titles using
the "Setup/Configuration/Advanced Access Titles" screen.
Advanced access rights are not normally used to define access rights for holidays, since holiday access
rights are normally defined as part of the time codes ("Operation/Times/Time Codes").
Normal/Advanced Access Right Types
The Normal Rights branch and each of the 16 Advanced Rights branches of the tree view are divided into the
following access right types:
Access Codes
Global Access Codes
Reader Groups
Readers
Floor Groups
Areas
You can expand these to see any access definitions present.
Enabling or Disabling Normal/Advanced Access Rights
You can individually enable or disable the entire Normal Rights section or any of the 16 advanced rights
sections. To do this:
1. In the tree view, select Normal Rights or an advanced access rights section.
2. Select Enable/Disable in the right-click menu.
Whenever you disable an access rights section, its door icon is displayed in red with a black cross, and the
associated contents are shown grayed.
Copying Access Rights to Another Branch of the Tree View
You can copy existing access rights from one branch of the tree view to another compatible branch. For
example, you can copy all the existing normal access rights to an advanced access rights section (you may
want to do this if it's easier to copy and then modify existing access rights, rather than creating the access rights
from scratch).
To copy access rights:
1. In the tree view, select the assigned rights branch to be copied.
420
Symmetry Software Reference Manual
421
Overview of the Access Rights Tab
Please refer to the Intrusion Management Installation and User Guide for an overview of intrusion management
and step-by-step instructions on how to configure and use the software.
General Features
Assigning Access Rights
You can assign access rights as follows:
1. In the tree view, select the branch required.
Note: Selecting Normal Rights has the same effect as selecting Access Codes in the Normal section.
2. Select the Assign button or select the equivalent option from the right-click menu.
3. Specify the required access rights in the screen displayed.
Removing Access Rights
You can remove an individual access right or any group of rights as follows:
1. Select the individual access right, or the whole rights branch, to be removed. For example: to remove all
reader group access rights, select Reader Groups.
2. Select the Remove button or select the Remove option in the right-click menu.
Color Coding of Icons (e.g. Doors)
Door Icons
The door icons in the tree view are color coded to enable you to see easily which access rights are currently
valid. The meanings are as follows:
Green door - Access rights assigned and currently active.
Red door - Access rights assigned but currently inactive.
Grey door - No access rights assigned.
Yellow door (displayed only in "Home/Identity/Bulk Card Amendments" screen) - There are existing
access rights for one or more of the selected cards.
For example, if the card owner has normal rights and Advanced 1 rights defined, and the current date is during
the Advanced 1 period, the Assigned Access Rights door is green, the Normal Rights door is red, the
Advanced Rights door is green and the Advanced 1 door is green.
422
Symmetry Software Reference Manual
Access code icons (but not the names) are grayed out if they are inactive on the current day. Using the
"Operation/Times/Access Codes screen, an access code can be forced inactive or made inactive on specific
days according to a schedule.
Prerequisites to using the Access Rights Tab
Before defining access rights, make sure that the items necessary to define the required access rights have
been set up. For example:
Reader Groups ("Setup/Device Groups/Readers")
Readers ("Install/Access Control/Reader")
Floor Groups ("Setup/Device Groups//Floors")
Access Codes ("Operation/Times/Access Codes")
Time Codes ("Operation/Times/Time Codes")
Overview of Antipassback
Introduction
A user with access to the install options can switch individual readers into antipassback mode. The purpose of
antipassback is to prevent people from passing back a card to a second person to gain entry or exit.
In order for antipassback to be totally effective, it should be used in conjunction with turnstiles. The turnstiles
should be controlled by entry and exit readers to enable the system to know whether each card is in or out of an
antipassback-protected area.
An Antipassback-Protected Area
There are two forms of antipassback: zonal and timed. Timed is easier to set up, but is not quite as secure as
zonal. Timed antipassback is normally used to control antipassback around the periphery of a single area,
whereas zonal antipassback can have nested antipassback areas.
Note: Executive cards (as set in the "Home/Identity/Card Holders" screen) can be excluded from timed and
zonal antipassback rules. Elevator nodes do not support antipassback rules at all.
423
Overview of Antipassback
sending a Set All Cards to Neutral command (such as used in the "Home/Monitoring/Command Center" screen)
has the same effect for all cards. Sending a command may be useful if, for example, people have passed
through an exit during a fire drill and the delay is long.
Zonal Antipassback
In the case of zonal antipassback, the building needs to be partitioned into zones. For example, zone 1 may be
the main lobby, zone 2 the computer room, etc.
Note: Except for an EN-LDBU, the change of zone occurs when the door is opened. For an EN-LDBU, the
change occurs following a successful access-control transaction, even if the door is not opened (due to
limitations in door monitoring).
If a card's currently-recorded zone and the actual zone get out of step, either because of some violation of the
system (for example, a person has previously climbed over a turnstile) or for a legitimate reason (for example, a
person has passed through a fire exit during a fire drill), some means is obviously required to bring the two back
into step. This can be accomplished by using:
The Reset Passback option from the Locator tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
By means of a Set All Cards to Neutral command (for example, in the "Home/Monitoring/Command
Center" screen).
Both methods put the card(s) into a "neutral zone", so that the next transaction at an antipassback reader is
always accepted without violation, and the reader's to zone becomes the card's new zone.
Note: Zone 0 is the Symmetry default "neutral" zone. A card can enter or exit the neutral zone without violation.
If zonal antipassback is required, you will need to make sure that readers connect to the appropriate nodes,
nodes are in the appropriate chains and that the chains connect to the appropriate clients. If you do not plan
this carefully, you may not be able to achieve the desired antipassback scheme. Each Symmetry client can
manage up to 16 LAN chains containing zonal antipassback readers.
A factor to consider is that if readers in the same antipassback scheme connect to different database units, it is
important for the Symmetry client that manages communication to the chain to remain switched on, as well as
the server. Symmetry clients manage antipassback messaging within a chain, and the Symmetry server
manages antipassback messaging across chains. A preferable design is to ensure that all readers in the same
scheme are connected to the same database unit, if possible.
424
Symmetry Software Reference Manual
425
Overview of Biometric Hand Templates and HGUs
contact is transactions
opened. generated when
the door contact
opens.
Introduction
A biometric hand template number represents a hand print captured by a Hand Geometry Unit (HGU) connected to
a serial port of your client PC. The HGU must connect to the client port as defined in the "Install/System/Client
Ports" screen. When you select the Capture (Biometric Hand Template) button in the Biometrics tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen, the HGU reads the hand print currently presented
to it and uploads this as a template number to the client. The template number is stored with the card details.
The template number is downloaded with the standard card details and access rights to a multiNODE-2000 or
multiNODE-2100 HGU node.
To perform a transaction at an HGU reader, the person must first supply his/her card number, then present the
hand. The card number can be entered at the HGU's keypad or supplied automatically from a separate
20mA/Wiegand companion reader (a standard 20mA/Wiegand reader cannot be used). During the transaction, the
HGU reader compares the HGU template stored in the HGU node with the actual hand print, then returns a score
back to the node. If the score is less than or equal to a specified threshold, the hand print is accepted as valid.
In this case, the HGU reader and optional companion reader connect directly to the node.
426
Symmetry Software Reference Manual
A CCTV switcher unit is a device that the installer can connect to the COM port of a client PC. A switcher unit is
able to accept commands that can switch the picture from any CCTV camera to any monitor or switch on and off
ancillary devices, such as camera lamps, washer pumps and wipers.
Note: When using a Dedicated Micros PC-based switcher, the term "monitor" refers to a cameo segment of the
display. The display is split into 16 cameo segments.
427
Overview of Dial-Out/In Alarms Reporting
Use the Acknowledge Alarms screen to switch a CCTV camera to a monitor, as set up in the
"Operation/Alarms/Commands" screen. The camera/monitor can vary, depending on the device
that is in alarm.
Introduction
Dial-out/dial-in alarms reporting enables alarms detected by Symmetry to be copied to another totally independent
Symmetry system. All alarms routed to a nominated dial-out client (as set up by the installer) are automatically
copied to the alarms-receiving (dial-in) site. The alarms continue to be displayed at the dial-out site in the normal
way. No event messages are transmitted.
You may want to use dial-out alarms reporting if, for example, a client PC is unmanned outside of normal office
hours and you want alarms generated at these times to be copied to a central manned system located elsewhere.
It is important to realize that dial-out alarms reporting is not the same as alarms routing, which enables alarms to be
routed to different clients within the same networked system.
The alarm messages copied to the alarms-receiving (dial-in) site are the same as those displayed at the local (dial-
out) site. However, the alarm instructions (as displayed when acknowledging an alarm) can be different. The
"Operation/Alarms/Definitions" screen enables instructions to be set up for both locally-displayed alarms and alarms
displayed at the alarms-receiving site.
When a user of Symmetry views a copied alarm at the alarms-receiving site, it is not possible for the user to:
Use the Graphic option in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix"
screen.
The Command button in the Acknowledge Alarm screen. The user can clear the alarm in the
Acknowledge Alarm screen, but this has no effect on the status of the alarm at the dial-out site.
Alarms do not have to be reset at the dial-out site before they can be cleared in the Alarms screen at the dial-in site.
Use "Operation/Alarms/Routing" to ensure that alarms are routed to the dial-out client at the
appropriate times.
At the alarms-receiving (dial-in) site, you need to:
Use "Install/System/Client Ports" to specify the client that is to be used to receive alarms. This client
also requires a modem.
Use "Install/Access Control/Chains/Dial-In Alarm" to set up the alarms-receiving site (such as the
password required for the dial-out site to log in, etc.).
428
Symmetry Software Reference Manual
Capturing Fingerprints
Before a person can gain entry through doors controlled by fingerprint readers or use the reader for secure logons,
his/her fingerprint(s) must be captured using a fingerprint enrollment reader. When a fingerprint is required for
access-control, it is captured using the Biometrics tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. When a fingerprint is required for secure logons (not available for Suprema
readers), it is captured using the Capture button in the "Maintenance/User & Preferences/Accounts" screen.
Suprema enrollment readers are network-attached. S81x and Bioscrypt enrollment readers connect to a serial port
of your client PC. The enrollment reader is defined in the "Install/System/Client Ports" screen.
If you are capturing fingerprints for access control and you are using Suprema or S81x fingerprint readers, up to two
fingerprints can be enrolled per person.
For S81x enrollment readers, the fingerprint data is stored with in the Symmetry database. For Suprema readers,
Store Fingerprints in Symmetry in the "Maintenance/User & Preferences/System Preferences" screen determines
whether or not fingerprint data is stored in Symmetry.
429
Overview of Floor Groups
with the card record stored in the node. If both sets of data match, the node determines whether or not to grant
access, based on the person's stored access rights.
S81x Acceptance Threshold
Click here for details.
S81x Reader Modes
S81x fingerprint readers can be placed in single-fingerprint mode, two-fingerprint mode (where two fingerprints
are required to gain access) or no-fingerprint mode (in which case, the reader acts as a normal contactless
smart card reader).
The fingerprint mode is set up in the "Install/Access Control/Reader" screen, and can be changed from manual,
scheduled or trigger commands.
S81x fingerprint readers can also be set up in the "Install/Access Control/Reader" screen to accept "duress"
access-control transactions. Click here for details.
430
Symmetry Software Reference Manual
2. In the access rights (for example, via "Home/Identity/Card Holders"), select the floor group and a time code.
Note: The Permissions button may have been used when defining a floor group to prevent you from
accessing it.
Introduction
A Commend Controls system can be used with an Ernitec CCTV switcher, which can have separate master and
slave units. If such a system is being used, the master and each slave can each be connected to a different
Symmetry client PC. Although it is possible simply to connect only the master to a client PC (with communications
to slaves all going through the master), connecting each slave directly to a separate PC enables different people to
use the "Home/Monitoring/Controls" screen to independently monitor different areas of a site. The following diagram
illustrates the system architecture for a simple system that contains just one slave unit.
In this example, PC1 could be used to monitor "Control (Access) Point 1", and PC2 could be used to monitor
"Control (Access) Point 2".
Notice that both PCs connect to the "Monitor 1" and serial inputs at each switcher unit.
Remember that the Monitor 1 input to a PC provides the picture in the "Home/Monitoring/Controls" screen. This
picture is from the CCTV camera at the control point currently being monitored in the "Home/Monitoring/Controls"
screen.
431
Overview of Multi-User Commend Control Systems
Control Centers
A control center is a collection of one or more control groups. You can set up control centers in the
"Operation/Controls/Control Centers" screen.
When you open the "Home/Monitoring/Controls" screen, you select the control center to monitor. This then
determines the control groups that are being monitored, and hence the control (access) points.
To implement the system shown in the diagram above, where PC1 is to monitor "Control (Access) Point 1", and
PC2 is to monitor "Control (Access) Point 2", you would need to set up:
A control center consisting of one control group, which contains "Control (Access) Point 1". You
would choose this control center in the "Home/Monitoring/Controls" screen at PC1.
Another control center consisting of one control group, which contains "Control (Access) Point 2".
You would choose this control center in the "Home/Monitoring/Controls" screen at PC2.
Camera Definitions
To implement the control system shown in the previous diagram, you would need to set up the following camera
definitions ("Install/Video & Audio/CCTV/Camera"):
"Control (Access) Point 1" camera - specify the master switcher unit and a camera number in the
range 0001-0032.
"Control (Access) Point 2" camera - specify the slave switcher unit and a camera number in the
range 0001-0032.
"Control (Access) Point 3" camera (for centralized monitoring) - specify the master switcher unit and
a camera number in the range 1001-8032, which allows the image from the CCTV camera
connected to the slave to be viewed on the PC connected to the master. For example:
1001: For camera 1 on slave unit 1.
1008: For camera 8 on slave unit 1.
2001: For camera 1 on slave unit 2.
3002: For camera 2 on slave unit 3.
When using the "Home/Monitoring/Controls" screen at a PC connected to a slave, it is not possible to view images
from CCTV cameras connected to a different slave or to the master unit.
432
Symmetry Software Reference Manual
Output Groups
Overview of Output Groups
An output group is a group of one or more auxiliary outputs connected to a Card Relays node. Output groups
are used when defining access rights to specify the auxiliary outputs to enable when the card owner is granted
access from the card-relay reader (as nominated by the installer). For example, assume that the output group is
as follows:
Associated Reader = Main Exit
Outputs in this Group = Lamp 1, Lamp 2.
Anyone who has this output group in his/her access rights will cause Lamp 1 and Lamp 2 to operate when
granted access at the Main Exit (as well as causing the door release to operate in the normal way). The
auxiliary outputs are deactivated when the door is relocked.
Each of these auxiliary outputs can still be controlled by commands, but you should realize that the auxiliary
output could be deactivated when the door relocks following a card transaction.
Setting Up Access Rights Involving Output Groups
1. Create an output group using the "Setup/Device Groups/Floors" screen:
a) Select the reader that is to activate the auxiliary outputs. (See "The Controlling Reader" below.)
b) Select all the auxiliary outputs that the reader is to activate.
2. In the access rights (for example, "Home/Identity/Card Holders"), add the reader that is to activate the
auxiliary outputs. Choose an appropriate time code with the reader.
3. Right-click on the reader in the access rights, selectAssign Relay Output Group, and choose the
output group.
Note:If there is a need for cards from more than one company to activate the same auxiliary outputs on a Card
Relays node, you will need to switch offCard Holders by Company in the "Maintenance/User &
Preferences/System Preferences" screen, set the currently-selected company to the company that owns the
card-relay reader and auxiliary outputs, then include the reader and output group in the access rights of the
relevant people.
Note: If you are using the Installer help, information is included about how to set up the system for card-relay
nodes. Refer to "Card-relay nodes" in the index.
Note:ThePermissions button may have been used when defining an output group to prevent you from
accessing it.
Card-Relay Nodes
Purpose of Card-Relay Nodes
A card-relay node has all of the features of a standard multiNODE-2 or multiNODE-2000, but in addition, some
or all of its auxiliary outputs can also be activated automatically when a card is granted access from a specified
reader (as nominated by the installer). The auxiliary outputs are deactivated when the door is relocked.
This functionality does not affect any of the node's other standard operations; all readers (including the reader
that is used to activate the auxiliary outputs) are available for normal access-control transactions, monitor
points behave normally, the auxiliary outputs can be controlled by commands, and so on.
(When activating an auxiliary output with a command, you should realize that the auxiliary output can be
deactivated when the door relocks following a card transaction.)
433
Overview of Setting Up a Commend Control System
Note: It is normal, but not mandatory, to assign all of the auxiliary outputs to the same company as the
reader.
Note: The Controls license also gives access to all CCTV features.
434
Symmetry Software Reference Manual
The control systems of some types of traffic light, barrier (or alternative device) and output point include sensors to
indicate the current status of the device (such as whether the red or green light is lit for a traffic light). These status
signals can be monitored by one of the following "status inputs":
A monitor point input on a Symmetry node.
A control input on an I/O controller of the Commend Intercom System.
Each input is actually a pair of contacts that are shorted or open-circuited by the sensor to indicate the status of the
device.
The number and type of output relays and status inputs required is different for barriers, traffic lights and output
points, as described in the following sections.
Note: Each control point can use inputs and relay outputs from only one type of source: from the switcher unit,
from access-control nodes or from the Commend Intercom System.
Equipment Used
The following diagram illustrates the equipment that can be used.
Client PC
This is a client at which the guard can use the "Home/Monitoring/Controls" screen. The client connects to the
Commend system via an RS232 link. A video link connects directly from the Commend system to the client.
If the Commend system uses one or more Ernitec slave units, it is possible to connect the master unit and each
slave unit to a different PC. This enables the "Home/Monitoring/Controls" screen to be used at multiple PCs,
each to control a different area of the site.
Click here for further information about using a multiple-PC/user system.
435
Overview of Setting Up a Commend Control System
Intercom
Each access point can have an intercom defined. This enables the guard to use a "master" intercom to
communicate with the person at the access point.
Commend Intercom System
The Commend Intercom System controls intercom usage and can be used to provide relay outputs and status
inputs. The Commend Intercom System connects to one of the client's COM ports.
Access-Control Node
This can be used to provide relay outputs and status inputs.
CCTV Cameras
If required, each access point can have a CCTV camera to provide the guard with a view of the access point.
The CCTV cameras connect to the CCTV switcher unit.
CCTV Switcher
The CCTV switcher routes the image from each CCTV camera to the monitors. The switcher connects to one of
the client's COM ports.
Currently, an Ernitec CCTV switcher must be used for the Controls license.
CCTV Monitors
These display the images from the CCTV cameras. Three monitor outputs from the CCTV switcher can be
used. The first output (monitor number 1) is always routed to the client's video input card, which causes the
image to be displayed on the "Home/Monitoring/Controls" screen. The other two outputs (monitors 2 and 3) can
be routed to external monitors.
You must use only CCTV monitors 1, 2 and 3.
The default monitor used by the CCTV camera at each control point is specified in the
"Operation/Controls/Control Groups" screen. This also affects the default positions of the control-point panels in
the "Home/Monitoring/Controls" screen.
Traffic Lights
If required, each access point can have a traffic light to control traffic flow. Two output relays are used to control
each traffic light.
If required, two status inputs can be used to feed back to the "Home/Monitoring/Controls" screen whether the
green or red light is lit, which then determines the color of the traffic-light icon in the "Home/Monitoring/Controls"
screen.
Setting up a traffic-light control
Barriers (or Other Devices)
If required, each access point can have a barrier that is open/closed. Up to three output relays are used per
device to open, close or stop the barrier.
If required, up to three status inputs can be used to feed back to the "Home/Monitoring/Controls" screen the
current status of the device, such as whether the barrier is open, closed or in motion.
Remember that although the above diagram shows the barrier using inputs and outputs from the Commend
system, inputs and outputs from an access-control node could also be used.
Setting up barrier controls
Readers
An access point can be set up to grant access at a specified access-control reader.
Output Points
An output point enables the guard to switch a device such as a light on or off from the
"Home/Monitoring/Controls" screen. A single output relay is used to switch the device on or off.
436
Symmetry Software Reference Manual
If required, two status inputs can be used to feed back to the "Home/Monitoring/Controls" screen whether the
device is switched on or off.
Setting up output points
Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls and
Intercom System.
2. Set up the cameras, monitors and intercoms ("Install/Video & Audio/CCTV"). The guard's (master) intercom
must have the client PC specified in the "Install/Video & Audio/CCTV/Control Intercom" screen.
3. Decide the hardware that is to provide the inputs and relay outputs to operate and monitor the
barriers, traffic lights and output points. Set up these relay outputs and inputs using the appropriate
screens from the following list:
"Install/Access Control/Monitor Point"
"Install/Access Control/Auxiliary Output"
"Install/Video & Audio/CCTV/Ancillary"
"Install/Video & Audio/CCTV/Control Output"
"Install/Video & Audio/CCTV/Control Input"
4. Set up the control points ("Operation/Controls/Control Points").
5. Set up the control groups ("Operation/Controls/Control Groups").
6. For a multi-user Commend system, set up the control centers ("Operation/Controls/Control Centers"). This
screen is available only if you have the Control Centers license installed.
Note: If a fuzzy picture is obtained, start dxconfig.exe (located in the Symmetry software installation folder),
select the Source button and change the Output Size.
Note: You may have no access to some visitors, tabs or options, depending on your permissions. Permissions
to tabs and options are set up in the "Maintenance/User & Preferences/Roles" screen. Permissions to access a
specific visitor are set up using the Permissions button when defining the visitor.
437
Overview of Visitor Management
This can be easily achieved by selecting Allow Visitor Management Login for this Cardholder in the
Personal tab of the "Home/Identity/Card Holders" screen. Selecting the option allows the card holder to log on
to the Symmetry software and enter the details of his/her own visitors. The default state of this option is
determined by Visitor Management Login is Default in the "Maintenance/User & Preferences/System
Preferences" screen.
By default, the card holder will have access to the "Home/Identity/Visitors" screen (Visitor Details and Personal
tabs only) and "Reports/Identity Reports/Visitors" screen. However, you can change the screens the user has
access to by modifying the Visitor Management user role in the "Maintenance/User & Preferences/Roles"
screen. Details of visitors for other people are hidden.
Note: A user account is added to the "Maintenance/User & Preferences/Accounts" screen. The screen includes
an Include Visitor Management Users option to display these accounts.
After a visitor management login, the user can only add or modify the details of his/her own visitors in the
"Home/Identity/Visitors" screen. The Visiting field is grayed out and displays the name of the card holder
currently logged in.
Specifying Visitor Escorts
There are two methods of specifying an escort for a visitor:
1. You can open the visitor's card details in the "Home/Identity/Visitors" screen and select the name of any
card holder who has been specified as an escort.
2. You can open the details of a "standard" card holder in the Card Holders screen, select the Visitor Escort
option, then use the Visitors tab to select the visitors that the card holder is to escort.
If Visitor Escort is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences"
screen, selection of a visitor escort is mandatory (except when the card has an "Inactive" status).
If the Auto Unassign Expired Visitor Cards setting is selected in the "Maintenance/User &
Preferences/System Preferences" screen, the escort is automatically removed from the visitor's card details
when the visitor card expires.
Setting up Visitor Personal Data
The process of specifying personal data for a visitor is similar to the process of specifying the data for a
standard card holder - you either type the data or select it from pull-down lists in the Personal tab of the
"Home/Identity/Visitors" screen.
The personal data titles (such as "Visitor's Company Name", "Reason for Visit", "Visit Arranged By", "Hair
Color") are different from those used for standard card holders and are set up from a separate screen - the
"Setup/Identity/Personal Data/Settings/Visitor Titles" screen.
Pre-defined data items for each of these personal data titles can be defined in the "Setup/Identity/Personal
Data/Visitor Data" screen. For example, for the data title "Hair Color", you may want to define data items such
as "Black", "Brown" and "Blonde". Pre-defined data items can be selected from pull-down lists in the
"Home/Identity/Visitors" screen.
Running Visitor Reports
Visitor details can be included in several reports:
"Reports/Identity Reports/Visitors" - A dedicated report showing visitors expected today, previous visitors,
etc.
"Reports/Identity Reports/Cards" - You can list details of visitor cards.
"Reports/Identity Reports/Access" - You can list details of the access rights of visitor cards.
"Reports/History/Activity" - You can view previous alarms and events generated by visitors.
"Reports/History/Cardholders Onsite" - You can find out which visitors used an entrance reader.
"Home/Identity/Locator" - You can find out the current location of selected visitors.
"Home/Identity/Muster" - The muster report includes visitors.
438
Symmetry Software Reference Manual
PC Door Control
A reader (entry point) can be switched between automatic door control mode (PC door control off) and manual door
control mode (PC door control on) using:
The Automatic Door Control Enabled and Manual Door Control Enabled commands. These are
available as manual, scheduled and trigger commands.
The Enable Automatic Verification (PC door control off) and Enable Manual Verifications (PC
door control on) buttons in the "Home/Identity/Verification" screen. These buttons are available
only if enabled in the "Setup/Identity Verification/Entry Point" screen.
Automatic door control mode is the normal mode, where the system automatically grants or denies access
depending on access rights. In addition, if Card Alarm Notification is set in the "Setup/Identity Verification/Entry
439
Permissions Screen
Point" screen, a card alarm (such as "At Wrong Door") prompts the user of the "Home/Identity/Verification" screen
to choose whether to grant or deny access.
PC door control mode provides an additional layer of security by enabling the guard to use the
"Home/Identity/Verification" screen to choose whether to grant or deny access for each valid access-control
transaction at the reader. The Grant Access and Deny Access buttons are enabled only if the person's access
rights would allow access in automatic mode.
The green and red LEDs on the reader flash while the guard decides whether to grant or deny access. The amount
of time the system waits for a decision is determined by the PCDoor Control setting in the "Install/Access
Control/Node" screen.
A reader's default mode (PC door control mode or automatic door control mode) is determined by the PCDoor
Control option in the "Install/Access Control/Reader" screen.
Note: Customer code only mode overrides manual door control mode. Therefore, if Customer Code Only is
selected in the "Install/Access Control/Reader" screen, the reader will grant access to a card that has a valid
customer code, without confirmation from the "Home/Identity/Verification" screen.
Permissions Screen
Introduction
The Permissions screen is displayed by clicking the Permissions button when setting up items such as card
holders, readers, cameras and reader groups. The Permissions button is available if Enable Permissions is
selected in your user permissions ("Maintenance/User & Preferences/Accounts" screen).
You can use the Permissions screen to select the user roles (as defined in the "Maintenance/User &
Preferences/Roles" screen) that can use the item you are defining. For example, if you are defining a reader group
and Assigned User Roles contains only Card Admin, only users who have the Card Admin role will be able to add
the reader group to access rights.
By default for a new record, the Assigned User Roles area of the screen contains the roles selected using the
Default Permissions button in your user role ("Maintenance/User & Preferences/Roles" screen). If <Everyone> is
selected, all roles will be able to access the item.
Note: User roles set up in the "Maintenance/User & Preferences/Roles" screen specify whether users of the
role have read-only, modify, full or no access to each screen. The Permissions screen offers a lower level of
permissions, by enabling selective access to specific items (such as specific card holders).
For card holders, visitors, access codes and device groups (such as reader groups), you are able to open a record
only if the permissions include your user role. For example, you can open a specific card holder only if the card
holder permissions include your user role.
For other items, the Permissions screen can prevent the item from being used, but does not prevent the item from
being edited. For example, if a reader's permissions do not include your user role, you will not be able to assign the
reader to a card holder's access rights, but you will be able to edit the reader in the "Install/Access Control/Reader"
screen (providing your user role gives access to that screen). If someone with the required permissions has already
assigned the reader to the card holder's access rights, you are able to view and remove it from the access rights.
440
Symmetry Software Reference Manual
Data Import
When importing a new card holder or visitor using the Data Connect Module, the Default Permissions of the role
belonging to the user who starts the import are assigned to the permissions (Assigned User Roles) of that card
holder or visitor.
Pull-down lists
A pull-down list may be displayed for some of the personal data titles. These are for common information such as
"Hair Color", "Gender", etc. For these titles, you can choose predefined data from the pull-down lists.
For non-visitors, the predefined data shown in the pull-down lists can be set up and modified using the
"Setup/Identity/Personal Data/Card Holder Data" screen.
For visitors, the "Setup/Identity/Personal Data/Visitor Data" screen is used.
If the personal data title has been set up with a Field Type of Edit List, you can also type alternative text directly
into the boxes. The information you type will be automatically added to the list the next time you or anyone else in
your company uses the screen.
Masks
In some fields, the format of the information you can type may be fixed (as defined by "masks" in the
"Setup/Identity/Personal Data/Card Holder Titles" screen or "Setup/Identity/Personal Data/Visitor Titles" screen).
For example, you may need to specify a time value in a format such as 12:45, or a value consisting of 6 digits. You
are prompted to correct any invalid entries when you save.
Playback Buttons
Reduces the playback speed each time you click the button, or for some camera
types, skips back. The playback speed is shown to the right of the Playback
buttons. This option is not available for some camera types.
Plays the video clip after a pause and restores the normal playback speed.
Pauses the video clip. Buttons on the right of the screen are enabled once the video
is paused. Each click of the Pause button advances the picture by one frame.
Pressing and holding Pause may accelerate replay, depending on the playback
device.
Increases the playback speed each time you click the button, or for some camera
types, skips forward. This option is not available for some camera types.
441
Playback Buttons
Enables you to save the picture as a JPEG file. This button is available only after
pausing playback.
Enables you to bookmark a part of the video clip, so that it can be easily found and
replayed in the "Home/Video & Audio/Video Playback" screen. This button is
available only after pausing playback.
Allows you to export the video clip recorded by a Symmetry NVR as an MPEG-4 file
for replay using the Symmetry Standalone Player or any other played that supports
the MPEG-4 standard (the digital signature is ignored by other players). This button
is available only after pausing playback. Your user role ("Maintenance/User &
Preferences/Roles") must contain the Export Video With Privacy Zones privilege
if you want to be able to export a video clip that contains privacy zones. Exported
video has the privacy zones removed.
For further information, please refer to the help for the Save and Export Video
screen.
Prints the currently paused image on the default Windows printer. This button is
available only after pausing playback.
This button indicates whether any part of an recording played back so far has been
tampered with. The button is available only for recordings made by certain camera
types, such as those connected to an ENVS.
Clicking the button displays a digital signature report. Make sure that the video is
playing at normal speed (not paused) before clicking this button.
The report includes a Reset button, which resets the digital signature check in the
event that an invalid signature is detected.
Click here for more information.
A digital signature is added to video data as it is being recorded. When a clip is
replayed, the Symmetry software continually checks the digital signature to
determine whether the video replayed so far has been tampered with. If the
signature is not correct, the button appears as follows:
You should allow a video clip to play all the way through at normal speed to
determine whether any part of it has been tampered with.
This button is available only in the "Home/Video & Audio/Video Playback" screen
when more than one cell displays video, and is not available for some DVRs.
Clicking the button causes the playback time of all cells to be synchronized with the
time of the currently selected cell. For example, if the playback time in the currently
selected cell is 11:00, the playback time of all other cells is set to 11:00.
Toggles between:
Skip to Next on - Selecting this option causes playback to skip each period of
standard recording that may exist between tagged recordings. At the end of a
tagged recording, playback will skip the standard recording that follows, and
immediately resume at the start of the next tagged recording.
Skip to Next off - Selecting this option prevents playback from skipping standard
recordings that exist between tagged recordings. Instead, all recording is played
back.
Zooms out, so that the time between marks on the time line is increased.
Zooms in, so that the time between marks on the time line is reduced.
442
Symmetry Software Reference Manual
General
Overview of this screen
Random Search
Symmetry can be configured to require a guard to carry out random searches of card holders when they carry out
card transactions. If Symmetry selects a card holder for a random search, the Search Required alarm is generated
and the card holder is denied access.
Optionally, the card can be automatically blocked at the reader until the guard performs a card command
(configured as described below), which unblocks all cards that have been blocked by a random search. The "At
Wrong Door" alarm is generated if the card holder attempts another transaction using a blocked card.
Note: Elevator nodes do not support random search rules at all.
To configure the Random Search feature:
1. If card blocking is required, add BlockRandomSearch=1 to the [multimax] section of multimax.ini. Restart
the Symmetry services and the Symmetry software.
2. Open the "Install/Access Control/Reader" screen for the readers at which random searches are to take
place. In the Modes tab:
1. Select Enable Random Search. The PC Door Control option is selected automatically; leave this
option selected.
2. In the menu, set the required probability of a search at this reader (High or Low). The actual
probability as a percentage is dependent on the settings in the system preferences (see below).
3. If card blocking is required, select Card Commands in the Command Type menu.
3. Open the "Maintenance/User & Preferences/System Preferences" screen, and select the Card Settings tab.
Enter High and Low values in the Random Search Probability fields. These determine the meaning of high and
low probability and refer to a probability out of 1000. For example, if you enter 100 for High, the meaning of high
probability is approximately 100/1000 = 10 percent.
4. If card blocking is required:
443
Readers Listing Selection Screen ("Reports/Configuration/Reports"/Readers)
1. If required, set up a scheduled or trigger command to cancel blocking automatically after the search
is complete. For example, to set up a trigger command to do this, open the
"Operation/Commands/Trigger" screen, and configure the command as follows:
If: Device = Reader; Location = reader as defined above; Message = Card Command; Command
= any number.
Then: Device = Reader; Location = reader as defined above; Command = Re-enable Stopped
Cards.
Alternatively, the guard can issue a Re-enable Stopped Cards manual command from Symmetry to
cancel card blocking.
2. In the "Home/Identity/Card Holders" screen, open the guard's card and select both Executive Card
and Command Card Holder. Executive cards are not subject to random searches.
5. In the "Home/Monitoring/Command Center" screen, send the command "Random Search On" to the
relevant readers.
General
Overview of this screen
Use this screen to produce a report of how readers are set up, as defined in the "Install/Access Control/Reader"
screen.
The report can include an "Alarms" section. This lists the possible messages generated from the reader and its
door (for example, "Reader Tamper" and "Door Held"), and whether the message is an alarm, event or is
disabled.
444
Symmetry Software Reference Manual
Include All
The two boxes in the bottom half of the screen show the individual settings that will be included (selected) or
excluded (unselected) from the report. For example, if Node Description is selected, the report will include the
name of the reader’s node.
The right-hand box gives a list of reader alarm/event messages. Each message from a reader can be set to
Alarm, Event or Disabled in the "Install/Access Control/Reader" screen. The report will include the
Alarm/Event/Disabled status of all reader messages that are selected.
Selecting/deselecting Include All selects/deselects all items in the box.
General
Overview of this screen
This screen enables you to record the selected video picture. The recording is started when you click OK.
A user recording is created, which you can easily locate and replay in the "Home/Video & Audio /Video
Playback" screen (by selecting the Video by User Recording filter).
Note that the video picture may be being recorded already (for example, if the video is being continuously
recorded). In this case, the benefit of creating a user recording is to make this area of the recording easier to
find in the "Home/Video & Audio/Video Playback" screen.
If you select Remember options, the system remembers the settings you make in this screen. The next time
you select Record Video from a cell's right-click menu (or click the record icon in the top-left corner of a cell),
recording begins without displaying this screen.
A red icon appears in the top-left corner of the cell when recording is in progress.
Note: Video in the past will be included in the clip only if it is available. This can be achieved by recording
continuously, or by ensuring that the pre-event video buffer can provide the video.
Post-Period
Specify the amount of time to continue recording after starting the recording.
User name as description
With the option selected, the Description defaults to your Symmetry user name. Deselecting User name as
description enables you to enter a Description of your own choice.
Remember options/Don't ask again
Select this option if you want to save the settings and do not want the screen to be displayed the next time you
select Record Video (or click the button in the top-left corner of the cell). Instead, the recording will start
immediately without the Record Video screen being displayed.
445
Suprema Fingerprint Enrollment Screen
You can access the Record Video screen again my selecting Record Video Options from the right-click menu
in the Virtual Matrix.
OK
If Remember options is not selected, clicking this button starts the recording. Otherwise, the settings are
saved.
Cancel
This takes you out of the screen without saving any changes.
Enrolling fingerprints
To enroll fingerprints:
1. In the picture of the hands:
Left-click any finger tip to specify the finger is to be used to gain access. The finger tip is
highlighted in green.
Right-click any finger tip to specify the finger is to be used to signal duress. The finger tip is
highlighted in red.
The headers near the top of the window show the selected finger numbers and their selected purpose.
2. For each finger, click Enroll and present the selected fingerprint to the enrollment reader.
The fingerprints are displayed, with a percentage score to the right. Aim for a score in excess of 80% for
each finger to ensure reliable operation and good security. If you do not reach a score of 80%, click Enroll
and try again.
3. Click Verify and present the finger again to confirm that you positioned the finger normally during
enrollment.
Screen Options
Enroll
Click to enroll the fingerprint number given in the header near the top of the window.
Verify
After using Enroll (see above), click Verify to check that when you present the same finger again, the reader is
able to confirm that it is the same finger as the one enrolled. This gives confidence that the finger has been
positioned normally on the sensor during enrollment.
Verify presents a score - aim for a score in excess of 80%. If you do not reach this score, enroll the finger
again.
Clear
Click Clear if you want to clear the enrolled fingerprint.
446
Symmetry Software Reference Manual
If available, enter the activation code and click OK. You can obtain the activation code in one of two ways:
Over the internet, such as by clicking the link in the screen. You will be prompted to log in and
register your details. The login username and password are provided on the Software License
Certificate.
By phone. If you use this method, you will need the Serial Number and Registration Key, both of
which are displayed in the screen. Call one of these two numbers:
For installers in Continental America call: 1-800-889-9138 (6am to 5pm, Monday to Friday,
Pacific Standard Time).
For installers outside Continental America call: 44 1684 277257 (9am to 4pm, Monday to
Friday, Greenwich Mean Time).
When you have the activation code, write it down in the space provided on the Software License Certificate.
General
Overview of using this screen
The Fingerprint Enrollment screen is displayed by selecting Capture S813 in the Biometrics tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Use this screen to enroll fingerprints from an S81x fingerprint enrollment reader, and to encode the fingerprint
data and card number onto a NXP MIFARE or NXP MIFARE DESfire contactless smart card.
In order to use this screen, an S81x enrollment reader must be connected to the computer you are using. The
reader is set up in the "Install/System/Client Ports" screen.
To use this screen:
1. Click the finger(s) to enroll, then Enroll. Use index, middle or ring fingers (not thumbs or little fingers).
Read the instructions in the panel in the top-left corner of the screen.
You can choose to enroll one or two fingerprints, including a finger to be used to indicate a duress access-
control transaction. It is not normal to choose only duress fingers, as the system will generate a duress
alarm/event message for every access-control transaction.
If you enroll two fingerprints, either of the two fingerprints can be used to gain access at a reader that is in
single-fingerprint mode. At readers that are in two-fingerprint mode, both fingers must be used.
2. Present the finger to the enrollment reader.
Make sure the finger is placed correctly on the pad - with the first joint of the finger resting on the ridge lock
at the front of the sensor:
Apply moderate pressure. Too much pressure may cause smudging of the fingerprint. Too little pressure
may prevent the ridge patterns from being captured.
Cover as much of the sensor area as possible with the finger.
447
S813 Fingerprint Enrollment
Note: Make sure your finger touches the buff-colored ring around the edge of the sensor. Your fingerprint
image may not be recognized if you do not do this.
3. Check the displayed fingerprint. Click Accept if the displayed fingerprint core is centered and well
defined. Otherwise, click Retry and continue from step 2. Here are examples of enrolled fingerprints:
Quality: Good.
Content: Core is properly centered. Surface area and ridge
pattern are well defined.
Quality: Good.
Content: Core is not centered. The same finger should be
enrolled again.
Note: The enrolled fingerprints are not permanently saved until you choose Save in the Definition screen.
4. If prompted, present the finger for verification. The default is three verification passes, but can be changed
using the Force Fingerprint Verification setting in the "Maintenance/User & Preferences/Client Preferences"
screen. Verification makes sure that the enrolled fingerprint will be able to be matched with a live fingerprint using
the displayed acceptance threshold. Make sure that you remove and re-place the finger between each
verification. You will see a green check mark (tick) for each verification passes that is successful.
If any of the verification attempts is not successful, the acceptance threshold is automatically lowered and
you are prompted to try again. Click Retry if you want to continue with the current attempt using the new
acceptance threshold, or Verify to repeat the whole verification procedure again, using the original setting.
5. If there is another finger to enroll, click Accept and repeat from step 2.
6. ClickEncode to encode the smart card. Follow the instructions.
Click here for an overview of fingerprint readers.
Screen Options
Enroll
Verify
Encode
Clear
Acceptance Threshold
Quality and Content
Fingerprint Image-Accept/Retry
448
Symmetry Software Reference Manual
Tagged Recordings
Tagged recordings can be produced by one of the following:
Record Video trigger commands
A Record Video trigger command could, for example, be activated when a Door Forced alarm occurs. A
Replay option is available in the "Home/Monitoring/Alarms", "Home/Video & Audio/Virtual Matrix" or
"Reports/History/Activity" screen if a selected alarm has an associated tagged recording. Selecting Replay
replays the recording.
Bookmarks
Bookmarked recordings are created manually using the Bookmark button in the "Home/Video &
Audio/Video Playback" or Video Replay screen (which is accessible from the "Home/Video & Audio/Virtual
Matrix" screen). A bookmark indicates an area of interest in a recording.
User recordings
User recordings can be made using the Record Video option while watching a live camera image in the
"Home/Video & Audio/Virtual Matrix" screen.
Tagged recordings have the following features:
Each tagged recording spans a specified period of time. The start and end times of the recording are
specified when setting up the command, adding the bookmark or starting the user recording.
Tagged recordings are easy to locate and replay in the "Home/Video & Audio/Video Playback"
screen.
Tagged recordings stored in a network storage folder by a Symmetry NVR are protected from being
overwritten.
Note: Recordings triggered directly by an event configured at an NVR or DVR are always classed by the Symmetry
software as a standard recording. For example, if the web interface of a Symmetry NVR has been used to configure
a recording to start when there is a motion event at a camera, this is classed by the Symmetry software as a
standard recording, since the NVR is unable to return the recording mode used.
Standard Recordings
Recordings that are not tagged are known as standard recordings. These are not protected, and therefore may be
overwritten when disk space is required.
For cameras other than DVR cameras, a standard recording can be made using a Start Recording command (a
manual, scheduled or trigger command). DVR cameras are assumed to record continuously, and any non-tagged
areas are regarded as standard recordings.
449
The Font Screen
General
Overview of this Screen
You can use the Threat Commands screen to set up one or more commands for the selected threat level. You
may, for example, want to set up commands that change readers from card-only mode to card-and-PIN mode,
or that enable selected monitor points.
Any command you set up in this screen is actioned when the current threat level matches or passes through
the command's threat level. For example, if you set up commands for threat level 3, the commands are
actioned if the current threat level is escalated from level 1 or 2, to level 3, 4 or 5. The commands are also
actioned if the current threat level de-escalates from level 4 or 5 to level 1, 2 or 3.
Note: You may need to set up additional commands to reverse the effects of the threat level commands you set
up. For example, if you have set up "Disable Reader" commands for threat level 3, you will probably want to set
up "Enable Reader" commands for threat level 2 to bring the system back to its normal state.
To set up a command:
1. Use Select Type to choose the type of item the command applies to.
All items of the selected type are listed in the box near the center of the screen, irrespective of the
currently selected company.
2. Select the item(s) you want the command to apply to. If you want to select more than one item, press the
Control or Shift key between mouse clicks (Control selects another device; Shift selects a range).
3. Choose the command from the pull-down list.
4. Click Assign.
The commands associated with the threat level are listed in the Commands Defined box.
You can remove commands associated with the threat level by selecting them in the Commands Defined area
and clicking Remove.
450
Symmetry Software Reference Manual
For an overview of threat level management, please refer to the Threat Level Manager Installation and User
Guide.
Screen Options
Select Type
Choose the type of item the command applies to.
Command
Choose the command to send to the highlighted device(s) or group(s) of devices. Click here for a description of
each command.
Find By Description
This option determines the number of existing entries listed when you select Find. If the option is blank, all
entries are listed. If you want to narrow the search, type the name of the entry in the box. You can find a range
of entries by using wildcards.
Assign
Assigns the selected command to the threat level.
Remove
Removes the selected commands from the threat level.
Threat Level
Activate at Level - Select the threat level at which you want the access rights to become active.
Deactivate at Level - Select the threat level at which you want the access rights to deactivate.
Note: You can set threat levels on normal and advanced access rights. If an advanced access right is
automatically deactivated by a threat level, any normal access rights that have been overridden by the
advanced access rights become active.
451
Timing Diagrams for Door Operation
Timing Diagram 1
Valid Card Re-Lock Options = Door Opens. Door closed before open time expires.
Timing Diagram 2
Valid Card Re-Lock Options = Door Opens. Door closed before preheld time expires.
452
Symmetry Software Reference Manual
Timing Diagram 3
Valid Card Re-Lock Options = Door Opens. Door closed after preheld time expires.
Timing Diagram 4
453
Timing Diagrams for Door Operation
Timing Diagram 5
Valid Card Re-Lock Options = Door Closes. Door closed before open time expires.
Timing Diagram 6
Valid Card Re-Lock Options = Door Closes. Door closed before preheld time expires.
454
Symmetry Software Reference Manual
Timing Diagram 7
Valid Card Re-Lock Options = Door Closes. Door closed after preheld time expires.
Timing Diagram 8
Valid Card Re-Lock Options = Unlock Time Expires. Door not opened.
455
Timing Diagrams for Door Operation
Timing Diagram 9
Valid Card Re-Lock Options = Unlock Time Expires. Door closed before open time expires.
Timing Diagram 10
Valid Card Re-Lock Options = Unlock Time Expires. Door closed before preheld time expires.
456
Symmetry Software Reference Manual
Timing Diagram 11
Valid Card Re-Lock Options = Unlock Time Expires. Door closed after preheld time expires.
Timing Diagram 12
Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door not opened.
457
Timing Diagrams for Door Operation
Timing Diagram 13
Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door closed
before open time expires.
Timing Diagram 14
Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door closed
before preheld time expires.
458
Symmetry Software Reference Manual
Timing Diagram 15
Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door closed after
preheld time expires.
Timing Diagram 16
General
Overview of this screen
This screen enables you to save a recording in MPEG4 format.
459
Save As Screen
Optionally, you can also choose to save the Standalone Symmetry Video Player installation software to the
same location as the MPEG4 file.
Use the Browse button to specify the name of the MPEG4 file you want to create, and its location. Clicking OK
creates the recording.
Your user role ("Maintenance/User & Preferences/Roles") must contain the Export Video With Privacy Zones
privilege if you want to be able to export a video clip that contains privacy zones. Exported video has the
privacy zones removed.
Save As Screen
Use this screen to specify a filename and location in which to save the data.
Save in - Use this pull-down list and the box in the center of the dialog to navigate to the folder in which to save the
data. For example, if you want to save the file in C:\Program Data\Security Management System\, you can select
the C: from the Save in pull-down list, then double-click on "Program Files", followed by "Security Management
System" to navigate to the correct folder.
460
Symmetry Software Reference Manual
The buttons to the right of theSave inpull-down list enable you to move up one position in the folder hierarchy,
create a new folder and view information in the dialog box as a list or with full details.
File name - You can use this field to type the name of the file you want to save.
Save as type - Select the type of file you want to save. The box in the center of the dialog will display existing files
of the selected type.
Save - This saves the specified file.
Cancel - This takes you out of the screen without performing any action.
Selectable Messages
System Activity
An NVR Device Plugin Failed to Load
Card Commands
Card Holder Deactivated-Secondary Expiry
Card User PIN Changes
NVR Status
Patrol Operations
Recording Stopped, Insufficient Space
Scheduled Operations
Trigger Operations
Uncategorized
User Comments
User Initiated Door Command
Valid Card Transaction
Video Purged Early, Check NVR Config
Card Activity
Anti-Passback
At Wrong Door
At Wrong Time
Cardwatch
Deleted for PIN
Door Pre-Held Timer Expires
Door Pre-Held Timer Start
461
Selectable Messages
Duress
Expired
Floor Access
Granted Access
Granted Access (Extended Door Time)
Inactive
Keycard
Lost Card
Not Yet Valid
On Vacation
Unknown Card
Unknown Fingerprint
Visitor Card Holder Deactivated
Wrong Issue Number
Wrong PIN
Door Activity
Door Alarm Reset
Door Forced
Door Held Open
Door Monitor Circuit
Door Not Opened
Exit Button Circuit
Reader Tamper
User Code Lockout
Video Activity
Note: Ensure that Uncategorised is also selected in the System Activity section if you want the report to
include video activity.
Camera Restarted
IP Camera Offline
IP Camera Online
Motion Alarm
Motion Normal
Picture Loss
PTZ Preset Activated
PTZ Start
PTZ Stop
Video Picture Restored
Video Signal Loss
Video Signal Restored
Intrusion Activity
Area Armed
Area Disarmed
Area In Alarm
Area Reset
Panel Fault
Panel Reset
Uncategorized Intrusion
Zone Bypassed
Zone Disabled
462
Symmetry Software Reference Manual
Zone Enabled
Zone Force Armed
Zone In Alarm
Zone In Fault
Zone In Tamper
Zone Reset
Aperio Activity
Aperio Battery Flat
Aperio Battery Low
Aperio Battery OK
Aperio Bolt Position
Aperio Device Online
Aperio Device Offline
Aperio DIU Restarted
Aperio DIU Watchdog Reset
Aperio Door Position
Aperio Door Tamper
Aperio Handle Position
Aperio Radio Disturbance Cleared
Aperio Radio Disturbance Detected
Selection Screens
Introduction
About Selection screens
Many options display two screens - the Selection screen (for example, the Card Holder Selection screen) and
the Definition screen (for example, the Card Holder Definition screen). The Selection screen is the screen that
is displayed when you first select the option.
Selection screens contain a Find option, which enables you to find all existing items (for example, existing card
holders). The items found are listed on the screen, often with other related information.
If you want to be selective about the items to list, you can the filter the items displayed by using the option(s) or
field(s) in the upper area of the screen (if provided). For example, there may be a Name or Description field in
which you can enter a name. Selecting Find then displays only those items that match the filter settings.
Note:Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen may limit
the maximum number of items listed. A warning message indicates when the limit it exceeded. In the limit is
exceeded, filter the results to see the items of interest.
Screen Options
The Selection screen may contain any of the following options.
463
Setting Up a LAN Chain
464
Symmetry Software Reference Manual
465
Setting Up Output Points
466
Symmetry Software Reference Manual
"Home/Monitoring/Controls" screen. If this facility is required, select the two inputs being used for this purpose in
the two Status Input pull-down lists.
When the input for the green traffic light is on, the control point's traffic light will show green in the
"Home/Monitoring/Controls" screen. When the input for the red traffic light is on, the traffic light will show red in the
"Home/Monitoring/Controls" screen. Note that if the inputs are defined, but the inputs are not connected, the traffic
light will be grayed out in the "Home/Monitoring/Controls" screen.
If you select None in the Status Input pull-down lists, the color of the traffic light button in the
"Home/Monitoring/Controls" screen toggles between red and green for each press of the button.
Connecting status inputs
General
Use this screen to specify the location and maximum size of a storage folder.
You can select any folder on the network using the Browse button. If you specify a local path (such as
C:\My_Folder), the system will assume the storage folder is on the storage server.
Free space indicates the amount of available disk space on the whole of the drive that the folder is located.
Available space is the amount of disk space available within the amount specified by Use max.
Click Save to save changes, or Cancel to return without saving.
Standard user accounts should not be given access to the storage folders.
Note: To ensure availability of space, it is recommended that you select a folder on a partition dedicated to
storing Symmetry video recordings. If possible, you should not, for example, choose a folder on the partition
used by the Windows paging file (normally c:). When this is not possible, Use Max must not be more than 80%
of the total capacity of the partition.
Toggle Mode
When activated, toggle mode allows card holders to toggle a door between being in a permanently-locked or
permanently-unlocked state. When toggle mode is deactivated, the reader uses normal access control.
There are two types of toggle mode:
Standard toggle mode. This is for readers whose node does not have Advanced Toggle Mode
Available selected in the "Install/Access Control/Node" screen. Toggle mode can be activated for
467
Understanding the Effect of the Activate and Deactivate Fields
each reader in the "Install/Access Control/Reader" screen. When activated, each valid access-
control transaction, exit-request transaction, or Grant Access command causes the door to toggle
between being permanently locked and permanently unlocked.
Advanced toggle mode. This is for readers whose node has Advanced Toggle Mode Available
selected in the "Install/Access Control/Node" screen. Advanced toggle mode is supported by the
following nodes (with appropriate firmware - please contact your support representative for
details): M2150 2/4/8DBC, M2150 DBU+2/4/8DC, EN2DBC and SR (not elevator nodes).
Advanced toggle mode includes the same behavior as standard toggle mode, but also provides additional
functionality:
a) You activate or deactivate toggle mode in the same way as for standard toggle mode by selecting
Activate or Deactivate for Toggle mode in the "Install/Access Control/Reader" screen.
b) You activate or deactivate toggle mode using the Toggle Mode Activate and Toggle Mode Deactivate
commands. These are available as manual, scheduled and trigger commands.
c) If Toggle Mode Behaviour is set to Double Card Present in the "Install/Access Control/Reader"
screen, a card holder who has Allow Double Present Toggle Mode Activation set in the
"Home/Identity/Card Holders" screen can activate or deactivate toggle mode by presenting their card twice
at a reader. The two transactions must occur within the time period defined by Timeout (which is located
next to Toggle Mode Behaviour in the "Install/Access Control/Reader" screen), and the card must have
valid access rights to the reader. Presenting the card only once when toggle mode is deactivated causes a
normal access-control transaction.
Activating toggle mode in this way also unlocks the door, so it is not necessary to present the card a third
time to permanently unlock the door.
Note: Currently, only SR nodes support Double Card Present. The WIU (Wiegand Interface Unit) does
not support Double Card Present.
Allow Double Present Toggle Mode Activation is available only if enabled in the "Maintenance/User &
Preferences/Roles" screen (open "Home-Identity-Card Holders-Card Details-Options").
d) When Toggle Mode Behaviour is set to Double Card Present, you can also select All cards can
Lock when Double Card Present Active in the "Install/Access Control/Reader" screen. If selected,
presenting any card once will deactivate toggle mode and lock the door (assuming the reader has toggle
mode activated and the card has valid access rights to the reader). The door then operates in normal
access-control mode.
If All cards can Lock when Double Card Present Active is selected, activating toggle mode can be
carried out using any of the above methods, but the use of any card will deactivate toggle mode and lock
the door, and therefore the door cannot toggle between being permanently locked and permanently
unlocked with each card transaction.
Introduction
You can set up access rights, scheduled commands and trigger commands to be activated by one threat level and
deactivated by another. The following figure shows how the two settings can be used to support various scenarios.
468
Symmetry Software Reference Manual
469
Using the Pan, Tilt, Zoom Tab
card number. Multiple cards may be useful if, for example separate cards are needed for different sites, or if the
card holder requires a temporary card while the original is unavailable.
By default, you can define up to 10 cards per card holder; this limit can be changed using a setting in multimax.ini.
The Active Date, Inactive Date, Card Number, Facility/Customer Code and Card Issue Level can be different
for each of the card holder's cards. Other settings are common to all cards.
Note:
Multiple cards are not available for visitors.
In the Selection screen, each card belonging to a card holder is listed if Filter By causes the card
number to be displayed.
Antipassback control applies to each card individually.
Introduction
Purpose of this Tab
You can use the tab to:
Specify whether the camera has pan, tilt or zoom controls.
Set up a maximum of 999 presets for the camera, assuming the PTZ controller supports presets. A
preset defines a set position for a camera. When using the "Home/Video & Audio/Virtual Matrix"
screen, an operator can click a preset button to move the camera automatically to the predefined
position. A PTZ Preset command can also perform the same task.
Note: The options in this tab may vary, depending on the camera type.
470
Symmetry Software Reference Manual
Options
Address
The Address option is available only for some types of video server cameras. The option is used to specify the
address of the camera's PTZ controller.
The controller must be connected to the PTZ port on the video server. Each camera's PTZ controller connected
to this port requires a unique address, which must be set up in the controller itself and in the Pan/Tilt/Zoom tab.
Enable Pan/Tilt, Enable Zoom and Enable Focus
Select the required options to enable controls for the camera in this screen and in the "Home/Video &
Audio/Virtual Matrix" screen.
If required, you can set up different preset positions for the camera, then deselect Enable Pan/Tilt, Enable
Zoom and Enable Focus if you do not want to enable the controls in the "Home/Video & Audio/Virtual Matrix"
screen.
Pan, tilt and zoom operations may be carried out by a supported joystick.
Speed Multiplier
Increases the speed of pan and tilt by the specified factor.
Reverse PTZ
Select this option if the camera is mounted upside down and set to flip the image. The option will cause the pan
and tilt controls to operate as expected by the user.
Note: This option reverses the PTZ controls in the "Home/Video & Audio/Virtual Matrix" screen, but does not
reverse the operation of the controls on any external USB joystick that you may be using.
Presets
To define a new preset:
1. Use Enable Pan/Tilt, Enable Zoom and Enable Focus to select the controls that the camera supports.
2. Click Add and specify the preset description and number.
3. Click Live.
4. Select the preset in the list.
5. Position the camera and set the focus using the controls on the right-hand side of the tab.
6. Click Set.
Add
Click this button to define a new preset. You are prompted for the preset description and number.
Remove
Click this button to remove the selected preset.
Go to
Click this button to move the camera position and focus to those defined in the selected preset.
Set
Once you have selected a preset in the table and used the controls on the right-hand side of the tab to specify
the camera position and focus, click Set to store those settings.
Live
Select this option to view live video from the camera. You need to view live video to set up or review the
presets.
471
Using the Privacy Zones Tab
Using Wildcards
For example:
Names in the system: Moran, Morgan, Morison, Morrison, Smith, Smithe
Entering * finds all names
Entering Mor* finds Moran, Morgan, Morison, Morrison
Entering Mor*son finds Morison, Morrison
Entering *ITH* finds Smith, Smithe
You can also use the * wildcard within numeric information, such as a card number. For example, 12* causes 12,
120, 121 and other numbers to be found. The * wildcard on its own has the same effect as specifying no name or
number.
472
Symmetry Software Reference Manual
start time of the replayed recording is determined by Instant Replay in the "Maintenance/User &
Preferences/Accounts" screen. For example, if Instant Replay is 5 minutes, you can replay the
last 5 minutes of recorded video.
Screen Buttons
Click here for details of the buttons on the screen.
Note: If a user cancels a workflow, all other workflows later in the execution order are also cancelled.
473
Hyperlinked Popup Topics
About Content
Content is a measure of how much of the information-rich region of the fingerprint has been captured. A low-content
score during fingerprint enrollment is typically a result of the finger not being properly centered on the finger pad, or
the fingerprint itself not being very well defined. In the latter case, it may be necessary to choose a different finger.
The content of an enrolled fingerprint must be greater than the minimum content specified in the "Maintenance/User
& Preferences/Accounts" screen.
About Quality
Quality is a measure of how well the fingerprint ridge pattern is defined. A low-quality score during fingerprint
enrollment may be the result of the finger not being placed with sufficient pressure on the finger pad, or an
excessively dry finger.
The quality of an enrolled fingerprint must be greater than the minimum quality specified in the "Maintenance/User
& Preferences/Accounts" screen.
Generally, a quality score of less than three is unacceptable.
Note: You may have no access to some tabs and buttons, depending on your user permissions, as set up in
the "Maintenance/User & Preferences/Roles" screen.
The Personal tab allows you to specify personal data such as gender, height, contact telephone number, etc.
Depending on how the personal data titles have been set up, it may be mandatory to specify data for some or all of
the titles. If there are mandatory fields, you will not be able to save changes until you have specified personal data
in them. Mandatory fields are shown with a red marker on the right-hand side.
Note: Your user permissions ("Maintenance/User & Preferences/Roles" screen) may stop you from accessing
groups of personal data titles in this screen.
Note: Click here for further details.
474
Symmetry Software Reference Manual
AC Power Fail
The mains supply to the node has been interrupted.
AC Power Restored
The mains supply to the node has been restored.
Access Codes
An access code is a pre-defined set of access rights, containing any number of reader group, reader, floor group or
area rights. (You can define access codes using the "Operation/Times/Access Codes" screen.)
Access codes can save time if you need to assign the same complex access rights to more than one person. For
example, you could set up an access code called Admin Staff containing all the access rights needed by the
people working in the Administration department.
Note: In Symmetry Global Edition systems, a card holder at a region can be assigned an access code from the
head office using global access codes. Please refer to the Symmetry Software User Guide for an introduction to
Global Edition.
Access Denied
Access was denied by a guard using the "Home/Identity/Verification" screen.
Access Requested
A node requested the guard to allow or deny access for a person who has used a reader that is in PC door control
mode.
Activate
Activates the command set up in the "Operation/Commands/Predefined" screen.
Activate Alarm
When this trigger command is actioned, an alarm command is automatically sent to the CCTV switcher unit.
When the switcher unit receives an alarm command, it performs some pre-programmed action. For example, if the
Activate Alarm command for "Camera 1" is sent, the switcher unit may switch the output of camera 1 to a bank of
video monitors. The effect of issuing an Activate Alarm command depends on how the selected camera has been
set up in the "Install/Video & Audio/CCTV/Camera" screen and how the switcher unit itself has been set up.
This command is applicable only when using an external CCTV switcher unit that supports the alarm feature.
Available as: trigger command.
Active
Indicates that the card can be used normally.
475
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Active
To list only those people who have a card status of "Active" (the card can be used normally).
Active
The visitor is currently signed in.
Active Date
The date on which the card is able to be used. The card is active from the start of the specified date. If the date is
the current date, the card can be used when you select Save, then close the Selection screen.
Activity Checkboxes
Use the checkboxes on the right-hand side of the screen to specify the types of alarms and events to include in the
report. Click here for details of each option.
Advanced
To list only those people who have advanced access rights defined in the Card Details tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
476
Symmetry Software Reference Manual
Note: Both the logged-in user and second user require the Allow Alarm Masking privilege set in the
"Maintenance/User & Preferences/Roles" screen.
All
This selects all the card holders or visitors listed. After using the button, you may want to deselect individual entries
using Ctrl-click.
Use the >> button to move records selected in the left-hand area to the right. Use the << button to move records
selected in the right-hand area to the left. Amendments operate on only those records listed in the right-hand area.
All
To list all, irrespective of status.
477
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Ancillary Off
Switches off the selected CCTV switcher ancillary device.
Available as: manual, scheduled or trigger command.
Ancillary On
Switches on the selected CCTV switcher ancillary device.
When using this as part of a trigger command ("Operation/Commands/Trigger"), you may, for example, want to
switch on a camera's infra-red illuminator when a daylight sensor (a monitor point) detects darkness.
Available as: manual, scheduled or trigger command.
Answered Call
A client PC has answered a telephone call from a remote chain or from a dial-out alarms site.
Antipassback Hard/Soft
Readers can be installed as antipassback readers to prevent people from 'passing back' their card to a second
person to gain entry or exit. There are two forms of antipassback:
Antipassback Hard - The person has attempted to break the antipassback rules. Access was not
granted, since the reader has been installed as a 'hard' antipassback reader.
Antipassback Soft - The person has broken the antipassback rules, but was granted access,
because the reader has been installed as a 'soft' antipassback reader.
Click here for additional information about using these messages in trigger commands.
Click here for an overview of antipassback.
Aperio Battery OK
The battery in the Aperio lock has been replaced following a "Battery Low" alarm.
478
Symmetry Software Reference Manual
Apply
Saves changes without closing the screen. If you can see the filter tab in the "Home/Monitoring/Alarms" screen, you
can see the effects of your changes without closing the Alarm Filters screen.
Approving Official
If necessary, select the name of the person who has authorized you to issue the person's badge. The names of the
approving officials are defined in the "Setup/Identity/Approving Official" screen.
If Approving Official is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences"
screen, it is mandatory to select an approving official.
The "Setup/Identity/Approving Official" screen specifies the approving official's authority period. Only those
approving officials that have an authority period that includes the current date are available for selection.
Clicking the button to the right of the Approving Official field displays the approving official's signature, as captured
in the "Setup/Identity/Approving Official" screen.
Archiving Failed
Video files from the hard disk of an Edge Network Video Server have not transferred successfully to the FTP server.
479
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Archiving Succeeded
Video files from the hard disk of an Edge Network Video Server have been transferred to the FTP server
successfully.
Area Armed
An intrusion area was armed.
Area Disarmed
An intrusion area was disarmed.
Area in Alarm
An intrusion area is in an alarm condition.
Area Reset
An intrusion area was reset from an alarm or fault condition. An area can be reset only by disarming the area or by
sending the Reset Area To Normal command.
480
Symmetry Software Reference Manual
Assign
This button displays the appropriate screen for assigning access rights.
For example, to assign the person normal access rights to a reader group, select Reader Groups in the Normal
Rights branch of the tree display then select Assign.
You can also select this option via the right-click menu from the appropriate entry in the tree view.
Assign
This button displays the appropriate screen for assigning access rights to this ID badge.
For example, to assign access rights to a reader group, select Reader Groups then click Assign.
You can also select this option via the right-click menu, from the appropriate entry in the tree view.
Assigned
This area lists the output group currently selected.
At Wrong Door
The person is known to the system, but was not granted access, because the reader that was used is not included
in the person's access rights (as assigned by using the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen), or the card has been blocked as a result of excessive PIN-entry errors (click here for more information
about blocked cards).
Click here for additional information about using this message in trigger commands.
At Wrong Time
The person is known to the system and is allowed to use the reader. However, the person was not granted access,
because the time that the card was used is not included in the person's access rights (as assigned by using the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen).
Click here for additional information about using this message in trigger commands.
481
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
482
Symmetry Software Reference Manual
Note: See also the Delete Inactive Or Expired Multiple Cards preference. If a card holder has multiple cards,
this preference is able to delete all cards other than the primary card or a temporary card that are expired OR
inactive. Auto Delete Expired Cards is able to delete all cards, including the primary.
Auto Update
Select this option if you want the system to carry out an automatic refresh of the Selection screen at periodic
intervals, as specified by the Minutes field. For example, if you enter 10 in Minutes, the system will refresh the
screen every ten minutes at the PC you are currently using. This ensures that any changes of visitor status made
from data imports or RDS/Citrix Clients are automatically displayed at the PC you are currently using.
Note: It is not necessary to select Auto Update to enable changes made at other Symmetry clients to be
shown in the screen. The screen is automatically updated when changes occur at other Symmetry clients.
483
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
To prevent the screen from being updated while you are entering or modifying selection options, the system waits
for a period of one minute before refreshing the Selection screen with an Auto Update.
The refresh period can be a different value at different Symmetry PCs.
<<
This moves the people you have selected in the right-hand area of the screen into the left-hand area.
Any amendments you make operate on only those people listed in the right-hand area of the screen.
Badge
This button saves any changes you have made (the same as Save) and displays a screen that allows you to
preview and print the badge (optionally encoding a badge at the same time).
Before selecting this button, select the person's badge design, picture, signature, etc.
You may not have access to the button, depending on your user permissions, as set up in the "Maintenance/User &
Preferences/Roles" screen.
Badge Design
Use this to select the badge design, which determines the appearance of the person's badge or card, including the
positions of the signature and picture, if appropriate. The badge design is set up using the "Setup/Identity/Badge
Designer" screen. You can select only those badge designs defined for the currently selected company.
A default badge design can be set up in the "Setup/Identity/Badge Designer" screen.
The badge design can also specify the card’s default normal access rights, such as the times at which the card is
allowed to be used to open doors or other access points. If the badge design specifies any default access rights
and you have privileges to modify the normal access rights ("Maintenance/User & Preferences/Roles" screen), you
are prompted to specify whether or not to overwrite the existing normal access rights when you select the badge
design.
No similar prompt is displayed if a badge design is already selected and you modify the normal access rights (the
changes you make will override the access rights associated with the badge design).
Badge Expires
After you have selected a Badge Design, this field shows the card expiry date, assuming an expiry period has
been set in the "Setup/Identity/Badge Designer" screen.
The expiry period determines the length of time from the Active date that the card is valid. The card will not be able
to be used from midnight on the expiry date, irrespective of access rights. For example, if the expiry date is 6th
December, the card will not be able to be used from the beginning of 7th December, and the status of the card will
change to Expired.
This field is blank if the badge design does not have an expiry period specified.
484
Symmetry Software Reference Manual
If you receive this alarm regularly, consider asking the installer to increase the frequency of the scheduled uploads.
Call Forwarded
A user of the "Home/Video & Audio/Intercom" screen has forwarded a call from an intercom to another intercom.
Call Missed
A user of the "Home/Video & Audio/Intercom" screen has missed a call from an intercom.
Call on Hold
A user of the "Home/Video & Audio/Intercom" screen has placed a call from an intercom on hold.
Call Request
A call request can be generated by the caller pressing a button at the remote intercom or by the caller's vehicle
driving over a detection loop in the road. The method used for each intercom is specified in the "Install/Video &
Audio/CCTV/Control Intercom" screen.
Call Request
A call has originated from an intercom. The message includes the name of the intercom and, if applicable, the call
request ID generated by the intercom.
The call can be answered from the "Home/Video & Audio/Intercom" or "Home/Video & Audio/Intercom Control"
screen, depending on the intercom type.
Call Taken
A user of the "Home/Video & Audio/Intercom" screen has answered a call from an intercom.
Camera
This read-only field shows the name of the camera you have selected.
Camera Restarted
This indicates that an IP camera has been restarted. This message may not be available for all types of camera,
and may require event configuration using the camera web interface.
485
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Camera/Monitor Name
(Command text depends on camera/monitor name defined by installer.) This command switches the video of the
selected camera to a specified monitor output of the CCTV switcher unit. This command is applicable only when
using an external CCTV switcher unit.
The pictures from a single camera can be displayed on two or more monitors by sending separate commands. For
example, if you want to display camera 1 on monitors 2 and 3, send two commands: one specifying camera 1 and
monitor 2, and the other camera 1 and monitor 3.
For a scheduled command ("Operation/Commands/Scheduled"), the camera selected by the Start Command is
switched to the monitor at every start time in the time code. The camera selected by the Stop Command is
switched to the monitor at every end time in the time code.
Available as: manual, scheduled or trigger command.
Cancel
This takes you out of the screen without saving any changes.
Cancel
Select this button to exit from the screen without producing the report.
Card + PIN
Puts the reader in card-and-pin mode; that is, the card owner must enter a PIN after presenting the card. Executive
card holders, as set up in the "Home/Identity/Card Holders" screen, do not have to enter a PIN when a reader is in
card-and-PIN mode (but do when the reader is in user-code-and-PIN mode). This command is ignored if the reader
does not have a keypad.
Available as: manual, scheduled or trigger command.
The Card + PIN command is recognized, even if the reader is disabled. (However, the reader can only read cards
and PINs when it is enabled.)
Sending the Card Only and Card + PIN commands has no effect on User Code + PIN mode or User Code Only
mode. For example, a reader can be set for both Card + PIN and User Code Only. In this case, when the person
presents the card, a PIN has to be entered, but if user-code mode is on, the person can enter the card number
without a PIN.
486
Symmetry Software Reference Manual
Note: The option is not available is <All Companies> is selected in the Company menu, as personal data titles
can be company-specific.
If you choose And, only people who have information specified for both titles are listed. If you choose Or, people
who have information specified for one or both titles are listed.
By typing specific personal information in the Card Data boxes, you can be selective about the card holders or
visitors listed. For example:
First Card Data Title = "Course Name", with "Science Year 1" entered in the Card Data box.
Or selected.
Second Card Data Title = "Course Name", with "Science Year 2" entered in the Card Data box.
In this example, all people who have a "Course Name" of "Science Year 1" or "Science Year 2" will be listed when
you select Find.
You can use wildcards if required.
Card Expired
The card is known to the system, but has been used after it has expired (as shown in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen). The person was not given access.
Click here for additional information about using this message in trigger commands.
487
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
You are given view-only access to the Card Details, Personal and Biometrics tabs for any person
from any company.
For all companies, you are able to add and remove access rights that include readers or other items
belonging to the currently-selected company. You are not able to view access rights that include
readers or other items belonging to another company.
Card Lost
Select this option if the card has been lost or stolen. If selected, the card cannot be used to gain access. If the card
is used, the reader generates a "Lost Card" alarm/event.
Card Name
Select this option if you want to list existing people by first and/or last name.
If you want to be selective about the people to list, type the first and/or last name in the box(es). For example, if you
want to find everyone who has a last name of Smith, type Smith in the Last Name box before clicking Find.
You can use wildcards if required.
Card Name
Select this option if you want to find card holders (excluding visitors) by name.
If you want to be selective about the card holders to list, type the last name and/or first name in the box. For
example, if you want to find all card holders who have a last name of Clarke, type Clarke in the Last Name box.
You can use wildcards if required.
Card Number
Select this option if you want to find existing cards by card number.
If you want to be selective about the cards to list, type the card number in the box.
488
Symmetry Software Reference Manual
If you select a Facility/Customer Code, only those cards that have the selected facility/customer code will be
listed. You can leave the Card Number box blank to list all cards that have the selected facility/customer code. If
you have selected a company from the Company menu, the Facility/Customer Code menu includes only those
facility/customer codes that belong to the selected company.
Visitors are included in the cards found, except when using the "Home/Identity/Card Holders" screen, and when
using the "Home/Identity/Bulk Card Amendments" screen with Visitor Cards deselected.
You can use wildcards if required.
Card holders and visitors can have a card number of zero shown in the Selection screen. This indicates that a card
number has not been allocated.
Card Only
This command puts the reader into card-only mode; there is no need to enter a PIN. You may want to use this
command at busy times of the day.
Available as: manual, scheduled or trigger command.
The Card Only command is recognized, even if the reader is disabled. (However, the reader can only read cards
and PINs when it is enabled.)
Sending the Card Only and Card + PIN commands has no effect on User Code + PIN mode or User Code Only
mode. For example, a reader can be set for both Card + PIN and User Code Only. In this case, when the person
presents the card, a PIN has to be entered, but if user-code mode is on, the person can enter the card number
without a PIN.
Card Suspended
A card has been temporarily suspended because the card holder has entered their PIN incorrectly a specified
number of times at the reader.
Click here for further details.
Card Watch
If selected, the card can be used normally, but the reader generates a "Cardwatch" alarm/event, which allows the
movements of the person to be "watched".
489
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
490
Symmetry Software Reference Manual
Cardwatch
The card used has a status of Cardwatch (as set up by using the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen). This status causes the card to be 'watched'. The person was granted access in the
normal way. In addition, a 'Granted Access' alarm/event is generated.
Click here for additional information about using this message in trigger commands.
Category
You can use this optional menu to select a category for the device. You can type the category in the field or select
an existing category that you have previously typed.
You can filter records by category in the Selection screen. The Selection List Rows Limit option in the
"Maintenance/User & Preferences/Client Preferences" screen determines the maximum number of devices listed.
The category can also be displayed when viewing alarms and activity (e.g. in the "Home/Monitoring/Alarms" and
"Home/Monitoring/Activity" screens).
Change Permissions to
You can use this option to select the user roles (as defined in the "Maintenance/User & Preferences/Roles" screen)
that will have access to use the card holder records. The option is available if Enable Permissions is selected in
your user permissions ("Maintenance/User & Preferences/Accounts" screen).
Clear
This deselects all the people listed.
Clear
Choose this option to remove the picture.
491
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Clear
Select this option to clear the enrolled fingerprint(s). You may want to use this option to clear any record of the
person's fingerprints from the database. There is no need to use this option if you want to re-enroll new
fingerprint(s).
Clear
Returns the screen to the default selections.
Clear Call
Clears the call request without answering.
Client/Server Offline
A client PC or the server is no longer communicating over the network. The server watches for clients that go
offline, and clients that have alarms routed to them watch for the server going offline.
In the case of a server, the alarm/event message is generated the next time the server goes online. A server may
go offline if the Symmetry services at the server have been shut down.
If the server has been offline for some time, a pop-up warning message is also displayed at clients: "The server
machine appears to be offline". The server need not come back online for this message to be displayed.
Client/Server Online
A client PC or the server is now communicating over the network after being offline. The server watches for clients
that go offline, and clients that have alarms routed to them watch for the server going offline.
Clock Advanced
This indicates that the node clock has been advanced by the amount shown in the "Maintenance/Time/System
Time" screen.
Clock Advanced
This indicates that the clock at each client PC has been advanced by the amount shown in the
"Maintenance/Time/System Time" screen.
Clock Retarded
This indicates that the node clock has been retarded by the amount shown in the "Maintenance/Time/System Time"
screen.
Clock Retarded
This indicates that clock at each client PC has been retarded by the amount shown in the
"Maintenance/Time/System Time" screen.
Close
This takes you out of the screen. You will not lose any data.
492
Symmetry Software Reference Manual
Close
Click this button if the visitor is no longer expected. The visitor status changes to closed and the departure date and
time are set to the current date and time.
Closed
The visitor is not currently signed in and the departure date and time are in the past. This indicates that an
additional visit is not planned.
Collapse
This button fully collapses the currently-selected item in the tree view.
Comms Receiver
This option is applicable only for the Intrusion Management module.
Select Comms Receiver to produce a report of all alarms/events from a Bosch D6600 communications receivers,
as set up in the "Install/Intrusion/Communication Receiver/Clients" screen. You can choose to report on all
communications receivers or a selected receiver.
Select Comms Receiver Acct No to choose to report on all alarms/events from a Bosch D6600 communications
receiver that has specified account number, or from all account numbers.
Comms Receiver
This is used to report on alarms/events associated with the use of intrusion communications receivers.
The option is displayed only if the Communications Receiver interface is installed.
Choose Comms Receiver to produce a report of all alarms/event from a specified receiver, or from all receivers.
Choose Comms Receiver Acct No to produce a report of all alarms/event from a specified account number, or
from all account numbers.
Choose None if you do not want to report on communications receiver alarms and events.
For an overview of installing and using the communications receiver interface, please refer to the Intrusion
Management Installation and User Guide.
493
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Company
If Use Card Handler Access Rights is not selected, all new card holders being imported will be assigned to the
selected company.
Company
Select the name of the company that the card holders in the database belong to. All imported card holders will be
assigned to the selected company.
Company Group
A company group is a list of companies.
You may have more than one company in your company group, as set up by the "Install/System/Company Groups"
screen. In this case, you will see a Change Company option in the "Home/Monitoring" menu, which allows you to
change the currently-selected company.
Note: If your company group is changed to include more than one company, you need to log out, then back in,
to see the Change Company option.
Company Name
Displays the name of the company the person is associated with. This is displayed only if your company group
contains more than one company.
Company Name
Select the company that the report refers to.
Conditional Card
If selected, the card holder can use this card only to activate trigger commands or as part of a patrol tour
transaction; it does not open doors.
A conditional card can activate a trigger command by setting the IF part of a trigger command to Valid Card
Transaction.
Configuration Changed
The configuration settings of an Edge Network Video Server have been changed.
Configuration Error
There is an error with the configuration settings of a video server.
Connect
Opens an audio link between your PC's intercom and the selected intercom.
Connect Failed-Busy
Generated when an attempt to connect to an intercom has been made when that intercom is already in use.
In the Alarms screen, "Where" indicates the intercom that received the call, and "Who" indicates the intercom that
started the call.
494
Symmetry Software Reference Manual
Connect Successful
Generated when a connection has been opened between two intercoms.
In the Alarms screen, "Where" indicates the intercom that started the call, and "Who" indicates the intercom that
received the call.
The message is generated by the intercom originating the message.
Connected
A client PC has successfully connected to a remote chain of nodes or to a dial-in alarms site via a modem.
Connecting
A client PC is currently attempting to connect to a remote chain of nodes or to a dial-in alarms site via a modem.
Contact Number
Specify the contact telephone number of the person the visitor is visiting. If you have chosen an existing card holder
from the Visiting pull-down menu, the Symmetry software derives the contact number automatically from a
personal data field in the card holder's details. The personal data field that the Symmetry software uses is specified
by Contact Number Personal Data Field in the "Maintenance/User & Preferences/System Preferences" screen.
Copy
This button is available if you have opened an existing record from the Selection screen. Select this button to copy
the details to create a new record. After selecting Copy, enter the new details, then select Save.
If DuplicateCardWhenCopied is set to 1 in multimax.ini, the card holder's image, signature, facility/customer code
and PIN are retained.
If Inactivate Card When Copying is selected in the "Maintenance/User & Preferences/System Preferences"
screen, a prompt is displayed when you choose Copy, which allows you to choose whether or not to inactivate the
person's card (that is, set its status to "Inactive"). You may want to inactivate the copied card if, for example, the
card has been lost and you are using Copy to set up a new card.
You may not have access to this button, depending on your user permissions, as set up in the "Maintenance/User &
Preferences/Roles" screen.
495
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Copy
If you have selected an existing entry from the Selection screen, you can use this button to copy the details to
create a new entry. After selecting Copy, enter the new details, then select OK.
496
Symmetry Software Reference Manual
Customer Codes
The customer codes stored in a node are dependent on the person's access rights. A node stores a person's
customer code (as defined in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen) if the person has
one of the node's readers in his/her access rights.
Data Read
This displays the information encoded on the card. The information encoded includes the card number, customer
code and any biometrics (hand print) information (for example, captured using the Biometrics tab in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen).
Dates
This button allows you to change the dates assigned for advanced access rights. To do this, select the appropriate
advanced rights title (such as Advanced 1) then select Dates.
You can also select this option via the right-click menu from the appropriate entry in the tree view.
DBase
This gives access to options that enable you to maintain the import database, which is used as a data interface
between the source database and Symmetry's live databases.
Deadbolt Override
This option is available only if the ASSA ABLOY DSR Lock license is installed. Selecting this option allows the card
holder's access rights to override the deadbolt at any lock that has Deadbolt Override selected in the
"Install/Access Control/Reader" screen. If the option is not set, the card holder will not be able to gain access at
doors where the deadbolt is thrown.
497
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Each user can have a different language. The language to use for each user is set up in the "Maintenance/User &
Preferences/Accounts" screen, with the default determined by the Default Language Pack setting in
"Maintenance/User & Preferences/System Preferences". The language selected in the "Maintenance/User &
Preferences/Accounts" screen causes text, such as in menus and screens, to be displayed in the selected
language.
If you change the setting of Default Language Pack, it does not affect the language setting of existing users.
Delete
If you have selected an existing entry from the Selection screen, you can use this button to delete the entry.
Delete All
You can use this button to delete the card holders or visitors selected in the right-hand area of the screen from the
database. Once deleted, the any cards associated with these people will not be able to be used.
The Delete All button is not available if there are card holders or visitors selected that do not belong to the currently-
selected company.
Do not use this button to indicate card holders or visitors you simply want to remove from bulk amendment. Instead,
select the records in the right-hand area of the screen and click <<.
Since it is possible to delete many records in one simple operation, the system prompts you to enter your login
password to confirm the deletion.
The button is available only if your user role ("Maintenance/User & Preferences/Roles") has the Bulk Card Delete
All option selected.
Note: The Auto Delete Expired Cards preference is able to delete the primary card if it has been expired for a
specified number of days.
498
Symmetry Software Reference Manual
Description
Enter a description for this bookmark. The name will be displayed in the "Home/Video & Audio/Video Playback"
screen when listing recorded video clips.
Destination
Using the pull-down list, choose whether to send the report to:
The screen.
A file. A dialog is displayed when you run the report, which enables you to specify the report file
name. Activity and User Audit reports can be created in CSV format (for use in applications such
as Microsoft Excel) or TXT format. All others are in TXT format.
A printer.
One or more email addresses. A dialog is displayed when you run the report, which enables you to
specify the profile (the email server settings, as configured using the "Setup/Configuration/Email
Profiles" screen), destination addresses, email subject and text. Activity and User Audit reports are
created in CSV format (for use in applications such as Microsoft Excel). All others are in TXT
format.
499
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Disconnect
Hangs up the current call.
Disconnected
A client PC has now disconnected from a remote chain of nodes or from a dial-in/out alarms site.
500
Symmetry Software Reference Manual
A Disconnected Door Group access right is therefore an access right defined by associating a particular SALTO
door group (zone) with a particular time code.
Disconnected Doors
Disconnected Doors are online and offline readers in a SALTO access-control system. They are available if a
Disconnected Doors license is installed, as described in the Third-Party Access Devices Configuration and User
Guide.
A card can have access rights to a door on the days and times determined by the selected time code. A
disconnected door can appear only once in a card holder's access rights.
The disconnected doors and time codes available for selection have been automatically imported into Symmetry
from the SALTO software. Changes are imported when you start Symmetry or click Refresh in the "Install/Access
Control/Disconnected Door" screen.
A Disconnected Door access right is therefore an access right defined by associating a particular SALTO door with
a particular time code.
Door Closed
This is generated whenever the door is closed.
This message is used to indicate a closed door icon on graphics. A door icon can be shown as open or closed if the
Show Door Status on Graphics setting is selected in the "Maintenance/User & Preferences/System Preferences"
screen.
Door Forced
The door was opened without proper authority. If this is an alarm, it cannot be cleared until the door is closed. Door
Forced alarms can be suppressed by using a scheduled command to disable door alarms (see "Disabling or
Enabling Door Alarms").
Door Insecure
This applies to readers that use “door loop” connections, where a single 2-core cable is used to monitor the lock
sensor, door sensor and exit-request switch. The alarm/event is reported when the door lock is in a disengaged
state when it should be in an engaged state. For example, if after a normal access-control transaction or a Lock
Door command, the lock has not engaged after the appropriate timeout period. The open/closed status of the door
is not relevant.
501
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Door Open
This is generated whenever the door is opened.
This message is used to indicate an open door icon on graphics. A door icon can be shown as open or closed if the
Show Door Status on Graphics setting is selected in the "Maintenance/User & Preferences/System Preferences"
screen.
(DSR) <message>
Symmetry can display a wide range of different messages from ASSA ABLOY DSR locks. All such messages are
prefixed with "(DSR)".
The Third-Party Access Devices Configuration and User Guide lists all messages supported by Symmetry.
502
Symmetry Software Reference Manual
Please refer to the ASSA ABLOY documentation for details of the meaning of each message.
Duress
A card holder or visitor signaled that he/she is gaining access or arming/disarming an intrusion system under
duress.
Click here for details of how duress is signaled.
The Duress message can be generated only at readers enabled for duress mode in the "Install/Access
Control/Reader" screen.
Employee Ref
You can use this field for supplemental information about the card holder, such as a staff number. It is displayed
only within this screen and for filtering the listed card holders in the Card Holders Selection screen.
If Unique Employee Reference is selected in the "Maintenance/User & Preferences/System Preferences" screen,
Employee Ref cannot be blank and must not be the same as the Employee Ref of any other card holder in the
same company.
Employee Reference
Select this option if you want to find existing card holders (excluding visitors) by their employee reference. Only card
holders who have an employee reference will be listed.
If you want to be selective about the card holders to list, type the employee reference in the box. For example, if
you want to find all card holders who have an employee reference of Emp25, type Emp25 in the box.
You can use wildcards if required.
If you select a Facility/Customer Code, only those card holders who have the selected facility/customer code will
be listed. You can leave the Employee Reference box blank to list all card holders who have an employee
reference and who have the selected facility/customer code.
503
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Selecting this option causes the "Action Taken" prompt to be displayed when sending a command to disarm an
area, bypass a zone or disable a zone from the "Home/Monitoring/Graphics" screen. See also the Mandatory
Intrusion Comments system preference.
Enable Reader
Enables the reader, so that it can operate normally. Available as: manual, scheduled or trigger command.
504
Symmetry Software Reference Manual
Disable Reader
Disables the reader. The reader will not be able to read cards or numbers entered on its keypad (if fitted. Available
as: manual, scheduled or trigger command.
Encode Fingerprint
Select this option to encode the card holder's or visitor's fingerprint on the smart card.
This option is available only if a smart card (not mobile device) is being encoded, and only if fingerprint data is
available for encoding.
Note: If Store Fingerprints in Symmetry is not selected in the "Maintenance/User & Preferences/System
Preferences" screen, the Encode Fingerprint option will be available only if you have just enrolled a fingerprint
without leaving the Card Holders or Visitors screen.
Encode PIN
Select this option to encode the card holder's or visitor's PIN on a smart card.
Encoder Type
Select the type of encoder that is being used.
Smart Card Encoder - A supported encoder type (see the Symmetry Software Installation Manual).
IP Biometric Encoder - An encoder accessed over he network, such as a Suprema BioLite N2
encoder.
S81x Fingerprint Enrollment Reader encodes the card number and a fingerprint template for S81x
fingerprint readers. This option is available only if the person has fingerprint data, captured for an
s81x reader from the Biometrics tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
Symmetry Blue Enrollment Reader - a device connected via a USB port to the computer that
allows the card details to be encoded onto a mobile device installed with the Symmetry Blue app.
Bioscrypt Enrollment Reader encodes the card number and fingerprint data for Bioscrypt
fingerprint readers and is available only if the person has fingerprint data, captured for a Bioscrypt
reader from the Biometrics tab of the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
The encoder type being used must be set up in the "Install/System/Client Ports" screen.
Enroll
Select this option when you are ready to use the enrollment reader to capture the selected fingerprints. Follow the
prompts.
Entries Found
This displays the number of existing entries found after you have selected the Find button.
505
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Entries Selected
This shows the number of people selected in the right-hand area of the screen.
Entry Timer
An entry timer is used in intrusion systems to specify the length of time a card holder is given to disarm an area
after triggering a zone defined as being along an entry/exit route.
For M2150 intrusion systems, the duration of the entry/exit timer is specified by the Entry/Exit Delay setting in the
"Install/Access Control/Node" screen.
Erase
Click this button to erase all data that has been encoded onto the card using the Symmetry software (such as the
card number). Other data not added by the Symmetry software is not removed.
The button may not be available, depending on the type of encoder you are using.
Escort
A visitor escort has allowed a visitor access through a door. This applies if the reader is set up with Visitor Mode,
where both the visitor and the visitor escort need to make valid card transactions at the reader to allow the visitor to
pass through the door.
Example
From Time ("Reports/Configuration/Predefined Reports" screen) = 06:00
To Time ("Reports/Configuration/Predefined Reports" screen) = 11:00
First Report Date ("Reports/History/Predefined Reports" screen) = 6th November 2020
Report Run/End Time ("Reports/History/Predefined Reports" screen) = 09:10
Include Previous Days ("Reports/History/Predefined Reports" screen) = 3
Start Time ("Reports/History/Predefined Reports" screen) = 07:00
506
Symmetry Software Reference Manual
PIN - If selected, the card holder or visitor will not need to enter a PIN at any reader that is in card-
and-PIN mode, unless the reader is in user code + PIN mode.
Note: The above four options are supported only at nodes that have the required firmware - please refer to your
Customer Support Representative. When Executive Card is selected, nodes that do not have the required
firmware operate as if all four options are selected.
Note: Executive card exemptions could be ignored on the first card transaction at any node that has Learn Mode
set in the "Install/Access Control/Node" screen.
Exit Timer
An exit timer is used in intrusion systems and determines the length of time a card holder is given to exit an area
after arming it from an intrusion reader. During this time, zones that are defined as being along the entry/exit route
do not cause alarms if triggered.
For M2150 intrusion systems, the duration of the entry/exit timer is specified by the Entry/Exit Delay setting in the
"Install/Access Control/Node" screen.
The exit timer can be cancelled by triggering a monitor point or intrusion reader door monitor that belongs to the
area and has Final Exit selected in the "Install/Access Control/Reader" or "Install/Access Control/Monitor Point"
screen.
Expand
This button fully expands all contents of the currently-selected item in the tree view.
Expired
This indicates that the card has expired and occurs when:
507
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
The badge expiry date is reached, as shown in the Card Details tab.
The card has not been used for the number of days specified by the Auto Set Unused Cards
Expired rule in the "Maintenance/User & Preferences/System Preferences" screen.
Once expired, a card cannot be used to gain access, irrespective of access rights.
If the Auto Delete Expired Cards or Delete Inactive Or Expired Multiple Cards option in the "Maintenance/User
& Preferences/System Preferences" screen is selected, cards that have been expired for a specified number of
days are automatically deleted.
The Card Expired alarm/event is generated if an expired card is used.
Expired
To list only those people who have cards that have expired; for example, as determined by the Inactive Date\Time
defined in the card details.
Export
Choose this option to save the currently displayed picture as a JPEG file.
Export
Choose this option to save the currently displayed signature as a JPEG file.
Facility/Customer Code
Choose the customer (facility) code to be encoded on the card. The combination of card number and customer
code should uniquely identify the card.
If the card type does not use a customer code (such as some proximity cards), choose the customer code that has
been assigned to the readers that the person is going to use (as set up by the installer).
It is important to set up the correct customer/facility codes before you add the card details, since you cannot select
a different facility/customer code without deleting and re-adding the record.
Facility/Customer Code
Select the facility/customer code. All imported card holders will be given the selected facility/customer code.
Failed Connection
Indicates that a modem call to a remote site has failed to connect after the maximum number of retries.
508
Symmetry Software Reference Manual
Filter by Company
This option affects the following screens:
Reports/History/Predefined Reports
Home/Video & Audio/Video Playback
Home/Video & Audio/Virtual Matrix
Home/Monitoring/Activity
Home/Monitoring/Command Center (non-graphical version)
Home/Monitoring/Controls
Home/Monitoring/Graphics
Home/Identity/Locator
Reports/Configuration/Predefined Reports/Predefined Video Archive Audit
Reports/Configuration/Predefined Reports/Predefined Activity
Reports/Configuration/Predefined Reports/Predefined User Audit
Reports/Configuration/Predefined Reports/Predefined Patrols
Reports/History/User Audit
Reports/History/Patrols
Reports/History/Activity
Reports/History/Video Archive Audit
Selecting this option causes the screens to operate on the currently-selected company. Deselecting the option
causes the screens to operate on all companies in the company group.
This preference is available from "Maintenance/User & Preferences/Client Preferences" and "Maintenance/User &
Preferences/System Preferences". The system preferences sets the default for the client preference. The client
preference takes priority.
Find
This lists any existing entries. The search can be narrowed if you use the filters at the top of the screen.
Clicking the magnifying-glass icon has the same effect as selecting Find.
Find
This lists any existing entries. The search can be narrowed if you enter a name/description/code first.
509
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Fingerprint Cores
The green outlined areas show various types of fingerprint core.
Fingerprint Image-Accept/Retry
This shows the fingerprint you have just enrolled. Choose Accept to accept this fingerprint, or Retry to enroll or
verify the fingerprint again.
Make sure you see a clear and complete fingerprint image, with the fingerprint core in the center of the picture.
Failure to do this may cause unreliable access control.
Floor Access
Selecting this option will cause the report to include valid access control transactions at an elevator reader.
Floor Access
A elevator reader granted the person access in the normal way.
Floor Groups
A floor group is a set of one or more elevator floors, as set up in the "Setup/Device Groups/Floors" screen. When
access rights are set up for a floor group, the card can gain access at all floors in the group on the days and times
determined by the selected time code. You can define time codes using the "Operation/Times/Time Codes" screen.
A Floor Group access right is therefore an access right defined by associating a particular floor group with a
particular time code. Only those elevator floor buttons associated with the floor group are enabled when the card
owner makes a transaction at the elevator reader.
You cannot assign a floor group to the access rights if it contains a floor that is used with another time code in the
access rights. This prevents the access rights including the same floor with different time codes. For example, it
prevents you setting up "Floor 1" with "Time Code 1", and also "Floor 1" with "Time Code 2". If this were allowed,
the system would not be able to determine the time code to use for access to "Floor 1".
A person's access rights can contain a maximum of four "Floor Group + Time Code" entries per elevator node,
except for Micronode elevator node hardware, where only one "Floor Group + Time Code" entry is allowed.
When assigning access rights, the floor groups available for selection include any shared floor groups (as set up in
the "Setup/Device Groups/Shared/Shared Floors" screen) that have been shared to the currently-selected
company.
When viewing existing access rights, shared floor groups are grayed out if they are not shared to the currently-
selected company.
Overview of floor groups and setting up access rights
510
Symmetry Software Reference Manual
511
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Format
This displays the encoding format. The standard format is the smartMAX format.
A Hisec format may be available for encoding Hisec cards on a DTC printer. (The CustomCards setting in
multimax.ini must be set to "Hisec" for this option to be available.)
An Open format (not normally available) is for specialist purposes only. It is used if non-standard smartMAX keys
are being used to encrypt the data onto cards. For an Open format, keys are openly disclosed to enable the end
client to read and decode the data on the card using their own applications. With standard smartMAX format, the
data read from a card cannot be decoded.
The Format menu is not relevant for Suprema BioLite N2 fingerprint enrollment readers or Symmetry Blue mobile
devices. The DefaultFormat setting in multimax.ini determines the default format for these.
Format
Click this button to erase all data from the card. The button may not be available, depending on the type of encoder
you are using.
>>
This moves the people you have selected in the left-hand area of the screen into the right-hand area.
Any amendments you make operate on only those people listed in the right-hand area of the screen.
Free Access
Sending this command enables anyone to access the selected elevator floor (or all floors in the selected group). No
access-control transaction will be required to access the floors.
Available as: manual, scheduled or trigger command.
512
Symmetry Software Reference Manual
"Home/Monitoring/Command Centre" screen and in a dedicated Intrusion Status toolbar. The interface also enables
commands to be issued to perform actions such as:
Arming or disarming areas or zone groups (zone groups apply only to CU30 and ThorGuard panels).
Enabling, disabling or bypassing zones.
Silencing an alarm.
Switching outputs on or off.
General Alarm
An alarm of an unknown type has occurred at the device.
Grant Access
Sending this command gives people free access to access the selected elevator floor (or all floors in the selected
group) for a limited period of time (as set up by the installer).
Available as: manual or trigger command.
Grant Access
Performs the same action as a valid access-control transaction.
Available as: manual or trigger command.
Granted Access
A reader granted the person access in the normal way.
Click here for additional information about using this message in trigger commands.
Group Call
An intercom group call has started (not currently used).
513
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
History
This box shows a history of when the visitor signed in and out, the person they visited and who the escort was.
HTTP
These settings are used by devices such as Axis IP cameras and Symmetry NVR devices.
Network Address - This must specify the IP address or network (DNS) name of the Symmetry server. The
Symmetry server must have a fixed IP address if digital video cameras or Symmetry NVRs are used. This IP
address must be manually updated if the IP address of the Symmetry server changes, otherwise Symmetry will not,
for example, receive Symmetry NVR messages.
HTTP URL path - This is the path to a file on the Symmetry server. Do not change the setting.
User Name and Password - These are used by digital video devices to authenticate with the Symmetry server (for
example, when transferring alarm/event messages). The username and password do not relate to any Windows
account; they are sent within messages from devices to enable the Symmetry server to authenticate the source of
such messages. The default username and password are "Installer" and "Install" respectively.
I and P Frames
A video transmission consists of one or more sets of frames. Each set starts with an I-Frame followed by a series of
P-Frames. An I-Frame is a complete picture at a point in time. Each P-Frame specifies only the changes in the
video picture from the previous frame.
P-Frames can contain much less data than an I-Frame, since they contain only the data that has changed.
Therefore, increasing the ratio of P-Frames to I-Frames reduces the overall amount of data to transmit, but leads to
the picture being refreshed less often.
IDS Code
This setting is available if an intrusion license is installed, and is relevant only for M2150 intrusion systems.
The IDS code is the card holder's personal code, which can be to gain access to intrusion options at an M2150
intrusion reader, such as to arm or disarm an area. Alternatively, a card holder can present a card to access the
intrusion options. The IDS code can be used only at readers that have the Arming/Disarming Reader option
selected in the "Install/Access Control/Readers" screen. No two card holders can have the same IDS code.
The code is displayed in the IDS Code field only if Card Holder Show PIN Code is selected in your user
permissions ("Maintenance/User & Preferences/Roles" screen).
The length of the IDS code is between 4 and 8 digits, as specified by IDS Code Length in the "Maintenance/User &
Preferences/System Preferences" screen.
Note: IDS codes of more than 6 digits may not be available for all node types and firmware versions. Please check
with your local Technical Support Representative before using IDS codes of more than 6 digits.
If Use Access Control PIN as IDS Code is selected in the "Maintenance/User & Preferences/System Preferences"
screen, a default IDS code is generated when you click in the field, which is the same as the card holder's default
514
Symmetry Software Reference Manual
PIN. Leading zeroes are inserted if the IDS code requires more digits than the PIN. If the IDS code requires fewer
digits than the PIN, the IDS code takes the last "n" digits of the PIN, where "n" is the required length of the IDS
code. You can modify the default if you wish.
If Use Access Control PIN as IDS Code is not set, clicking in the IDSCode field generates a random IDS code.
Import
Choose this option to import a picture that has been previously stored as an 8-bit or 24-bit bitmap file or JPEG file
on your computer.
Framing the picture
515
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Import
Choose this option to import a signature that has been previously stored as an 8-bit or 24-bit bitmap file or JPEG file
on your computer.
When you save changes, the picture/signature is stored in the database with the card details.
Import Pad
If your computer has a signature pad device attached to one of its COM ports (as set up by the installer), you can
choose this option to obtain the person's signature from the signature pad.
Selecting Import Pad displays a small dialog in which the signature from the pad is displayed. In this dialog, choose
Cancel to exit without accepting the signature, OK to accept the signature, or Clear to try again.
Inactive
Indicates that the card cannot be used to gain access. If the card is used, the 'Inactive' alarm/event is generated.
The card status is set to inactive if, for example:
The Force Cardholder Inactive option is selected either manually or automatically. For further
information, please refer to the help for Force Cardholder Inactive.
The current threat level is greater than or equal to Deactivate at Level.
The card details have been saved, but the card number has not yet been entered.
Usage Remaining displays Limit Reached to indicate that the card usage limit has been reached.
The card has been copied and Inactivate Card When Copying is selected in the
"Maintenance/User & Preferences/System Preferences" screen.
If the Delete Inactive Or Expired Multiple Cards option in the "Maintenance/User & Preferences/System
Preferences" screen is selected, cards that have been inactive for a specified number of days are automatically
deleted.
Inactive
The card was used at a reader, but the card has a status of "inactive" or has passed its badge design expiry date.
The person was not granted access. The status of a card can be viewed in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
Click here for additional information about using this message in trigger commands.
Inactive
To list only those cards that have Force Cardholder Inactive or Force Card Inactive selected.
Inactive Date\Time
A card cannot be used from the specified time on the inactive date, irrespective of access rights. Leave the fields
blank if you do not want to set an inactive date.
516
Symmetry Software Reference Manual
Changing the date\time may change the status of a card from Active to Expired, if appropriate.
For a visitor, the Inactive Date may be constrained by the Visitor Maximum No of Days setting in the
"Maintenance/User & Preferences/System Preferences" screen. If, for example, the default value of this setting is
used (1 day), the Inactive Date cannot exceed the Active Date.
If the person's badge has expired (see Badge Expires), the inactive date is automatically set to the date that the
badge expired.
The default time displayed in Inactive Time is determined by Inactive Time in the "Maintenance/User &
Preferences/System Preferences" screen.
Inactive Time
This option determines the default time displayed in the Inactive Time field of the "Home/Identity/Card Holders"
and "Home/Identity/Visitors" screens.
Include
Select the types of events to include in the report:
Decode Errors
Other Errors
Comms Events
System Events
Other Events
Include
Select a camera or a camera group (as defined in the "Setup/Device Groups/Cameras" screen).
Note: If there is a new region or classification code in use, you can enter the code in a Include Contractors by
Location Code box.
Include Executives
Select this option if you want the imported card holders to include executives. Those card holders who have
"EXEC" in any of their three location codes will be imported.
Infrared Alarm
A PIR detector at a digital video camera is in an alarm state.
Infrared Normal
A PIR detector at a digital video camera has returned to a normal state.
Input Closed
A monitor point at the device was closed.
517
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Input Opened
A monitor point at the device was opened.
Instruction Messages
This displays messages and prompts during the process.
Intercom Call
For future use.
Intrusion Area
An M2150 intrusion area is a group of one or more M2150 intrusion zones, as defined in the "Setup/Device
Groups/Intrusion Areas" screen. All zones in the same area must connect to the same M2150 intrusion node.
Intrusion area access rights can be assigned to card holders via the "Home/Identity/Card Holders" screen. These
allow card holders to arm and disarm the area. The card holder is able to arm or disarm a selected area from any
intrusion reader that is in the same area and is defined as an arming/disarming reader in the "Install/Access
Control/Reader" screen. Reader access rights are not required to arm or disarm an area. However, if access rights
are granted to the intrusion reader and the reader is used to unlock a door, performing a valid access-control
transaction at the reader disarms the area and unlocks the door.
Note: Intrusion area access rights are not relevant to visitors ("Home/Identity/Visitors" screen). Do not assign them
to visitors.
518
Symmetry Software Reference Manual
The keypad used to arm the system displays any condition that prevents the arming of the individual area or the
common area. The user must correct the condition (e.g. an active sensor) before the system can be set.
It is possible to specifically arm a common area (e.g. using a keypad or the Symmetry Command Center), but to be
successful, all areas accessed through the common area must already be set.
To define a common area:
1. Define the area (e.g. Area 7) using the "Setup/Device Groups/Intrusion Areas" screen.
2. Use the Common Areas tab in the "Setup/Device Groups/Intrusion Areas" screen to select the areas that
are accessed through the common area (e.g. Areas 1-6). By selecting areas in this tab, you are declaring
that the area you are defining (e.g. Area 7) is a common area serving the selected areas.
Note: A common area and all its associated areas must be controlled by the same Symmetry node.
519
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Intrusion Users
An intrusion user is a card holder who is given access rights to operate a third-party Bosch B9512G, DMP
XR500N\XR550 or ThorGuard intrusion system (e.g. to set or unset the system). Intrusion users are applicable only
if an Intrusion Management license is installed, and are not applicable to M2150 intrusion systems.
You can make a Symmetry card holder an intrusion user by assigning access rights to panels through the Access
Rights tab of the "Home/Identity/Card Holders" screen. This allows the card holder to set, unset and perform other
tasks at keypads, etc. attached to the intrusion system, in the same way as if the user had been created at the
intrusion panel itself.
Before assigning access rights in Symmetry, you must use the "Install/Intrusion/Intrusion/Upload Configuration"
screen (for DMP and ThorGuard panels) or the "Install/Intrusion/Intrusion/System Configuration" screen (for Bosch
panels) to upload data held in the third-party system. This enables Symmetry to know information such as the user
numbers already defined at the panels. You must perform this action each time intrusion user details are changed
directly at an intrusion panel, so that Symmetry is kept synchronized.
When you assign the access rights in Symmetry, you select the panels the card holder is allowed to operate (all
must be the same type), together with the user number, user/pass code, user name and profile ID (or area authority
level) to use for the card holder at the panel. Specify an existing user number to associate the Symmetry card
holder with an existing user at the panel, or specify a new user number if you want to create a new user at the
panel. The data is automatically downloaded to the specified intrusion panels. If required, a manual download can
be performed using the "Maintenance/Download/Intrusion Users" screen.
If you specify the number of an existing intrusion user and, for example, change the user code, you are prompted
whether to update the information at the panels.
The Intrusion Management Installation and User Guide gives an overview of intrusion management and step-by-
step instructions on how to configure and use the software.
Note: The Remove Users from Intrusion Panels setting in the "Maintenance/User & Preferences/System
Preferences" screen controls what happens to user details at panels if a card holder is deleted from Symmetry, or if
the access rights are removed.
Intrusion Zone
An M2150 intrusion zone represents a sensor, such as a PIR movement sensor or a door contact. A zone can be
created by either of the following:
A monitor point configured as an intrusion zone, as defined in the "Install/Access Control/Monitor
Point" screen.
The door monitor of an M2150 intrusion reader, as defined in the "Install/Access Control/Reader"
screen. The door monitor is used both for access-control purposes (for example, to monitor Door
Forced conditions), and for intrusion purposes. Note: Please refer to the M2150 Intrusion Guide
for system examples.
520
Symmetry Software Reference Manual
One or more intrusion zones can be in an M2150 intrusion area. A zone cannot be in more than one area.
IP Address Change
The IP address of an Edge Network Video Server has been changed.
IP Camera Offline
An IP camera is offline. The message is displayed when the Offline Monitoring Interval (specified in the Reporting
tab of the camera definition screen) has expired.
Note: This alarm/event message can be generated only for cameras that are assigned to a Symmetry NVR.
IP Camera Online
An IP camera is online.
Keycard Holder
If Keycard Holder is selected for a card, readers that have been enabled as keycard readers (by the installer or
command) recognize the card as a keycard.
A keycard holder can switch the reader between keycard-in and keycard-out states (access rights permitting) by
presenting his or her card and swapping the first two and last two digits of the PIN, such as 3412 for a PIN of 1234,
or 78234512 for a PIN of 12345678. PINs such as 1212 and 9999 are therefore not allowed.
When a reader is in keycard-out state, all cards except keycards are denied access, irrespective of access rights.
When a card reader is in keycard-in state, normal operation is resumed.
Keycard mode can be useful if, for example, the door is the point of entry for switching a intruder alarm off, and only
a few people know how to switch the alarm off.
Keycard In
Performs the same action as a keycard holder switching a reader into the keycard-in state. The Keycard In and
Keycard Out commands have no effect if keycard mode is off.
Available as: manual, scheduled or trigger command.
Keycard Mode On
This command causes Series 600 or later reader to operate in keycard mode, which enables a keycard holder or
command to switch the reader between keycard-in and keycard-out states (access rights permitting). A keycard
holder can switch the reader between keycard-in and keycard-out states (access rights permitting) by presenting his
or her card and swapping the first two and last two digits of the PIN, such as 3412 for a PIN of 1234, or 78345612
for a PIN of 12345678. PINs such as 1212 and 9999 are therefore not allowed.
When a reader is in keycard-out state, all cards except keycards are denied access, irrespective of access rights.
When a card reader is in keycard-in state, normal operation is resumed. Keycard mode can be useful if, for
example, the door is the point of entry for switching off an intruder system, and only a few people know how to do it.
A card holder can be made a keycard holder by using the "Home/Identity/Card Holders" screen.
Available as: manual, scheduled or trigger command.
521
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Keycard Out
Performs the same action as a keycard holder switching a reader into the keycard-out state. The Keycard In and
Keycard Out commands have no effect if keycard mode is off.
Available as: manual, scheduled or trigger command.
Keycard Set IN
The card is a keycard and has been used to set the reader in keycard-in state.
LAN Chain
A LAN chain is a series of interconnected nodes (or intrusion alarm panels) that communicate with an client PC via
a Network Interface Card module (NIC module) in the first node of the chain, or via a device called a PAD.
Communications between the NIC module or PAD and client can be carried out over a network, which may be
shared with other clients.
LAN Connected
A client PC has successfully connected to a LAN chain.
LAN Connecting
A client PC is currently attempting to connect to the specified LAN chain.
LAN Disconnected
A client PC has disconnected from the specified LAN chain.
LAN Error
Indicates that the LAN chain has stopped responding to the client PC, or a response has been received when a
connection has not been made.
522
Symmetry Software Reference Manual
LAN Retry
Indicates an attempt to establish communications with a LAN chain following a previous attempt that failed. The
number and frequency of retries is set up by the installer.
Last Name
Select this option if you want to list existing people by name.
If you want to be selective about the people to list, type the last name in the box. For example, if you want to find
everyone who has a last name of Smith, choose Last Name and type Smith in the box before selecting Find.
You can use wildcards if required.
Listing
This button displays an access rights listing for the selected card.
Live
Selecting this option displays another window in which you can view a live image of the person from a suitably
connected video camera. In the new screen, choose Freeze when a good image is displayed. The Freeze button
toggles to Resume, which allows you to obtain a better image, if required.
Framing the picture
Live
Selecting this option displays another window in which you can view a live signature from a suitably connected
video camera. In the new screen, choose Freeze when a good image is displayed. The Freeze button toggles to
Resume, which allows you to obtain a better image, if required.
Framing the picture
Live Video
This command, which is available by right-clicking on an DVR or IP camera on a graphic, displays the live image
from the camera. The option is available if you have permission (through your user role) to use the "Home/Video &
Audio/Virtual Matrix" screen.
523
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
The Show live video from graphics in option in the "Maintenance/User & Preferences/Client Preferences" screen
determines whether the live image is displayed in the "Home/Video & Audio/Virtual Matrix" screen or in a separate
popup window.
If the camera is a 360-degree camera that supports dewarping, the live image will display the camera view and
camera preset selected in the "Setup/Graphics/Setup" screen. You can change the camera view when viewing the
live video.
If you select this command for a camera group (such as from a graphic), the "Home/Video & Audio/Virtual Matrix"
screen opens and displays video from all cameras in the group.
Location
You can use this optional menu to select the location of the device. You can type the location in the field or select
an existing location that you have previously typed.
You can organize or show\hide records by location in the Selection screen. The Selection List Rows Limit option
in the "Maintenance/User & Preferences/Client Preferences" screen determines the maximum number of devices
listed.
The location can also be displayed when viewing alarms and activity (e.g. in the "Home/Monitoring/Alarms" and
"Home/Monitoring/Activity" screens).
Lock Door
Causes the reader to lock the door and operate normally.
Available as: manual, scheduled or trigger command.
Lost
To list only those people who have lost cards, as marked in the card details.
Lost Card
The card was used at a reader, but the card has been marked as "lost" in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. The person was not granted access.
Click here for additional information about using this message in trigger commands.
Magstripe encoder
Separate magstripe encoders are not supported in the current version of Symmetry.
Maintenance Zone
You can use this menu to include any alarms or events that originated from nodes in a maintenance zone. The
menu lists each maintenance zone set up in the "Maintenance/Maintenance Zones/Maintenance Zones" screen.
Your user role must include permissions to the "Maintenance/Maintenance Zones/Maintenance Zones" screen for
the menu to include any maintenance zones.
The All option reports activity associated with any maintenance zone, even any previously deleted maintenance
zones.
524
Symmetry Software Reference Manual
Merge Field
The Merge Field menu is applicable only if the selected trigger is an alarm-based trigger. You can use the menu to
insert fields into the box below the menu.
The fields are for information that varies for each alarm. For example, inserting the "Who" field will include the name
of the person who caused the alarm.
To use this feature, click the mouse pointer in the box (at the position to insert the field), then select the required
field from the menu. You can also use Insert to insert a selected field.
The Merge Field menu contains the following:
Each card holder and visitor personal data title defined in "Setup/Identity/Personal Data".
Category and Location - The category and location information from the appropriate device
definition screen. For example, for a reader alarm, this information is taken from the "Install/Access
Control/Reader" screen.
State - The current state of the alarm, such as "AcknowledgedAndReset".
What, When, Where, Who - Standard attributes of the alarm.
Message
You can use this box to enter text messages.
Micronodes
Please note that Micronodes are no longer supported.
Modem Error
Indicates that the modem has stopped responding to the client PC, or a response has been received when a
connection has not been made.
525
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
526
Symmetry Software Reference Manual
Motion Alarm/Detection
Movement detected in a monitored area of a CCTV picture.
Motion Normal
Produced when there is no longer movement detected.
Move
This button enables you to associate the person with a different company. The button is available only if there is
more than one company defined. You can carry out a move, irrespective of the companies defined in your company
group.
Before using this option, make sure that customer/facility codes have been set up in the
"Setup/Configuration/Facility/Customer Codes" screen.
Note: The existing customer code must be in the list of customer codes assigned to the company that the
person will belong to.
Multiple Cards
Specifies whether a card holder can have more than one card (each with a different card number). If you select this
setting, additional options appear in the "Home/Identity/Card Holders" screen that enable you to assign more than
one card per card holder. One of the cards can be a temporary card.
You are not able to deselect this setting if there is a card holder who has more than one card.
For further information, please refer to Using Multiple and Temporary Cards.
527
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Network Loss
The network connection to an Edge Network Video Server has been lost.
Network Restored
The network connection to an Edge Network Video Server has been restored.
New
The record is new and has not yet been saved. A card cannot be used until you have closed the Selection screen.
New
Use this to create a new entry.
No Alarms
There are currently no alarms. You need take no action.
Node-Restored On Primary
Following a 'Node Timed Out On Primary' alarm/event, this message is issued following re-establishment of
communications on the primary side of the bi-directional chain of nodes.
Node-Restored On Secondary
Following a 'Node Timed Out On Secondary' alarm/event, this message is issued following re-establishment of
communications on the secondary side of the bi-directional chain of nodes.
528
Symmetry Software Reference Manual
Node Tamper
The tamper switch on the node has been opened.
529
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Not Issued
To list only those people who do not have a card number (a card number of zero).
Notes
You can choose one of the following:
No Change to Notes - Select this if you do not want to make changes to the notes saved for each
card holder or visitor selected.
Bulk Append Notes - Select this to add a note to each of the card holders or visitors selected.
Existing notes for each record will remain; the note you type is appended to any existing notes.
Click the icon to the right of this option to enter the note.
Bulk Delete Notes - Select this to delete the notes saved for each card holder or visitor selected.
These options affect the notes created the icon in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen. They do not affect the general notes created using the Notes button in these screens.
Notes
The Notes button opens a Notes screen, which allows you to record or read any notes relating to the screen you
are currently using.
Most screens that contain a Notes button also contain the following icon, which has a different use from the Notes
button:
Selecting the above icon enables you to write a note for the individual record you are editing. For example, if you
are using the Card Holders Definition screen, you can select the icon to write a note about the individual card holder
you are editing. If you select the Notes button in the same screen, you can write a note that is displayed no matter
which card holder you are editing.
The above icon changes to the following if a note already exists:
Note: Access to these icons in the Card Holders screen can be controlled using the Card Holder Notes privilege in
the "Maintenance/User & Preferences/Roles" screen.
Not Supported
Not currently supported in this version of Symmetry.
530
Symmetry Software Reference Manual
NVR Status
Displays Online and Offline messages for a Symmetry NVR.
Offline
The specified device is offline (for example, depending on device type, possibly caused by an unplugged network
cable).
Office Mode On
Switches the selected reader into office mode, which can be used to keep the door unlocked during normal office
hours. This is available only for Aperio locks/readers connected through an Aperio hub to an EN-LDBU node.
Office mode is switched on and off using a scheduled command. The door unlocks on the first granted-access
transaction following the start time of the command and relocks at the end time of the scheduled command. For
further information, please refer to the Aperio Locks Configuration and User Guide.
For further information, please refer to the Aperio Locks Configuration and User Guide.
Available as: scheduled command.
OK
This takes you out of the screen and saves changes.
OK
This takes you out of the screen, saves any changes and starts the import process (if appropriate, at the specified
date and time).
Open
Gives access to the details of the highlighted entry. Use this button after you have selected Find and highlighted an
entry with the mouse. Double-clicking on an entry has the same effect.
531
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Send Zone Normal to Receiver - Select this option if you want the Symmetry software to send Zone Normal
events to the communications receiver.
Send Area Arm/Disarm to Receiver - Select this option if you want the Symmetry software to send the following
events to the communications receiver:
Area Armed
Area Disarmed
Area Late to Arm
Enable Encryption and Passphrase - Enable encryption if encrypted communications is required to the
communications receiver. If you enable encryption, you must specify the passphrase, which must match the
passphrase at the communications receiver.
Output Off
Switches off the auxiliary output.
Available as: manual, scheduled or trigger command.
Output On
Switches on the auxiliary output until an Output Off command is used.
Available as: manual, scheduled or trigger command.
Output On/Off/Pulse
An auxiliary output on an Edge Network Video Server has switched on/off/pulsed. The output may be being used to
switch external equipment on or off.
Output Pulse
Switches on the auxiliary output for a predefined period of time (as specified by the installer or in the screen you are
using), then switches it off.
Available as: manual, scheduled or trigger command.
Overdue At Point
The guard has not arrived at a patrol tour point within the time allowed.
532
Symmetry Software Reference Manual
Note: If you wish to send scheduled reports to a printer, the Symmetry services must run in a named account that
has access to the printer.
Panel Fault
A panel fault is produced when, for example, the battery in the intrusion panel is low, or there is a communications
problem.
Panel Reset
Produced when an intrusion panel is reset from a fault or alarm condition.
Password
Enter the user's login password, which is case-sensitive. The password must be at least five characters long
(except when entering a password for a visitor manager in the "Home/Identity/Card Holders" screen, which allows a
blank password).
If the Strong Password option is set in the "Maintenance/User & Preferences/System Preferences" screen, the
password must have at least one lowercase character, one uppercase character, one numeric character and one
punctuation mark.
If Allow Use Of Old Passwords is deselected in the "Maintenance/User & Preferences/System Preferences"
screen, the current password will not be able to be reused.
Users can also change their password by using Set Password in "Maintenance/User & Preferences" (if available,
as specified in the user's role).
Password Changed
A user has changed his/her password after connecting to a video server from a Web browser.
Patrol Card
This option is available if you have the Patrols license installed. If you select Patrol Card, the card can be used by
a guard during a patrol tour (as set up in the "Setup/Configuration/Patrol Tours" screen).
Patrol Hold
Temporarily suspends the patrol. The tour resumes automatically when the guard clocks at the next tour point.
Available as: manual command.
Patrol Operations
Select this if you want the report to include patrol tour alarms/events, as set up using the
"Setup/Configuration/Patrol Tours" screen:
Arrived Too Early At Point
Out of Sequence Now at Point
Overdue at Point
533
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Patrol Reset
Causes the patrol tour to be reset. You must use this command when the patrol is complete to acknowledge that
you have seen that it is finished, otherwise you will not be able to start the patrol again. You can also use this
command at any time to abandon the patrol tour.
Available as: manual command.
Patrol Start
Starts a patrol tour. You need to select the guard's name from the pull-down menu.
Available as: manual command.
Pending
The visitor is not currently signed in and the departure date and time are in the future. This indicates that the visitor
may return.
534
Symmetry Software Reference Manual
PIN Code
The card's PIN (Personal Identification Number). This is for readers that require the entry of a PIN. The PIN need
not be unique.
A default PIN is generated automatically for each new card. You can modify the default if you wish. Holding down
the Ctrl key on your keyboard, then clicking in the PIN Code box causes the system to generate a random PIN.
The Standard PIN Code Length option in the "Maintenance/User & Preferences/System Preferences" screen
specifies the length of PIN codes.
If the card holder has Keycard Holder set in the card details, the first and second digits of the PIN must not be the
same as the final two digits. For example, 1212 and 9999 are not permitted.
For security reasons, the PIN is displayed only if Card Holder Show PIN Code is selected in your user permissions
("Maintenance/User & Preferences/Roles" screen).
The Prevent Consecutive PIN Digits setting in the "Maintenance/User & Preferences/System Preferences" screen
determines whether three or more consecutive or repeating digits are allowed in a PIN code.
A card can be blocked if the PIN number is entered incorrectly a specified number of times. Click here for further
details.
It is possible for a card holder defined in the "Home/Identity/Card Holders" screen to change their PIN at Series 6xx
and later readers (providing the reader has a keypad). For further information, see About Card Commands.
535
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
PTZ Command
A Pan-Tilt-Zoom command was sent to a camera. The message is available only for certain camera types, such as
those connected to an ENVS.
PTZ Preset
Moves the selected IP or DVR camera to a preset position. This command is available only if presets have been
defined for the camera.
This command is not available for 360-degree dewarping cameras that support presets, as for these cameras, the
presets are dependent on camera views.
Available as: manual, scheduled or trigger command.
PTZ Start
Pan, tilt or zoom operation started.
PTZ Stop
Pan, tilt or zoom operation stopped.
536
Symmetry Software Reference Manual
About Content
Reader Group
All new card holders being imported will be given the selected reader group, except those whose ACCESSSTATUS
is set to "D" (Denied).
This setting does not affect existing card-holder records that are being updated via data import.
Reader Groups
A reader group is a set of one or more readers, as defined in the "Setup/Device Groups/Readers" screen.
When access rights are set up for a reader group, the card can gain access at all readers in the group on the days
and times determined by the selected time code. You can define time codes using the "Operation/Times/Time
Codes" screen.
A Reader Group access right is therefore an access right defined by associating a particular reader group with a
particular time code.
When assigning access rights, the reader groups available for selection include any shared reader groups (as set
up in the "Setup/Device Groups/Shared/Shared Readers" screen) that have been shared to the currently-selected
company.
When viewing existing access rights, shared reader groups are grayed out if they are not shared to the currently-
selected company.
Reader Tamper
The reader has been opened or communications to the reader has been lost. If this message is an alarm, it cannot
be cleared until the reader cover is closed or communications are restored.
Readers
A card can have access rights to an individual reader on the days and times determined by the selected time code.
You can define time codes using the "Operation/Times/Time Codes" screen.
A Reader access right is therefore an access right defined by associating a particular reader with a particular time
code.
537
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Record Video
Automatically records video from the selected IP or DVR camera. A tagged recording is produced. The video clip
will span a specified period of time either side of the event that triggers the command.
Available as: trigger command. Note: This command is not intended to be used as a manual or scheduled
command; use Start Recording instead.
Selecting the command displays the following options:
Pre Event Time (Pre-Period) - This determines length of time before the event that the video clip
should start. For example, if you specify one minute, the video clip will start one minute before the
event.
For an IP camera, pre-event video is available only if recorded by a previous command.
DVRs should normally be set up to record continuously, and therefore pre-event video is normally
available for a DVR.
Post Event Time (Post-Period) - This determines length of time after the event that the video clip
should end. For example, if you specify one minute, the video clip will end one minute after the
event.
Note: There may be small delay of a few seconds between the time the command is issued and the time the
recording actually starts. This is avoided if the camera is already recording at the time the command is issued (for
example, using the camera's pre-event buffer).
Recording Failed
The Symmetry NVR is unable to record correctly. This may occur if, for example, the connection to a camera that
should be recording has been lost.
Recording Restored
A recording at a Symmetry NVR has restarted following a "Recording failed".
Region Offline/Online
Region Offline indicates that communications with the named Symmetry region have been lost. This may be caused
by a temporary network interruption.
A Region Online message is generated when communications are re-established.
Remove
This button removes access rights. Select the individual access right, or the whole rights branch, to remove, then
select Remove.
You can also select this option via the right-click menu, from the appropriate entry in the tree view.
538
Symmetry Software Reference Manual
Report Title
This is the unique name of the report.
Report Title
This option determines the number of existing reports listed when you select Find. If the option is blank, all reports
of the specified type are listed. If you want to narrow the search, type the report name in the box. You can find a
range of reports by using wildcards.
Representing
The name of the organization the visitor is representing.
539
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Reset
This button reloads the currently-assigned access rights from the database. A warning prompt reminds you that
unsaved changes to the access rights will be lost.
Reset Alarm
This trigger command causes the alarm condition at the CCTV switcher unit to be reset.
This command is applicable only when using an external CCTV switcher unit that supports the alarm feature.
Available as: trigger command.
Reset Passback
For zonal (including zonal local) antipassback, this command causes the card to be put into the neutral zone. For
timed antipassback, it causes the delay period for reuse of the card to be zeroed.
Note:
Sending a Set All Cards to Neutral command applies the command to all cards.
Use the "Setup/Identity/Anti-Passback" screen if you want to disable (or re-enable) antipassback
checking at all nodes on a selected chain.
If a person has multiple cards, as set up in the "Home/Identity/Card Holders" screen, this command
resets antipassback for all of the person's cards.
Reset Passback is not available if you have logged into the Symmetry software using a "visitor management"
username.
Click here for an introduction to antipassback.
540
Symmetry Software Reference Manual
Retry n
Indicates that following the initial attempt to connect to a remote site failed, a retry is currently being attempted. The
number and frequency of retries is set up by the installer. By default, there are three retries, with a one-minute
interval between them. "n" is the retry number currently trying to connect.
Return to Schedule
This command causes the status of the device to return to the status specified by its scheduled commands (if any).
For example, consider a reader that has the following scheduled command:
Unlock Door (start command) at 08:00
Lock Door (stop command) at 18:00
Sending a Return to Schedule command at any time between 08:00 and 18:00 will unlock the door if it has been
locked by another command (such as from the Command Center). Sending a Return to Schedule command at any
time after 18:00 will re-lock the door if it is unlocked.
Return to Schedule considers all scheduled commands set up for the selected device, even those that span
midnight.
Available as: manual, scheduled or trigger command.
Run
Select this button when you are ready to produce the report.
Run
Select this button to produce the listing.
541
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
S600 Alarm LED Pulse - Switches on the alarm LED for 10 seconds.
S600 Alarm LED Flash - Flashes the alarm LED for 10 seconds.
Available as: trigger command.
SALTO Message
This message is generated by a SALTO locking system. Please refer to the SALTO documentation for details of the
meaning of this message.
Scan
Click this button to scan the visitor's business card. After clicking Scan, follow the prompts, which vary depending
on the scanning device you are using. Frame the picture in the Live Video screen that appears.
Any TWAIN-compatible scanning device is supported.
Scheduled Operation
A scheduled command was executed.
Script Alarm
Not used.
542
Symmetry Software Reference Manual
Script Error
There is an error in a command script sent to a video server.
Script Event
Not used.
Script Upload
A command script containing software has been received by a video server.
Search Required
The card holder is required to have a random search.
Secure Access
If you send this command, people are able to access the selected elevator floor (or all floors in the selected group)
only after a valid access-control transaction.
Available as: manual, scheduled or trigger command.
Note: If there is a new region or classification code in use, you can enter the code in a Include Contractors by
Location Code box.
Selecting an Item
You can select an item by using one of the following methods:
Double-clicking the mouse on the item.
Clicking the mouse on the item and selecting OK or Open, depending on screen.
Using the arrow keys and pressing Enter.
543
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
The available items and time code boxes in the Assign Access Rights screen (e.g. displayed when
you are assigning access rights in the "Home/Identity/Card Holders" screen).
A message is displayed in the appropriate screen when the number of entries exceeds the limit imposed by
Selection List Rows Limit.
The default value is 500. The minimum value is 10.
Send Command
Sends the command set up for the intercom, as specified in the "Install/Video & Audio/Intercom/Stations" screen.
Typically, the command is used to open a door or barrier for the caller.
Server Offline
A digital video server is offline. The message is displayed when the Offline Monitoring Interval specified in the
Reporting tab of the device definition screen has expired.
Server Online
A digital video server is now online.
Server Restarted
A digital video server has been restarted.
Note: You can use Reset Passback in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen to
perform the same action for a single person.
544
Symmetry Software Reference Manual
Note: If the person has more than one card defined in the "Home/Identity/Card Holders" screen (not applicable
to Central Card Handler clients), a badge printed in the "Home/Identity/Print Badges" screen will use the card
number of the first card.
An alternative method of deselecting this option is by using the Reset button in the "Home/Identity/Print Badges"
screen.
Note: If you intend to print badges using the "Home/Identity/Print Badges" screen and people use different
badge designs and encoding formats, it's a good idea first to specify the each person's badge design and
encoding format (using the Badge button) before using the "Home/Identity/Print Badges" screen.
Show All
This button displays or hides all unassigned advanced access rights in the tree view.
For example, if the advanced access right titles Advanced 2 to Advanced 16 do not have access rights defined,
they are not normally shown. Selecting Show All reveals these sections in the tree view.
You can also select this option via the right-click menu from any entry in the tree view.
Note: The image is not displayed if Enable Alarm Banner is selected and there is an unacknowledged alarm.
Note: If the background shows an image selected with Find Image, and you want to revert to the default (card)
image, select None, click OK, re-enter the "Maintenance/User & Preferences/Client Preferences" screen and
choose Center, Time or Stretch.
545
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Signaling Duress
Standard Access-Control Readers
For a standard non-fingerprint access-control reader, duress is signaled by preceding the PIN by a 0 and not
entering the last digit.
S81x Fingerprint Access-Control Readers
If S81x fingerprint readers are being used, a "duress" finger can be specified during the fingerprint enrollment
procedure.
When a reader is in single-fingerprint mode, use of the non-duress fingerprint during an access-control
transaction allows normal access, but use of the duress fingerprint causes the "duress" alarm/event to be
generated, indicating that the person is being forced to gain access under duress (although access is still
granted).
When a reader is in two-fingerprint mode, the duress transaction occurs only if the duress finger is used before
the non-duress fingerprint.
A duress alarm/event is generated only if the reader being used is set up for duress mode, as defined in the
Reader Definition.
Intrusion Readers
To signal duress at a reader while arming or disarming an M2150 intrusion system, the person either precedes
the PIN with a 0 and does not enter the last digit, or adds a predefined offset to the PIN, depending on the
setting of Symmetry Intrusion Duress Mode in the "Maintenance/User & Preferences/System Preferences"
screen. The help for this setting provides examples.
Sign In
Click this button when the visitor has arrived and signed in. The visitor status changes to Active.
This button is not available if you have logged in as a visitor manager (that is, your user role is "Visitor
Management") and Disable Visitor Login Sign In/Out is set in the "Maintenance/User & Preferences/System
Preferences" screen.
The button is not available if Stop is selected.
546
Symmetry Software Reference Manual
Sign Out
Click this button when the visitor has left and signed out.
This button is not available if you have logged in as a visitor manager (that is, your user role is "Visitor
Management") and Disable Visitor Login Sign In/Out is set in the "Maintenance/User & Preferences/System
Preferences" screen.
Site number
This is the site number "key" required to read/write DESFire cards. The value is read only and has been
automatically read from the DESFire sentinel.
Encode
This button saves any changes you have made (the same as Save in the Definition screen) and displays the
Encode screen, which allows you to encode a smart card.
The button is available only when the Card Encoding Module license is enabled.
You may not have access to this button, depending on your user permissions, as set up in the "Maintenance/User &
Preferences/Roles" screen.
The installer must use the "Install/System/Client Ports" screen to define the type of encoder and how it connects to
the client.
Note:
If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System
Preferences" screen, the same card credentials cannot be encoded onto more than one card. For further
details, please refer to the help for Prevent Duplicate Credential Encoding in the System Preference screen.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
547
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Note: PIN codes of more than 4 digits may not be available for certain node types - please refer to your local
technical support representative. PIN codes of more than 4 digits are supported only by Wiegand (with an
integrated keypad) or serial current-loop readers.
If the length of the PIN code is more than 4 digits and M2100 or M2150 nodes are being used, set the
ForceCaFor21002150DBU to 1 in the ini file at the Symmetry server to enable cards to be downloaded to these
nodes. Restart the Symmetry Support Service and the Symmetry Client Service at all clients hosting
communications to the nodes.
Start Recording
Starts to record the video images from the selected IP camera(s).
Note that since this command does not produce a tagged recording, the recording may be overwritten at a later
date and therefore may not be available for video playback.
Available as: manual, scheduled or trigger command.
Note: There may be small delay of a few seconds between the time the command is issued and the time the
recording actually starts. This is avoided if the camera is already recording at the time the command is issued (for
example, using the ENVS pre-event buffer).
Start/End Date
Refer to the help for Immediate All Changes.
Startup Transaction
The node has been warm or cold started.
Station Busy
The intercom is engaged.
Station Cleared
The intercom fault has been cleared.
Station Fault
The intercom has gone offline or has a fault.
Station Free
Generated when a call is started from an intercom, and when an intercom connection has been terminated.
In the Alarms screen, "Where" may indicate the intercom that started the call, or the intercom that finished the call.
Connect Request
Generated when an attempt to connect to an intercom has been made. For example, a user of the "Home/Video &
Audio/Intercom Control" screen may be answering a call request, or two different intercoms elsewhere in the
building may be starting a call.
In the Alarms screen, "Where" indicates the intercom that received the call, and "Who" indicates the intercom that
started the call.
Stop
Indicates that the card holder must be stopped from entering the building. The status results from selecting the
Stop option.
548
Symmetry Software Reference Manual
Stop
This option changes the status of the card to "Stop" and automatically selects Force Cardholder Inactive.
Although this option has a similar effect to Force Cardholder Inactive, you can use it to distinguish those card
holders who must be stopped from entering the building, rather than those who are no longer active. The Select by
Status option in the Selection screen allows you to list those card holders who have a stopped status.
In the "Home/Identity/Visitors" screen, selecting Stop disables the Sign In button.
The card holder cannot be made active by any means if he or she has a stopped status.
You can disable the option by configuring the appropriate roles in the "Maintenance/User & Preferences/Roles"
screen.
Stop Recording
Stops recording the video images from the selected IP camera(s).
Available as: manual, scheduled or trigger command.
Stopped
To list cards that must be stopped from entering the building. This status is the result of selecting the Stop option in
the card or visitor details.
Strong Password
Selecting this option forces new passwords to be case sensitive, contain at least one numeric character, one
uppercase character, one lowercase character and one punctuation mark. In addition, a password will not be able
to contain any full word of the user's username.
549
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Note: To enable duress signalling, display the Modes tab of the "Install/Access Control/Readers" screen,
enable Duress Mode and set IDS Code Mode to IDS Code + PIN.
System Alarm
A Digital Video Recorder has generated a "System Alarm", possibly generated by other third-party equipment.
Temporary
To list only card holders who have a temporary card.
Task <name>
Indicates that a task defined in the "Home/Monitoring/Tasks" screen has been set up or is overdue.
550
Symmetry Software Reference Manual
Threat
This button is available only if the Threat Level Manager license is installed and you have selected either Normal
Rights or an individual advanced access right.
Clicking the button displays a dialog that allows you to specify the threat levels at which the selected access rights
are activated and deactivated.
Threat
This button is available only if the Threat Level Manager license is installed and you have selected Assigned
AccessRights.
Clicking the button displays a dialog that allows you to specify the threat levels at which the selected access rights
are activated and deactivated.
Time Code
All new card holders being imported will be given the selected time code, except those whose ACCESSSTATUS is
set to "D" (Denied).
This setting does not affect existing card-holder records that are being updated via data import.
Today's Visitors
The purpose of this option is to list all visitors who are expected now, and all other visitors who are or were on site
today. The system lists:
All visitors who should be on site, as determined from their arrival/departure times.
All visitors who are currently signed in.
All visitors who signed out any time today.
551
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Trigger Operation
A trigger command was executed.
Uncategorized
Select this if you want the report to include other miscellaneous alarms/events, such as those generated by:
The Symmetry system itself.
Third-party systems that have imported transactions into the import database (see the Data Connect
Manual).
SALTO communications offline messages.
This information is not normally associated with any particular company.
Uncategorized Intrusion
Select this option to include other intrusion alarms/events.
Unknown Card
The card is of the correct type and is formatted correctly, but has not been allocated to a person in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen. The person was not granted access.
Click here for additional information about using this message in trigger commands.
552
Symmetry Software Reference Manual
Unknown Fingerprint
Indicates that the fingerprint presented to a fingerprint reader was not recognized. The person was not granted
access.
Unlock Door
Causes the reader to unlock the door until it receives a Lock Door command. The door is unlocked, even if the
reader is in keycard-out state. For a reader that is used in an elevator, Unlock Door causes all floors to be
selectable (and there is no need for people to present their cards).
Available as: manual, scheduled or trigger command.
Usage Remaining
Specifies the number of times the card can be used. Each time the card is used, the value reduces by one until
Limit Reached is displayed. When the limit has been reached, the status of the card changes to Inactive.
Set to No Limit if you do not want to set a limit on the number of times the card can be used.
Depending on the setting of Node Supports Card Usage Remaining in the "Install/Access Control/Node" screen,
tracking of card usage is carried out either by the node's controlling client alone, or by the controlling client and
node. The latter method is the most secure.
User Added
A new video server user has been added by a person who is configuring the video server from a Web browser.
User Alarm
A user-defined alarm set up at a Digital Video Recorder has occurred.
553
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
User Comments
Select this if you want a report sent to a printer or file that includes alarms to include additional information, such as
when the alarm was acknowledged, cleared and reset, and the comments added in the Acknowledge Alarm screen.
If the report is displayed on the screen, only the first comment can be viewed, but this is always included in a report
that includes alarms, irrespective of whether or not User Comments is selected.
Note: Comments are included in an activity report only for those alarms that have been cleared.
User Deleted
A video server user has been deleted by a person who is configuring the video server from a Web browser.
User Edited
The details of a video server user have been edited by a person who is configuring the video server from a Web
browser.
554
Symmetry Software Reference Manual
It is possible for a card holder to change his/her PIN from a reader only if the Command Card Holder option is set
in the "Home/Identity/Card Holders" screen, and the reader has the User Initiated Door Time option set in the
"Install/Access Control/Reader" screen.
For further information, see About Card Commands.
User PIN
If User PIN Active has been selected, specify the PIN.
Username
Enter a unique login username. Case is not important.
Vacation
Indicates that the current time is within a vacation period, as specified in the Vacation tab of the
"Home/Identity/Card Holders" screen. The card holder will not be able to gain access.
Vacation
To list only card holders who are currently on vacation, as specified in the Vacation tab of the "Home/Identity/Card
Holders" screen.
VCA
A digital video camera has generated a Video Content Analysis (VCA) alarm, as configured at the camera. For
example, an object may have been detected in the image.
Vehicle
The registration/license number of the visitor's vehicle.
555
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Verify
Select this option to verify that the enrolled fingerprint(s) can be matched with live fingerprint(s) with the specified
acceptance threshold. Follow the prompts.
The Force Fingerprint Verification setting in the "Maintenance/User & Preferences/Client Preferences" screen
determines the number of verification passes (default is three).
If any of the verification passes is not successful, the acceptance threshold is automatically lowered and you are
prompted to try again. Click Retry if you want to continue with the current attempt using the new acceptance
threshold, or Verify to repeat the whole verification procedure again, using the original setting.
You will see the message "The lowest acceptance threshold has been reached" if the system has attempted to
reduce the acceptance threshold below that specified in your user privileges, as set in the "Maintenance/User &
Preferences/Accounts" screen.
Video Connected/Reconnected
The video signal to a camera attached to a Digital Video Recorder has been established.
556
Symmetry Software Reference Manual
View
A "view" defines the camera images to display in the "Home/Video & Audio/Virtual Matrix" screen, and the positions
of those images on the screen. Views are created by selecting the Save button in the "Home/Video & Audio/Virtual
Matrix" screen.
View
Click this button to view an enlarged image of the business card.
Visiting
Select or enter the name of the person the visitor is visiting. You can choose the name of any card holder defined in
the "Home/Identity/Card Holders" screen or enter a name directly into the field (the name need not exist).
The menu has an automatic filtering feature to prevent it from containing a large number of names. If you enter a
surname or part of a surname with wildcards, the menu will contain only those surnames that match the text. For
example, entering M* causes the menu to display only surnames starting with an "M". Once you have selected a
name from the menu, the menu contains only that name. You can reset the menu by selecting (None).
If you have logged into the Symmetry software for "visitor management", the Visiting field is grayed out and
displays the name of the card holder currently logged in.
Visitor Active
To list visitors who are currently signed in.
Visitor Cards
Set this option if you want to find visitors, rather than standard card holders.
Visitor Closed
To list visitors who are not signed in and whose departure date and time is in the past. This indicates that an
additional visit is not planned.
557
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Visitor Escort
Select this option if the card holder is allowed to escort visitors (as set up in the "Home/Identity/Visitors" screen).
The Visitors tab is displayed when you select this option (the card holder must have a card number). You can use
the tab to specify the visitors that the card holder has been nominated to escort. The tab also lists the visitors who
have not yet been assigned an escort.
Visitor Escort
Select the person who has been nominated to escort the visitor. Only those card holders who have been nominated
for this role (as selected by the Visitor Escort option in the "Home/Identity/Card Holders" screen) and who have an
"active" card status can be selected.
The menu has an automatic filtering feature to prevent it from containing a large number of names. If you enter a
surname or part of a surname with wildcards, the menu will contain only those surnames that match the text. For
example, entering M* causes the menu to display only surnames starting with an "M". Once you have selected a
name from the menu, the menu contains only that name. You can reset the menu by selecting (None).
Clicking the following button displays the Find Visitor Escort screen, which provides additional filtering options for
selecting the visitor escort:
Visitor Escort is automatically set to the same name as selected in Visiting if the card holder selected is a
nominated visitor escort.
If Visitor Escort is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences" screen,
selection of a visitor escort is mandatory (except when the card has an "Inactive" status).
If the Auto Unassign Expired Visitor Cards setting is selected in the "Maintenance/User & Preferences/System
Preferences" screen, the escort is automatically removed when the visitor's card expires.
558
Symmetry Software Reference Manual
Visitor Pending
To list visitors who are not signed in and whose departure date and time are in the future. This indicates that the
visitor may return.
Visitor Representing
Select this option if you want to list visitors who are representing a chosen organization. Type the organization
name in the Visitor Representing box. If you leave the box blank, all visitors will be listed.
You can use wildcards if required.
The organization a visitor is representing is specified in the "Home/Identity/Visitors" screen.
Visitor Visiting
Select this option if you want to list visitors who are visiting a chosen person.
Use the Visiting pull-down list to select the name of the person the visitor is visiting.
Choose None if you want to list all visitors who do not have the name of the person they are visiting defined in the
"Home/Identity/Visitors" screen. (Other filters on the screen may prevent some visitors from being listed.)
559
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")
Wrong PIN
The card is known to the system, but the person entered the wrong PIN (as set up by using the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen). The person was not granted access.
Click here for additional information about using this message in trigger commands.
Zone Bypassed
An intrusion zone has been bypassed. Bypassed zones do not report alarms.
For M2150 intrusion systems, a bypassed zone returns to its normal (non-bypassed) state when the zone's area is
disarmed.
Zone Disabled
Disabled zones apply to Siemens (Vanderbilt), M2150, DSC and ThorGuard intrusion systems. An intrusion zone
that is disabled cannot report intrusion alarms.
Zone Enabled
An intrusion zone is enabled if it is not bypassed or disabled.
A Zone Enabled alarm/event occurs when a disabled state is removed.
Zone in Alarm
An intrusion zone is in an alarm state.
Zone in Fault
An intrusion zone is in an fault or tamper condition.
Zone In Tamper
This is applicable for Siemens (Vanderbilt), M2150, DSC, CU30 and ThorGuard intrusion systems and indicates
zone tamper condition.
For CU30 and ThorGuard systems, a zone tamper is temporary and changes to a zone alarm.
560
Symmetry Software Reference Manual
For M2150 systems, this alarm/event is generated only for zones that have six-state supervision (as set up by the
installer). The message indicates that the tamper switch in the sensor has been activated, and can be generated
even if the monitor point is disabled (for example, by a command).
Zone Normal
The intrusion zone has returned to its normal state.
Zone Reset
An intrusion zone was reset from an alarm or fault condition.
561
Index
1 Number 315
1DCB configuration 257 Preferences 339, 342
7 Real-time printing of 106, 221, 339
75xx camera reporting at server level 106
Defining 290 Reports 122, 156
79xx encoder Routing 101
Defining 290 Routing to different computers 6
A Setting up alarm instructions 106
Access codes Sound 103, 106
Global 154, 212 Viewing previous alarms 371
Standard 84 Alarm client 221
Access point Alarm comments
Defining 120 Defining 99
Overview of 434 Alarm Controller 360
Access rights Alarm definitions
Assigning 383 Defining 103
Defined in badge design 401 Alarm instructions
Report of 152 Defining 97
Setting up 58 Using the alarm definitions 103
Acknowledge alarm 368 Alarm screen
Acknowledge multiple alarms 370 Appearance 381
ACR 360 Alarm/Event/Ignore classification
Activation code 446 At server 106
Activity Alarms
Current 13, 221 Messages A-D 375
Filter 207 Messages E-M 377
Report 122, 156 Messages N-Z 378
ACU 360 Ancillary
Add Comment screen 373 Definition 316
Administration client 221 Antipassback
Advance/retard clock 354 Enabling/disabling 189
Advanced access titles Overview of 423
Setting up 212 Setting up 219, 232, 241, 257
Advanced reports 127, 131, 135, 139, 143, 147 Approving official
Alarm Defining 187
Acknowledging 368, 370 Mandatory 339
Banner 342 Archiving the log 114
Changing the message text 106 Area occupancy 186
Clearing 368, 370 ASSA ABLOY
Color 103, 106 Adding the DSR 241
Commands 99 Adding the lock 257
Comments configuration report 155 Auxiliary groups
Dial-out/in 222, 239, 240, 428 Configuration report 155
Instructions configuration report 155 Defining 162
Masking 417 Auxiliary output
Messages 375 Changing status of 18, 25
Monitoring alarms 6 Configuration report 155
Node 241 Definition 271
562
Symmetry Software Reference Manual
563
Index
564
Symmetry Software Reference Manual
565
Index
566
Symmetry Software Reference Manual
567
Index
568
Symmetry Software Reference Manual
Z Zone
Zenitel Pulse 48 Maintenance 358, 363
Zenitel Pulse Intercom System 320, 321
569