0% found this document useful (0 votes)
32 views

9600-0497 Symmetry Software Reference Manual (Standard Edition), Issue 9.3.0v1

Uploaded by

tomruneh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

9600-0497 Symmetry Software Reference Manual (Standard Edition), Issue 9.3.0v1

Uploaded by

tomruneh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 577

Symmetry Software

Reference Manual
Standard (non-Homeland) Edition
9.3.0v1

SECURITY MANAGEMENT SYSTEM


Note: This manual has been automatically generated from the Symmetry
online help system. As a consequence, the presentation of the information is
different from that found in standard installation or user guides. The manual
contains all of the information found in the online help.
This manual uses hyperlinks. To make use of the hyperlinks, the manual
should be viewed online using Adobe® Reader®. After clicking a hyperlink, you
may need to scroll down the page to display the start of the relevant topic.

1
9600-0497
© G4S Technology Limited 2020
All rights reserved. No part of this publication may be reproduced in any form without the written
permission of G4S Technology Limited.

Challenge House, International Drive,


Tewkesbury, Glos, GL20 8UQ, U.K.
Telephone: +44 (0) 1684 850977

Symmetry Online Help


Standard (non-Homeland) Edition

9600-0497

Issue 9.3.0v1 (for software version 9.3.0) – 13th February 2020

Microsoft and Windows are registered trademarks of Microsoft corporation.


Symmetry is a trademark of G4S Technology Limited
Adobe and Adobe Reader are registered trademarks of Adobe Systems Incorporated in the United States
and/or other countries.
All trademarks acknowledged.

2
Table of Contents
Introduction ............................................................................................................................................................1
Introduction to the Online Help ..............................................................................................................................1
Starting Symmetry ................................................................................................................................................1
Options Available from the Symmetry Button ........................................................................................................3
Customize Quick Access Toolbar Screen..............................................................................................................4
Home Menu.............................................................................................................................................................6
Alarms ("Home/Monitoring/Alarms") ......................................................................................................................6
Current Activity ("Home/Monitoring/Activity" or "Home/Video & Audio/Virtual Matrix") .......................................... 13
Graphics Screen ("Home/Monitoring/Graphics") .................................................................................................. 16
Command Center Screen (Graphical) ("Home/Monitoring/Command Center") ..................................................... 18
Command Center Screen (Non-Graphical) ("Home/Monitoring/Command Center") ............................................. 25
Change Threat Level ("Home/Monitoring/Change Threat Level") ......................................................................... 29
Change Company Screen ("Home/Monitoring/Change Company")...................................................................... 30
Controls Screen ("Home/Monitoring/Controls") .................................................................................................... 30
Tasks Screen ("Home/Monitoring/Tasks") ........................................................................................................... 34
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix") ............................................................................... 38
Video Playback Screen ("Home/Video & Audio/Video Playback") ........................................................................ 45
Intercom Screen ("Home/Video & Audio/Intercom") ............................................................................................. 48
CCTV Cameras Screen ("Home/Video & Audio/CCTV Cameras") ....................................................................... 53
Intercom Control Screen ("Home/Video & Audio/Intercom Control")..................................................................... 55
Video Status Screen ("Maintenance/Video/Video Status") ................................................................................... 57
Card Holders Screen ("Home/Identity/Card Holders") .......................................................................................... 58
Visitors Screen ("Home/Identity/Visitors") ............................................................................................................ 64
Identity Verification Screen ("Home/Identity/Verification") .................................................................................... 68
Locator Screen ("Home/Identity/Locator") ........................................................................................................... 71
Bulk Card Amendments Screen ("Home/Identity/Bulk Card Amendments") ......................................................... 72
Print Badges Screen ("Home/Identity/Print Badges") ........................................................................................... 75
Home and Full Screen ........................................................................................................................................ 77
Operation Menu .................................................................................................................................................... 78
Hours Definition Screen ("Operation/Times/Hours") ............................................................................................ 78
Time Codes Screen ("Operation/Times/Time Codes") ......................................................................................... 80
Holiday Screen ("Operation/Times/Holiday") ....................................................................................................... 83
Access Codes Screen ("Operation/Times/Access Codes") .................................................................................. 84
Scheduled Commands Screen ("Operation/Commands/Scheduled")................................................................... 87
Predefined Command Screen ("Operation/Commands/Predefined").................................................................... 92
Trigger Commands Screen ("Operation/Commands/Trigger") ............................................................................. 93
Alarm Instructions Screen ("Operation/Alarms/Instructions") ............................................................................... 97
Alarm Comments Screen ("Operation/Alarms/Comments") ................................................................................. 99
Alarm Commands Screen("Operation/Alarms/Commands") ................................................................................ 99
Alarm Routing ("Operation/Alarms/Routing") ..................................................................................................... 101
Alarm Definitions Screen ("Operation/Alarms/Definitions") ................................................................................. 103
Alarm Reporting ("Operation/Alarms/Reporting") ............................................................................................... 106
Custom Alarm Emails Screen ("Operation/Alarms/Custom Alarm Emails") ........................................................ 110
Data Import Screen ("Operation/Data/Data Import") .......................................................................................... 111
Data Export Screen ("Operation/Data/Data Export") .......................................................................................... 113
Archive Screen ("Operation/Data/Archive") ....................................................................................................... 114
Backup Screen ("Operation/Data/Backup") ....................................................................................................... 115
Directory Link Screen ("Operation/Data/Directory Link") .................................................................................... 116
Control Centers Screen ("Operation/Controls/Control Centers") ........................................................................ 117
Control Group Screen ("Operation/Controls/Control Groups")............................................................................ 118
Control Point Definition Screen ("Operation/Controls/Control Points")................................................................ 120
Reports Menu ..................................................................................................................................................... 122
History Activity Screen ("Reports/History/Activity") ............................................................................................ 122

i
Table of Contents

History User Audit Screen ("Reports/History/User Audit") .................................................................................. 123


History Onsite Times Screen ("Reports/History/Onsite Times") ......................................................................... 123
History Card Holders On Site Screen ("Reports/History/Cardholders Onsite") ................................................... 124
History Patrols Screen ("Reports/History/Patrols") ............................................................................................. 124
History System Screen ("Reports/History/System") ........................................................................................... 125
History Video Archive Audit Screen ("Reports/History/Video Archive Audit") ...................................................... 125
Global Status Report ........................................................................................................................................ 126
Predefined Reports ("Reports/History/Predefined Reports") .............................................................................. 127
Predefined Reports ("Reports/History/Predefined Reports") .............................................................................. 131
Predefined Reports ("Reports/History/Predefined Reports") .............................................................................. 135
Predefined Reports ("Reports/History/Predefined Reports") .............................................................................. 139
Predefined Reports ("Reports/History/Predefined Reports") .............................................................................. 143
Predefined Reports ("Reports/History/Predefined Reports") .............................................................................. 147
Card Listing Selection Screen ("Reports/Identity Reports/Cards") ...................................................................... 151
Access Listing Selection Screen ("Reports/Identity Reports/Access") ................................................................ 152
Visitors Listing Selection Screen ("Reports/Identity Reports/Visitors")................................................................ 153
Global Access Report Screen ("Reports/Identity Reports/Global Access") ......................................................... 154
View System Configuration Screen ("Reports/Configuration/System Configuration") ......................................... 154
Configuration Reports Selection Screen ("Reports/Configuration/Reports") ....................................................... 155
Predefined Activity Report ("Reports/Configuration/Predefined Reports/Predefined Activity") ............................ 156
Predefined User Audit Report ("Reports/Configuration/Predefined Reports/Predefined User Audit") .................. 156
Predefined Onsite Times Report ("Reports/Configuration/Predefined Reports/Predefined Onsite Times") .......... 157
Predefined Card Holders On Site Report ("Reports/Configuration/Predefined Reports/Predefined Cardholders
Onsite") ............................................................................................................................................................ 157
Predefined Patrol Report ("Reports/Configuration/Predefined Reports/Predefined Patrols")............................... 157
Predefined Video Archive Audit Report ("Reports/Configuration/Predefined Reports/Video Archive Audit")........ 158
Onsite Beyond Limit Screen ("Reports/Configuration/Predefined Reports/Onsite Beyond Limit") ....................... 158
Setup Menu......................................................................................................................................................... 160
Digital Video Camera Group Screen ("Setup/Device Groups/Cameras")............................................................ 160
Reader Groups Screen ("Setup/Device Groups/Readers") ................................................................................ 161
Auxiliary Output Groups Screen ("Setup/Device Groups/Auxiliary Outputs") ...................................................... 162
Monitor Point Groups Screen ("Setup/Device Groups/Monitor Points") .............................................................. 163
Intrusion Areas Screen ("Setup/Device Groups/Intrusion Areas") ...................................................................... 164
Floor Groups Screen ("Setup/Device Groups/Floors") ....................................................................................... 167
Intercom Group Screen ("Setup/Device Groups/Intercoms") .............................................................................. 168
Shared Reader Group Screen ("Setup/Device Groups/Shared/Shared Readers") ............................................. 169
Shared Floor Group Screen ("Setup/Device Groups/Shared/Shared Floors") .................................................... 171
Badge Designer Screen ("Setup/Identity/Badge Designer") ............................................................................... 172
Muster Definition Screen ("Home/Identity/Muster") ............................................................................................ 179
Area Occupancy Screen("Setup/Identity/Area Occupancy") .............................................................................. 186
Approving Official Screen ("Setup/Identity/Approving Official") .......................................................................... 187
Card Blocks Screen("Setup/Identity/Card Blocks") ............................................................................................ 188
Anti-Passback Screen ("Setup/Identity/Anti-Passback") .................................................................................... 189
Card/Visitor Personal Data Titles Screen ("Setup/Identity/Personal Data/Card Holder (or Visitor) Titles")........... 189
Card/Visitor Personal Data Titles Screen ("Setup/Identity/Personal Data/Card Holder (or Visitor) Titles")........... 191
Card Personal Data Screen("Setup/Identity/Personal Data/Card Holder Data") ................................................. 192
Visitor Personal Data Screen ("Setup/Identity/Personal Data/Visitor Data") ....................................................... 193
Workflow Designer Screen ("Setup/Workflow/Workflow Designer") ................................................................... 194
Email Profiles Screen ("Setup/Configuration/Email Profiles") ............................................................................. 201
Graphics ("Setup/Graphics/Add") ...................................................................................................................... 202
Graphics Screen ("Setup/Graphics/Setup") ....................................................................................................... 203
Activity Filters Screen ("Setup/Configuration/Activity Filters") ............................................................................ 207
Threat Levels Screen ("Setup/Configuration/Threat Levels") ............................................................................. 209
Patrol Tours Screen ("Setup/Configuration/Patrol Tours").................................................................................. 210
Advanced Access Titles Screen ("Setup/Configuration/Advanced Access Titles") .............................................. 212
Global Access Codes ("Setup/Configuration/Global Access Codes") ................................................................. 212

ii
Symmetry Software Reference Manual

Facility/Customer Codes Screen ("Setup/Configuration/Facility/Customer Codes") ............................................ 213


Entry Point Screen ("Setup/Identity Verification/Entry Point") ............................................................................. 214
View Screen ("Setup/Identity Verification/View") ................................................................................................ 216
Data Titles Screen ("Setup/Identity Verification/Data Titles") ............................................................................. 218
Install Menu ........................................................................................................................................................ 219
Installation Wizard ("Install/System/Installation Wizard") .................................................................................... 219
Node Defaults ("Install/System/Default Settings/Node") ..................................................................................... 219
Reader Defaults ("Install/System/Default Settings/Reader") .............................................................................. 219
Monitor Point Defaults ("Install/System/Default Settings/Monitor Point") ............................................................ 219
Reader/Card Formats ("Install/System/Default Settings/Reader/Card Formats") ................................................ 219
Card Formats Definition Screen ("Install/System/Default Settings/Card Formats") ............................................. 220
Clients ("Install/System/Clients") ....................................................................................................................... 221
Client Ports ("Install/System/Client Ports")......................................................................................................... 222
Serial Device Definition ("Install/System/Serial Devices/Port Settings") ............................................................. 228
Serial Messages Definition ("Install/System/Serial Devices/Messages") ............................................................ 229
Company Definitions ("Install/System/Companies") ........................................................................................... 230
Company Groups Screen ("Install/System/Company Groups") .......................................................................... 231
Hardwired Chain Definitions ("Install/Access Control/Chains/Hardwired") .......................................................... 231
LAN Chain Definitions ("Install/Access Control/Chains/LAN") ............................................................................ 232
Dial-Up Chain Definitions ("Install/Access Control/Chains/Dial-Up")................................................................... 236
Dial-Out Alarm Definitions ("Install/Access Control/Chains/Dial-Out Alarm") ...................................................... 239
Dial-In Alarm Definitions ("Install/Access Control/Chains/Dial-In Alarm")............................................................ 240
Node Definitions ("Install/Access Control/Node") ............................................................................................... 241
Reader Definitions ("Install/Access Control/Reader") ......................................................................................... 257
Monitor Point Definitions ("Install/Access Control/Monitor Point")....................................................................... 268
Auxiliary Output Definitions ("Install/Access Control/Auxiliary Output") .............................................................. 271
Disconnected Door Screen ("Install/Access Control/Disconnected Door") .......................................................... 273
Intrusion System Configuration ("Install/Intrusion/Intrusion/System Configuration") ............................................ 275
Intrusion Device Configuration ("Install/Intrusion/Intrusion/Device Configuration") .............................................. 279
Intrusion System Upload ("Install/Intrusion/Intrusion/Upload Configuration") ...................................................... 283
HiSec Integration Configuration Screen ("Install/Intrusion/Intrusion/HI SEC Integration") ................................... 285
Status Color Configuration Screen ("Install/Intrusion/Intrusion/Status Color Configuration") ............................... 286
Communications Receiver Clients Definition ("Install/Intrusion/Communication Receiver/Clients") ..................... 287
Communications Receiver Zones Definition ("Install/Intrusion/Communication Receiver/Zones") ....................... 287
Communications Receiver Accounts Definition ("Install/Intrusion/Communication Receiver/Accounts") ............. 288
Digital Video Device Selection Screen .............................................................................................................. 288
Axis Cameras ("Install/Video & Audio/Digital Video") ......................................................................................... 289
75xx Camera / 79xx Encoder (HD).................................................................................................................... 290
Axis IP Camera ("Install/Video & Audio/Digital Video") ...................................................................................... 292
Axis Video Servers ("Install/Video & Audio/Digital Video") ................................................................................. 296
ONVIF Camera ................................................................................................................................................. 298
Panasonic IP Camera ("Install/Video & Audio/Digital Video") ............................................................................. 302
Sony IP Camera ("Install/Video & Audio/Digital Video") ..................................................................................... 305
Symmetry IP Camera ("Install/Video & Audio/Digital Video") ............................................................................. 307
NVR Cameras Assignment Screen ("Install/Video & Audio/NVR Cameras Assignment") ................................... 309
Camera Views ("Install/Video & Audio/Camera Views") ..................................................................................... 310
Camera Associations ("Install/Video & Audio/Camera Associations") ................................................................ 312
CCTV Switcher Definitions ("Install/Video & Audio/CCTV/Switcher") ................................................................. 314
CCTV Camera Definitions ("Install/Video & Audio/CCTV/Camera") ................................................................... 315
CCTV Ancillary Definitions ("Install/Video & Audio/CCTV/Ancillary") .................................................................. 316
CCTV Monitor Definitions ("Install/Video & Audio/CCTV/Monitor") ..................................................................... 317
CCTV Control Input Definitions ("Install/Video & Audio/CCTV/Control Input") .................................................... 317
CCTV Control Intercom Definitions ("Install/Video & Audio/CCTV/Control Intercom") ......................................... 318
CCTV Control Output Definitions ("Install/Video & Audio/CCTV/Control Output") ............................................... 319
Client Definition ("Install/Video & Audio/Intercom/Clients") ................................................................................. 320
Call Station Definition ("Install/Video & Audio/Intercom/Stations") ...................................................................... 321

iii
Table of Contents

Network Video Recorder (NVR) ("Install/Video & Audio/Digital Video") .............................................................. 324
Region Definition ("Install/Global/Region") ........................................................................................................ 325
Global Connection ("Install/Global/Global Connection") ..................................................................................... 326
Maintenance Menu ............................................................................................................................................. 328
Set Password Screen ("Maintenance/User & Preferences/Set Password") ........................................................ 328
User Roles Screen ("Maintenance/User & Preferences/Roles") ......................................................................... 328
User Accounts Screen ("Maintenance/User & Preferences/Accounts") .............................................................. 334
Command Roles Screen ("Maintenance/User & Preferences/Command Roles") ............................................... 338
System Preferences Screen ("Maintenance/User & Preferences/System Preferences") .................................... 339
Client Preferences Screen ("Maintenance/User & Preferences/Client Preferences") .......................................... 342
Home Screens Definition ("Maintenance/User & Preferences/Home Screens").................................................. 346
Download Cards Screen ("Maintenance/Download/Cards") ............................................................................... 346
Download a Node ("Maintenance/Download/Node") .......................................................................................... 347
Download a Chain ("Maintenance/Download/Chain") ........................................................................................ 348
Download a Video Server ("Maintenance/Download/Video Server") .................................................................. 348
Download Intrusion Users ("Maintenance/Download/Intrusion Users") ............................................................... 348
Node Priority Screen ("Maintenance/Download/Node Priority").......................................................................... 349
Door Timing Screen ("Maintenance/Access Control/Door Timing") .................................................................... 350
Upload Screen ("Maintenance/Access Control/Upload") .................................................................................... 351
Node Status ("Maintenance/Access Control/Node Status") ................................................................................ 351
Encode Cards Screen ("Maintenance/Access Control/Encode Cards") .............................................................. 352
Read a Card Screen ("Maintenance/Access Control/Read a Card") .................................................................. 353
Read a Smart Card Screen ("Maintenance/Access Control/Read a Smart Card") .............................................. 353
System Time Screen ("Maintenance/Time/System Time") ................................................................................. 354
Client Comms ("Maintenance/Communication/Client") ...................................................................................... 355
System Licenses ("Maintenance/Licensing/System Licenses") .......................................................................... 356
RDS/Citrix Client Licenses ("Maintenance/Licensing/RDS/Citrix Client Licenses") ............................................. 357
Maintenance Zones Screen ("Maintenance/Maintenance Zones/Maintenance Zones") ...................................... 358
Hyperlinked Main Topics ................................................................................................................................... 360
About Alarm and Output Controllers .................................................................................................................. 360
About Card Commands .................................................................................................................................... 361
About the Directory/LDAP Authentication Module.............................................................................................. 362
About Maintenance Zones ................................................................................................................................ 363
About the Service Monitor ................................................................................................................................. 364
About the Symmetry NVR ................................................................................................................................. 366
Acknowledge Alarm Screen ("Home/Monitoring/Alarms") .................................................................................. 368
Acknowledge Multiple Alarms Screen ("Home/Monitoring/Alarms") ................................................................... 370
Activity History Screen ("Home/Monitoring/Activity") .......................................................................................... 371
Add Comment Screen....................................................................................................................................... 373
Adding and Editing Card Details ....................................................................................................................... 373
Alarm/Event Messages ..................................................................................................................................... 375
Alarm/Event Messages A-D .............................................................................................................................. 375
Alarm/Event Messages E-M .............................................................................................................................. 377
Alarm/Event Messages N-Z .............................................................................................................................. 378
Alarm Processing Screen ("Maintenance/User & Preferences/Roles") ............................................................... 381
Appearance of the Alarms Screen ("Home/Monitoring/Alarms") ......................................................................... 381
Assign Access Rights Screen ........................................................................................................................... 383
Assign Card Relay Output Group Screen .......................................................................................................... 388
Assign Holiday Type Screen("Operation/Times/Holiday") .................................................................................. 388
Available Unassigned (Network Discovery of Digital Video Device) ................................................................... 389
Badge Design Rule Screen ("Setup/Identity/Badge Designer") .......................................................................... 389
Badge Preview Screen ..................................................................................................................................... 389
Blocked Cards Caused by PIN-Entry Errors ...................................................................................................... 390
Camera Tour Period ......................................................................................................................................... 391
Card Layout Screen .......................................................................................................................................... 392
Card Number .................................................................................................................................................... 393

iv
Symmetry Software Reference Manual

Commands ....................................................................................................................................................... 394


Create Bookmark Screen .................................................................................................................................. 400
Data Import Maintenance ("Operation/Data/Data Import") ................................................................................. 400
Date Range ...................................................................................................................................................... 401
Default Badge Access Rights Screen ("Setup/Identity/Badge Designer") ........................................................... 401
Default Permissions Screen .............................................................................................................................. 402
Definition Screens............................................................................................................................................. 402
Directory Settings Screen ("Maintenance/User & Preferences/Roles") ............................................................... 404
Disabling or Enabling Door Alarms.................................................................................................................... 405
Email Tab ("Operation/Alarms/Definitions" and "Operation/Alarms/Reporting") .................................................. 406
Encode Screen ................................................................................................................................................. 406
Filter By ............................................................................................................................................................ 407
Filter Selection Screen ...................................................................................................................................... 408
Find a Card Holder/Visitor Escort Screen .......................................................................................................... 409
Fingerprint Enrollment Acceptance Thresholds ................................................................................................. 410
Graphics Icons.................................................................................................................................................. 410
Introduction to Serial Messages and Devices .................................................................................................... 412
Intrusion Areas Report ...................................................................................................................................... 413
Intrusion Status Toolbar .................................................................................................................................... 414
License Activation ............................................................................................................................................. 414
License Screen ("Maintenance/Licensing/System Licenses") ............................................................................ 415
Lock-Out Mode ................................................................................................................................................. 415
Lucent and Avaya Data Import Screen ("Operation/Data/Data Import") ............................................................. 416
Masking Alarms ................................................................................................................................................ 417
Muster Reset .................................................................................................................................................... 418
Notes Screen .................................................................................................................................................... 418
Open Screen .................................................................................................................................................... 419
Overview of the Access Rights Tab ................................................................................................................... 419
Overview of Antipassback ................................................................................................................................. 423
Overview of Biometric Hand Templates and HGUs ........................................................................................... 426
Overview of CCTV Switching ............................................................................................................................ 427
Overview of Dial-Out/In Alarms Reporting ......................................................................................................... 428
Overview of Fingerprint Readers ....................................................................................................................... 429
Overview of Floor Groups ................................................................................................................................. 430
Overview of Multi-User Commend Control Systems .......................................................................................... 431
Overview of Output Groups and Card-Relay Nodes .......................................................................................... 433
Overview of Setting Up a Commend Control System ......................................................................................... 434
Overview of Visitor Management....................................................................................................................... 437
PC Door Control ............................................................................................................................................... 439
Permissions Screen .......................................................................................................................................... 440
Personal Data Titles ......................................................................................................................................... 441
Playback Buttons .............................................................................................................................................. 441
Popup Media View Screen ................................................................................................................................ 443
Predefined Report Selection Screen ("Reports/Configuration") .......................................................................... 443
Random Search................................................................................................................................................ 443
Readers Listing Selection Screen ("Reports/Configuration/Reports"/Readers) ................................................... 444
Record Video Screen ........................................................................................................................................ 445
Suprema Fingerprint Enrollment Screen............................................................................................................ 446
System License Activation Screen .................................................................................................................... 446
S813 Fingerprint Enrollment ............................................................................................................................. 447
Tagged, Bookmarked, User and Standard Recordings ...................................................................................... 449
The Color Screen.............................................................................................................................................. 449
The Font Screen ............................................................................................................................................... 450
The Frame Width Screen .................................................................................................................................. 450
Threat Commands Screen ("Setup/Configuration/Threat Levels")...................................................................... 450
Threat Level ..................................................................................................................................................... 451

v
Table of Contents

Timing Diagrams for Door Operation ................................................................................................................. 451


Print Setup Screen............................................................................................................................................ 459
Save and Export Video Screen ......................................................................................................................... 459
Save As Screen ................................................................................................................................................ 460
Save View Screen ............................................................................................................................................ 461
Secure Logon Dialog ........................................................................................................................................ 461
Selectable Messages ........................................................................................................................................ 461
Selection Screens ............................................................................................................................................. 463
Setting Up a LAN Chain .................................................................................................................................... 464
Setting Up Barrier Controls ............................................................................................................................... 465
Setting Up Output Points .................................................................................................................................. 466
Setting Up a Traffic-Light Control ...................................................................................................................... 466
Storage Folder Screen ...................................................................................................................................... 467
System Log Report ("Reports/Configuration/Reports"/System Log) ................................................................... 467
Toggle Mode .................................................................................................................................................... 467
Understanding the Effect of the Activate and Deactivate Fields ......................................................................... 468
Using Multiple and Temporary Cards ................................................................................................................ 469
Using the Pan, Tilt, Zoom Tab........................................................................................................................... 470
Using the Privacy Zones Tab ............................................................................................................................ 472
Using Wildcards................................................................................................................................................ 472
Video Replay Screen ........................................................................................................................................ 472
Workflow Alarm Conditions Screen ("Setup/Workflow/Workflow Designer") ....................................................... 473
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer") ........................................................ 473
Hyperlinked Popup Topics ................................................................................................................................ 474
Index ................................................................................................................................................................... 562

vi
Introduction

Introduction to the Online Help

Aim
The aim of this online help is to provide full information about every screen and option that is available.

Context-Sensitive Help
This online help is context sensitive. This means that when you select a Help button in one of the screens, you are
automatically taken to the description of that screen. There is no need to search around a manual to find the
information you need; it is found for you automatically.

Printing a Help Topic


You can print any help displayed on the screen. Choose the Print button, or click the right mouse button and select
Print Topic.

User's Guides
What this online help doesn't tell you is the approach to security management or the general user interface; these
aspects are described in the Symmetry User's Guide. It is strongly recommended that you read the Symmetry
User's Guide before you attempt to use Symmetry.
Also available are Installation & User Guides that describe a particular feature or module of Symmetry. For
example, the following publications are available:
 Threat Level Manager Installation and User Guide
 Guard Patrol Manager Installation and User Guide
 Intrusion Management Installation and User Guide
 Intercom Management Installation and User Guide
 RDS/Citrix Client Access Installation and User Guide
 Data Connect Manual
 M2150 Intrusion Guide
 M2150 Design Guide
 Disconnected Doors Installation and User Guide
 Aperio Locks Configuration and User Guide
 NIC Module Configuration Guide

Starting Symmetry

Starting the Software


To start Symmetry, double-click the following icon on the Windows desktop:

1
Starting Symmetry

Logging In
After you have started the software, the Logon dialog is displayed. If there are any uncleared alarms, the following
information is displayed:
 New Alarms: The number of alarms that have not yet been acknowledged, excluding masked and
task alarms.
 Total Alarms: The number of alarms not yet cleared, excluding masked and task alarms.
 Highest Priority: The priority of the highest-priority new alarm (1 is the highest priority, 999 is the
lowest).
If there are alarms, you will see the following icon flashing blue/red light in the Windows System Tray (normally in
the bottom-right corner of the screen):

The icon appears as follows if all alarms have been acknowledged:

Dwelling the mouse pointer over either icon reveals the number of new alarms and the total number of alarms.

Note: RDS/Citrix Clients do not show the System Tray alarm icon or the alarm information in the Logon dialog.
Note: The Logon dialog is not displayed if you are using the Command Line Logon feature, which allows your
username and password to be specified in the Windows command line. This feature is enabled using
Command Line Logon in the "Maintenance/User & Preferences/System Preferences" screen.

To log on from the Logon dialog:


1. Enter a valid user name and password, as supplied to you by the administrator of Symmetry, then click
OK. The password is case-sensitive.
The Cancel button is made available if Enable Logon Cancel Button is selected in the
"Maintenance/User & Preferences/Client Preferences" screen. Selecting Cancel causes the software to
shut down.

Note: After you have logged in, you can change your password by using the Set Password option in
"Maintenance/User & Preferences" (if available, as determined by your privileges).
Note: If you are using the "Directory/LDAP Authentication Module", you can enter a domain username
and password.

2. You may be prompted to present your fingerprint or smart card if a secure logon is required, as set up in the
"Maintenance/User & Preferences/Accounts" screen.
3. The Symmetry main window is displayed, ready for you to open and use the required screens.

Software Licensing
Symmetry needs to have the correct licenses installed, as described in the Software Installation Manual. Each
license requires an activation code. If the license activation code has not been entered, users will still be able to log
in, but the system operates with restricted operation. Users are given read-only access to the entire system; they
will not be able to add or change information with the exception of the "Home/Monitoring/Alarms" screen where full
operation will be available.

2
Symmetry Software Reference Manual

This mode enables users to handle alarms and view the content of other screens, but prevents changes being
made in other screens.
Advanced information about the Service Monitor

Options Available from the Symmetry Button


The Symmetry button is available in the top-left corner of the screen:

The button gives access to the following options and menus:


Windows
Close All - Closes all screens that are currently open. If appropriate, you are prompted to save changes.
Clear Saved Window Positions - Closes all screens that are currently open and clears the system's memory
of each screen's last position. After using this option, each screen you open is placed in its default position and
at its default size.
Reset User Messages - Removes the preference not to display warning messages. When you perform certain
actions in the Symmetry software, a message is displayed that provides further information or warnings. The
message may include an option that allows you to prevent the message from appearing again. Selecting Reset
User Messages clears this preference for all warnings, which causes the messages to appear again when
appropriate.
Tile, Cascade and Arrange - These perform the standard Windows operations of neatly re-arranging the
currently open screens or minimized screen icons.
Print
Prints the currently active screen on the default Windows printer.
This has the same effect as clicking the Print Screen toolbar button. The toolbar button is displayed if
Application Menu/Print/Print Screen Button is set in your user role ("Maintenance/User &
Preferences/Roles" screen).
About
Displays information about the Symmetry software, such as the program and database version numbers.
Logoff
You can log off the system at any time by selecting the Logoff option. This causes the Login screen to be
displayed.
To prevent unauthorized use of the screens, you should always log off whenever you leave the computer
unattended.
A logoff occurs automatically if there is no keyboard or mouse activity after the period of time specified by Auto
Logoff Time in the "Maintenance/User & Preferences/Client Preferences" screen.
The Login screen notifies you of any alarms that are received while you are logged off.
Exit
This option allows you to exit from the Symmetry software.
Open Windows
This contains a list of screens that are currently open. Selecting a screen from this list makes that screen the
active screen.

3
Customize Quick Access Toolbar Screen

Customize Quick Access Toolbar Screen

General
Introduction
This screen is displayed by selecting More Commands from the Quick Access Toolbar menu:

You can use the screen to set up your Quick Access Toolbar, which is displayed near the top-left corner of the
Symmetry window. Each user can set up their own toolbar after logging in.
The toolbar can contain icons for:
 Any screen in the Symmetry software that your user role gives you access to. These are listed in
the Views tab on the left side of the screen.
 Any predefined command that your user role allows you to send, as set up in the
"Operation/Commands/Predefined" screen. If you have access to predefined commands, these
are listed in the Commands tab on the left side of the screen.
 External applications (such as spreadsheet or graphics application).
The right-hand side of the screen (Selected Commands) lists the icons that are currently included in your
toolbar, if any.
Adding items to your toolbar
You can add a screen or predefined command to your toolbar by selecting the item in the Available
Commands area and clicking >. You can add an external application using the Add button.
To remove an icon from your toolbar, select it in the Selected Commands area and click <. Clicking <<
removes all icons.
The order of the icons listed in the Selected Commands area determines their order in the toolbar. The icon at
the top of the list appears on the left in the toolbar. You can use Move Up and Move Down to change the order
of the icons.

Screen Options
>
Use this button to add a selected screen or predefined command to your toolbar.
<
Use this button to remove a selected icon from your toolbar.
<<
Use this button to remove all icons from your toolbar.
Move Up
Use this option to change the order of the icons in the toolbar. Moving an icon one place up in list will move it
one place to the left in the toolbar.
Move Down
Use this option to change the order of the icons in the toolbar. Moving an icon one place down in list will move it
one place to the right in the toolbar.

4
Symmetry Software Reference Manual

Add
You can use this option to add an icon to the toolbar that can be used to launch an external application (exe
file).
The option is available only if Allow external commands to be added to the Ribbon bar is selected in your
user role ("Maintenance/User & Preferences/Roles" screen).
A screen is displayed when you click Add. In the screen, enter a title, use the Browse button to select the exe
file, and select an icon. The screen contain the following fields and options:
Title
The name you enter in this field will be displayed when you hover the mouse pointer over the icon in the
toolbar. The default name (which is displayed when you select the exe file) is the description from the exe
file properties.
Path
This read-only field displays the path to the exe file you have selected using the Browse button.
Select Image From
Choose a icon library, or select Custom to choose a folder that contains icons. Any icons associated with
the selected exe file are displayed automatically.
Edit
This button is enabled if you select an icon that is used to launch an application (exe file) from the toolbar.
Clicking Edit allows you to edit the properties you defined using the Add button.

5
Home Menu

Alarms ("Home/Monitoring/Alarms")

General
Overview of Alarm Management
About Alarm Management
You can use the "Home/Monitoring/Alarms" screen to manage alarms routed to your computer, as set up
in the "Operation/Alarms/Routing" screen.
Alarm management is the process of viewing, acknowledging and clearing alarms that are received at this
computer. When new alarms occur, you need to make sure you understand what the alarm means and
take the appropriate action. This is the process of acknowledging the alarm.
The screen displays standard alarms and those associated with tasks set up in the
"Home/Monitoring/Tasks" screen. A task alarm can be acknowledged by starting the task that has
generated the alarm.
Once the cause has been understood and investigated, the alarm can be cleared to remove it from the
screen. Note, however, that all alarms are stored in the log, which can be reviewed using the
"Reports/History/Activity" screen.
Appearance of the Alarms Screen
You can change the appearance of the Alarms screen using the Show Combined
Alarm/Acknowledgement Screen option in the "Maintenance/User & Preferences/Client Preferences"
screen. Please click here for further information.
About the Alarms List
The alarms list displays:
 What - The alarm message. If Show Card Number with Alarm/Event is selected in the
"Maintenance/User & Preferences/System Preferences" screen, the person's card number (if
known) is displayed in square brackets after the alarm/event message.
 Where - The location of the alarm.
 Who - Other details, such as the name of the person who caused the alarm, if known.
 Chain - If the alarm has originated from a node located on a LAN, hardwired or dial-up
chain, this shows the name of the chain. This is displayed only if Show Chain Name with
Alarms has been selected in the "Maintenance/User & Preferences/Client Preferences"
screen. For intrusion systems, this displays the name of the intrusion system. The Chain
column is not displayed in the Masked Alarms tab.
 Time and Date - The time and date the alarm occurred. Seconds are shown if Show
Seconds for Transactions is selected in the "Maintenance/User & Preferences/Client
Preferences" screen.
 Priority - The priority of the alarm.
 Masked Until - This is displayed only in the Masked Alarms tab. It shows the date and time
the alarm returns to the All Alarms tab.
You can click on a column heading to re-order the items in the list by that heading (click again to sort in
reverse order).

6
Symmetry Software Reference Manual

Handling Task Alarms


A task defined in the "Home/Monitoring/Tasks" screen can generate an alarm either immediately on
creation of the task, or when the task is overdue, depending on the setup of the task.
Selecting/opening a task alarm allows you to view the details of the task, in the same way as opening the
task from the "Home/Monitoring/Tasks" screen. Please click here for further information.
A red task alarm indicates that the task has not been started. A green task alarm indicates that the task
has been started. The "New" indicator at the bottom of the screen (with the blue background) shows the
number of alarms for tasks that have not been started.
Clearing all alarms in the Alarms screen (using the Clear button) completes all tasks that are in alarm.
Completing a task removes it from the Alarms screen.
If a task has caused an alarm because it is overdue, changing the due date so that the task is no longer
overdue removes the alarm condition.
All task alarms are treated as "system" alarms for the purposes of alarm routing
("Operation/Alarms/Routing") and alarm reporting ("Operation/Alarms/Reporting").
Alarm Color and Meaning
The default colors for the alarms are as follows:
1. RED - New alarms.
2. BLUE - Alarms that have been acknowledged, but the device has not been reset (for example, an
open door has not been closed).
3. GREEN - Alarms that have been acknowledged and reset, but have not yet been cleared. A green
task alarm indicates that the task has been started.
The colors can be customized for alarms from selected devices. This is set up in the
"Operation/Alarms/Definitions" screen. Changing the colors does not affect the default colors of the color
blocks shown to the left of all alarm messages.
When Highlight Unacknowledged Alarms on Reset is selected in the "Maintenance/User &
Preferences/System Preferences" screen, the colored blocks for alarms that are unacknowledged but have
been reset are displayed half grayed-out:

Alarm Order
Alarms are, by default, presented in the following order:
1. New alarms (default red).
2. Alarms that have been acknowledged, but not reset (default blue).
3. Alarms that have been acknowledged and reset (default green).
Alarms of the same category are ordered according to their priority (1 is the highest, 999 is the lowest).
You can change the alarm order by clicking a column header. You can re-apply the default alarm order by
right-clicking and selecting Default Sort Order.
Receiving New Alarms
When your PC receives an alarm, the following may occur:
 Your PC may make a sound. A Silence button is provided at the bottom of the Symmetry
window to stop the sound. The sound reflects the sound associated with the latest alarm, as
defined in the "Operation/Alarms/Definitions" screen or in the "Maintenance/User &
Preferences/Client Preferences" screen.
 If Enable Alarm Banner is selected in the "Maintenance/User & Preferences/Client
Preferences" screen, "Alarm!" is displayed with a red background in the Symmetry window.

7
Alarms ("Home/Monitoring/Alarms")

 Your PC may print alarm/event messages on its default Windows printer. This is
enabled/disabled on a per-PC basis in the "Install/System/Clients" screen, and can be
overridden on a global basis from the "Maintenance/User & Preferences/System
Preferences" screen. The "Operation/Alarms/Reporting" screen determines which alarms
and events are printed.
 You will see a flashing blue/red icon of an alarm light in the Windows System Tray (if you
can see the System Tray). The icon is replaced by an icon of a card when you have
acknowledged all alarms, then disappears when all alarms are cleared.
 If Symmetry is minimized, it will be restored to its previous size automatically.
All new alarms are, by default, shown in red.
The following information is displayed in the Status Bar at the bottom of the Symmetry window:
 New(red background)- Displays the number of new alarms; that is, the number of alarms
that you have not yet acknowledged. This does not include task alarms.
 New(blue background)- Displays the number of unstarted task alarms.
 Total - Displays the total number of alarms, excluding task alarms.
 Priority - Displays the priority of the highest-priority new alarm (1 is the highest priority, 999
is the lowest).
If only the Login screen is displayed, this information is automatically added to the bottom of the Login
screen when a new alarm is received.

Note: The following can affect alarm counts and other indications of alarm conditions:

a) Restrict alarm counts to selected filters in the Alarms screen section of the "Maintenance/User &
Preferences/Roles" screen. For further information, please refer to the help for the Roles screen.

b) Alarm filter, which is accessed through the Role Filters button in the "Maintenance/User &
Preferences/Roles" screen. For further information, please refer to the help for the Roles screen.

Viewing Alarm Instructions


Alarms (excluding task alarms) may have instructions that you should follow. Each alarm can have unique
instructions as defined in the "Operation/Alarms/Definition" screen.
If you are using the default appearance of the Alarms screen, the alarm instructions (if defined) are
displayed in the Acknowledge Alarm screen, which you can display by double-clicking the alarm. For
further information, please refer to the help for the Acknowledge Alarm screen.
If you are using the combined alarm/acknowledgement appearance, the instructions (if defined) are
displayed in the Alarms screen. In this case:
 If the instructions include several different instructions, you can use the controls at the top
and bottom of the scroll bar to move between the previous/next alarm instruction. A splitter
in the window separates each instruction.
 You can use the button to display the instructions in a separate window. This window
provides a Zoom option. The window retains its size, location and zoom state when you
close it, so that it appears the same if you open it again.
Entering and Viewing Comments
Comments can, for example, document the steps you have taken to resolve the alarm. You can enter your
own comments or choose predefined comments set up in the "Operation/Alarms/Comments" screen.
If you are using the default appearance of the Alarms screen, you can enter and choose new comments
and review existing comments using the Alarms Acknowledgement screen, which you can display by
double-clicking the alarm. For further information, please refer to the help for the Acknowledge Alarm
screen.

8
Symmetry Software Reference Manual

If you are using the combined alarm/acknowledgement appearance, you can enter new comments and
review existing comments directly in the Alarms screen. In this case:
 Click Select Standard Comment to add a predefined comment (as configured in the
"Operation/Alarms/Comments" screen) at the cursor position. You can use the button
several times to add more than one comment. Alternatively, type comments directly into the
Comments box.
 It is mandatory to select or enter a comment before you can acknowledge or clear an alarm
if Alarm Comments Mandatory is selected in the "Maintenance/User & Preferences/Client
Preferences" screen.
 The system makes available comments belonging to the company that owns the device that
is in alarm, or if the alarm is not related to a company, all comments belonging to all
companies.
 You can use the right-click menu to cut, copy and paste text.
The Previous Comments panel displays any previous comments you may have entered for the alarm.
Each comment is preceded by the name of the user who entered the comment, and the date and time the
comment was added.
You may see the following comment:
Client: failed to acknowledge alarm within <X> minutes
Alarm Escalated to Client: <PC Name><Time and Date>
This indicates that the alarm was not acknowledged within a specified period of time, and therefore was
redirected to the named client PC (<PC Name>). This feature is set up in the "Operation/Alarms/Routing"
screen.
You can use the button to display the comments in a separate window. This window provides a Zoom
option. The window retains its size, location and zoom state when you close it, so that it appears the same
if you open it again.
Workflow Triggers
Opening, acknowledging or clearing an alarm can start a workflow, as set up in the
"Setup/Workflow/Workflow Designer" screen.
Alarm Icons
You may see the following icons in the left-hand column:
- This indicates that the alarm has a tagged video clip created using a Record Video command.
You can replay the clip by selecting Replay.
- This is displayed for card-related alarms and indicates that you can click the Image button to
display the card holder's image, if available. The card holder's image is retrieved from the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.

- This is displayed if the device that is in alarm has associated cameras. You can right-click and
choose Associated Live Video or Associated Playback Video to view live or recorded video
associated with the device. For further information, please refer to refer to "About Camera Views and
Camera Device Associations".
Alarm Statistics and History
If the default appearance is used, the Alarms screen is able to display statistics about outstanding alarms,
including pie and bar charts. The statistics are displayed if both Enable Alarm Statistics is displayed in
the "Maintenance/User & Preferences/System Preferences" screen, and Display Alarm Statistics is
selected in the "Maintenance/User & Preferences/Client Preferences" screen.
You can change the viewing angle and size of each chart by clicking on the image and moving the mouse.
Note the following points:

9
Alarms ("Home/Monitoring/Alarms")

 Alarms received since last reset shows the number of new alarms displayed in the Alarms
screen since Reset Alarm Statistics in the "Maintenance/User & Preferences/Client
Preferences" screen was last used.
 Apart from Alarms received Today and Alarms received since last reset, the statistics
displayed reflect the alarms displayed in the currently selected alarm filter tab.
 The pie chart includes all alarms displayed in the tab. Oldest Alarm Outstanding and
Newest Alarm Outstanding apply only to unacknowledged alarms.
About Alarm Filters
Filters can be set up using the "Setup/Configuration/Activity Filters" screen, which is also accessible by
clicking Filters in the "Home/Monitoring/Alarms" screen. Activity filters enable you to choose the types of
alarm to display. For further information, please refer to the help for the Activity Filters screen.
If an Alarm filter is selected using the Role Filters button in the "Maintenance/User & Preferences/Roles"
screen, an alarm can appear (for a user who has the role) only if it passes the filter rules. The message
"Warning role filters are applied" appears near the top of the Alarms screen if a role filter is active. For
further information, please refer to the help for the Roles screen.
Alarms Routed to this Computer
This computer can receive alarms from one or more companies. The "Operation/Alarms/Routing" screen
specifies the alarms that are routed to this computer. The alarms may be routed to different computers
depending, for example, on the time of day or day of the week.
If you are using the screen from an RDS/Citrix Client, the screen displays all alarms that belong to a
company in the your company group.
Alarms Imported from Third-Party Systems
Alarms can be automatically imported into the Symmetry database from third-party systems. These alarms
are automatically displayed in the "Home/Monitoring/Alarms" screen and can be listed in Activity reports
("Reports/History/Activity" screen) by selecting the Uncategorised checkbox in System Activity. For
further information, please refer to the Data Connect Manual.
Right-Click Menu
Options such as Print and Graphic are accessible from the right-click menu. You can use the right-click
Data option to choose the columns to display, and the Configure option to change the column order. The
Default Sort Order option applies the default sort order (see "Alarm Order" above).
Associated Live Video and Associated Playback Video are available if the alarm is from a device that
has associated cameras. You can use these options to display live or recorded video from the cameras.
For further information, please refer to "About Camera Views and Camera Device Associations".
Masked Alarms Tab
A Masked Alarms tab is displayed if the Show Masked Alarms privilege is set in your user role
("Maintenance/User & Preferences/Roles" screen). The tab allows you to view any alarms that have been
masked.
Please refer to Masking Alarms for further information.
What do the alarm messages mean ("WHAT" column)?
See Alarm/Event Messages for details of each message.
What does a RED alarm mean and what do I do?
If the alarm or the block on the left is displayed in RED, this indicates a new alarm. Acknowledge the alarm as
follows to indicate that you have seen and understood the alarm:
 If you are using the default appearance for the Alarms screen, select the alarm and click OK, or
simply double-click the alarm. This displays the Acknowledge Alarm screen, which may contain
instructions on how to handle the alarm.

10
Symmetry Software Reference Manual

 If you are using the combined alarm/acknowledgement appearance, simply select the alarm and
click Acknowledge. Instructions on how to handle the alarm may be displayed in the Alarm
Instruction box.
When Highlight Unacknowledged Alarms on Reset is selected in the "Maintenance/User &
Preferences/System Preferences" screen, the colored blocks for alarms that are unacknowledged but have
been reset are displayed half grayed-out:

What does a BLUE alarm mean and what do I do?


If the alarm or the block on the left is displayed in BLUE, this indicates that you have acknowledged and hence
understood the alarm, but the physical device has not reset. For example, a window that has a monitor point
has not been closed. You need to reset the device (i.e. close the window).
Some alarms do not have a blue status (for example, a "Wrong PIN" alarm).
What does a GREEN alarm mean and what do I do?
If the alarm or the block on the left is displayed in GREEN, this indicates that you have acknowledged the alarm
and if necessary reset it, but have not yet cleared it from the screen. You can clear the alarm as follows:
 If you are using the default appearance for the Alarms screen, select the alarm and click OK, or
simply double-click the alarm. This displays the Acknowledge Alarm screen, which contains a
Clear button to clear the alarm.
 If you are using the combined alarm/acknowledgement appearance, simply select the alarm and
click Clear.

Buttons
Icon (combined Name Meaning
appearance) (default
appearance)
N/A Mask This button is available if the Allow Alarm Masking privilege is set in your
user role ("Maintenance/User & Preferences/Roles" screen) and you are
viewing the All Alarms tab.
You can use the button to mask a selected alarm.
Please refer to Masking Alarms for further information.
N/A Clear Mask This button is available if the Show Masked Alarms privilege is set in your
user role ("Maintenance/User & Preferences/Roles" screen) and you are
viewing the Masked Alarms tab.
You can use the button to clear the mask from a selected alarm.
Please refer to Masking Alarms for further information.
Select Selecting this button displays a screen that allows you to choose the filters to
Filters use in the Alarms screen. Each filter selected creates a new tab that displays
only the alarms that pass the rules of the filter
You can choose activity filters and filters automatically created for active
maintenance zones.
Filters Selecting the button displays the Activity Filters screen, which you can use to
define activity filters for the Alarms, Activity and Virtual Matrix screens.
Print Prints the currently-selected alarms and their details to the Windows default
printer.
Graphic This button displays the highlighted alarm on a graphic. Normally, the graphic
is a plan of the building, and can be used to quickly identify the location of the
alarm.
Card This button is enabled if the selected alarm/event was caused by a person
whose card is known to the system. The button displays the following:
a) With Only Show Badge from Alarm selected in the "Maintenance/User &
Preferences/Accounts" screen - The card's badge preview is displayed.

11
Alarms ("Home/Monitoring/Alarms")

b) With Only Show Badge from Alarm not selected - The card details are
displayed.
Replay This button is enabled if the selected alarm/event has a tagged video clip
created using a Record Video command. Click the button to replay the clip.
Freeze The button text toggles between Freeze and Resume. If you choose Freeze,
Resume no new alarms are added to the Alarms screen, although the New count at
the bottom of the screen is still incremented. Choosing Resume causes the
screen to display new alarms, including any that were queued by Freeze.
Image This button is available if you have selected a card-related alarm. Clicking the
button displays the person's image, as selected in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.
N/A This button is enabled if a Call Request alarm has been generated from an
intercom connected to a Stentofon Alphacom Intercom System. You can use
Connect to make an audio link between your intercom and the intercom
making the call request.
When you select Connect, the button changes to Disconnect, which allows
you to disconnect the link. The link is automatically disconnected when you
close the Acknowledge Alarms screen.
The button is grayed out if the alarm is already being viewed in the
Acknowledge Alarm screen at another client.
For an overview of installing and using the Intercom Management software,
please refer to the Intercom Management Installation and User Guide.
N/A You can use this button to add a predefined comment, as set up in the
"Operation/Alarms/Comments" screen. You can use the button several times
to add more than one comment. Alternatively, type comments directly into the
box.
It is mandatory to select or enter a comment before you can acknowledge or
clear an alarm if Alarm Comments Mandatory is selected in the
"Maintenance/User & Preferences/Client Preferences" screen.
The system makes available comments belonging to the company that owns
the device that is in alarm, or if the alarm is not related to a company, all
comments belonging to all companies.
N/A Clicking the Command button causes the system to execute the command
associated with the selected alarm (as set up in the Alarm Commands
screen).
The command may, for example, cause the CCTV camera image at the alarm
location to be displayed on a CCTV monitor.
The Command button is grayed if the alarm has no command set up in the
Alarm Commands screen. The button is also grayed out if the alarm is a dial-
in alarm.
Clear N/A Clears the selected alarm (not available for task alarms). If you attempt to
clear an alarm that belongs to an alarm type categorized as "Acknowledge
Only" in the Alarm Processing screen, a message prompts you that you do
not have permission to clear the alarm.
If you select one alarm, clicking Clear will clear that alarm. If you click in white
space (so that no alarm is highlighted), right-clicking Clear allows all
displayed alarms to be cleared if you have permission to clear all alarms (as
specified in the "Maintenance/User & Preferences/Accounts" screen). After
selecting Clear from the right-click menu, enter a comment that indicates why
you are clearing the alarms. The message is stored in the log with the date
and time of execution.
To clear alarms that need a reset, the user's role requires Assign System
Admin Privileges to be set in the "Maintenance/User & Preferences/Roles"
screen.
If Auto Clear Alarm on Reset is selected in the "Maintenance/User &

12
Symmetry Software Reference Manual

Preferences/System Preferences" screen, an alarm that requires a reset can


clear automatically after you have attempted to clear it manually. For
further information, please refer to "Auto Clear Alarm on Reset". If you have
System Admin privileges, you can clear all alarms, irrespective of whether the
devices they relate to (such as monitor points) need to be reset.
N/A Clear The Clear button/option enables one or more alarms to be cleared, and is
displayed only if you have System Admin privileges (as specified in the
"Maintenance/User & Preferences/Roles" screen) or have permission to clear
all alarms (as specified in the "Maintenance/User & Preferences/Accounts"
screen). The button/option is not available when there are no alarms.
To clear alarms that need a reset, the user's role requires Assign System
Admin Privileges to be set in the "Maintenance/User & Preferences/Roles"
screen.
If you select one alarm, clicking Clear will clear that alarm. If you click in white
space (so that no alarm is highlighted), clicking Clear allows all displayed
alarms to be cleared. If Enable Multiple Alarms Selection is set in the
"Maintenance/User & Preferences/Client Preferences" screen and you select
multiple alarms, clicking Clear clears those selected alarms.
If Auto Clear Alarm on Reset is selected in the "Maintenance/User &
Preferences/System Preferences" screen, an alarm that requires a reset can
clear automatically after you have attempted to clear it manually. For
further information, please refer to "Auto Clear Alarm on Reset". If you have
System Admin privileges, you can clear all alarms, irrespective of whether the
devices they relate to (such as monitor points) need to be reset.
After selecting Clear, use the displayed dialog to enter a comment that
indicates why you are clearing the alarms. You can choose one or more
predefined comments or type comments directly into the dialog. Comments
are stored in the log with the date and time of execution.
On a networked system, only the alarms displayed at the client that you are
logged on at are cleared. To clear the alarms on other clients, you need to log
on to each in turn.
N/A Open If you have selected a single alarm, selecting Open displays the alarm's
Acknowledge Alarm screen, where you can acknowledge or clear the alarm.
If you have selected multiple alarms (available only if Enable Multiple Alarm
Selection is selected in the "Maintenance/User & Preferences/Client
Preferences" screen), the Acknowledge Multiple Alarms screen is displayed,
which enables you to acknowledge or clear all the selected alarms in one
operation.
N/A Close This option takes you out of the screen. You will not lose any data.
Acknowledge N/A Acknowledges the selected alarm (not available for task alarms).
Started N/A Starts the selected task.
Complete N/A Completes the selected task. The task alarm is removed from the Alarms
screen.

Current Activity ("Home/Monitoring/Activity" or "Home/Video &


Audio/Virtual Matrix")

General
Overview of this screen
This screen enables you to view system activity. That is, details of any alarms, events and system messages as
they occur, including access-control transactions. The last 1000 transactions are displayed.

13
Current Activity ("Home/Monitoring/Activity" or "Home/Video & Audio/Virtual Matrix")

The screen is available only at nominated client PCs, as set up by the installer using the
"Install/System/Clients" screen.
The screen displays:
 What - The alarm message. If Show Card Number with Alarm/Event is selected in the
"Maintenance/User & Preferences/System Preferences" screen, the person's card number (if
known) is displayed in square brackets after the alarm/event message.
 Where - The location of the alarm.
 Who - The person who caused the alarm, if known.
 Time and Date - The time and date the alarm occurred. Seconds are shown if Show Seconds for
Transactions is selected in the "Maintenance/User & Preferences/Client Preferences" screen.
You can click the above headings to change the order of the transactions displayed.
The default color for alarms is red. However, the color can be customized for alarms from selected devices.
This is set up in the "Operation/Alarms/Definitions" screen.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, the
screen displays only activity for the currently-selected company. If Filter by Company is not selected and
ActivityByCompanyGroup=1 in the ini file, the screen displays activity from all companies in your company
group. If Filter by Company is not selected and ActivityByCompanyGroup=0 in the ini file, the screen displays
activity from all companies in any company group.
Right-click menu
Options such as History and Freeze are accessible from the right-click menu. You can use the right-click Data
option to choose the columns to display, and the Configure option to change the column order.
A Show/Hide Inline Filtering option enables you to show or hide in-line filtering fields. When shown, a field
appears near the top of each column. Typing text into a field filters the report according to the text you enter.
You can clear the text by clicking the icon to the right of the field.
You can use Add Activity Comments to add comments to the alarm/event.
Associated Live Video and Associated Playback Video are available if the alarm\event is from a device that
has associated cameras. You can use these options to display live or recorded video from the cameras. For
further information, please refer to "About Camera Views and Camera Device Associations".
Alarm\event icons
You may see the following icon in the left-hand column:
- This is displayed if the alarm\event is from a device that has associated cameras. You can right-click
and choose Associated Live Video or Associated Playback Video to view live or recorded video
associated with the device. For further information, please refer to refer to "About Camera Views and
Camera Device Associations".
What do the alarm messages mean?
See Alarm/Event Messages for details of each message.
Adding comments to an alarm\event
Double-clicking an alarm\event message displays the Add Comment screen, which allows you to record
comments against the transaction.

About the Options


Display Card Holder Image
This option is available in the "Home/Monitoring/Activity" screen. Selecting the option causes the screen to
display the image of any card holder or visitor who carries out a transaction (as set up in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen). The images are displayed in a list on the left
side of the screen, with the image associated with the most recent transaction at the top. A person's image is
not shown more than once in the list.

14
Symmetry Software Reference Manual

By default, the screen displays up to 5 images. This can be increased using the No of Card Holder Activity
Images option in the "Maintenance/User & Preferences/System Preferences" screen.
Selecting an image automatically selects the associated card transaction and freezes the activity on the screen
(click Resume to unfreeze). Selecting a transaction displays the associated image at the top of the image list.
Activity type
You can choose to display only activity of a selected type. Selecting a filter clears the screen before displaying
new activity.
Filter
This lists all filters defined in the Activity Filters screen and for all active maintenance zones. Selecting a filter
causes the screen to display only alarms and events that pass the rules defined in the selected filter.
Your user role must include permissions to the "Maintenance/Maintenance Zones/Maintenance Zones" screen
for the menu to include any maintenance zones.
If you select None, the screen displays all activity except activity from nodes in an active maintenance zone.
You can view activity from a maintenance zone by selecting the appropriate maintenance zone filter in this
menu.

If an Activity filter is selected using the Role Filters button in the "Maintenance/User & Preferences/Roles"
screen, an alarm or event can appear (for a user who has the role) only if it passes the filter rules. The
message "Warning role filters are applied" appears near the top of the Activity screen if a role filter is active. For
further information, please refer to the help for the Roles screen.

Region
This is available only at the head office of a Symmetry Global Edition system. You can choose whether to
display all activity, or only activity from selected sources, such as from all regions or a selected region.
For further information about Global Edition, please refer to the Global Edition Installation and User Guide.
History
Displays the Activity History screen, which you can use to view, on a by-day basis, all alarms and events stored
in the log.
Card
This button is enabled if the selected alarm/event was caused by a person whose card is known to the system.
Click the button to display the card details in the "Home/Identity/Visitors" or "Home/Identity/Card Holders"
screen.
Freeze/Resume
Freeze prevents any further messages from being displayed in the screen. Clicking Resume displays any
messages that were waiting to be displayed, and any other messages as they arrive.
Clear
Clears the screen.
Filters
Selecting the button displays the Activity Filters screen, which you can use to define activity filters for the
Alarms, Activity and Virtual Matrix screens.

15
Graphics Screen ("Home/Monitoring/Graphics")

Graphics Screen ("Home/Monitoring/Graphics")

General
Overview of this screen
The Graphics screen provides a graphical method of controlling and monitoring Symmetry. The screen contains
a number of icons, each of which represents a particular device, group of devices or a feature of the system
you can change.
Using the Graphics screen, you can:
 Acknowledge alarms
Acknowledging an alarm indicates that you have understood its meaning and have reacted to it.
 Determine the current status of devices
You can, for example, determine whether a reader is currently in card-and-PIN mode, whether a door is
open or closed, or whether an auxiliary output device is currently on or off. Selecting an icon displays
the status of the device at the top of the screen. The color of the border around the icon also indicates
the status of the device. Refer to the help for the Command Center if you need information about the
meaning of the displayed status.
 View live video
Right-click on a camera or camera group icon and select Live Video, or simply double-click.
For a digital video camera, you can drag and drop the camera icon into a cell of the "Home/ Video &
Audio/Virtual Matrix" screen.
Show live video from graphics in in the "Maintenance/User & Preferences/Client Preferences"
screen determines whether the live video is displayed in the Virtual Matrix or in its own window.
 Control devices
By right-clicking the icon and choosing a command you can, for example, switch readers into different
modes, lock/unlock doors, connect to intercoms, switch CCTV cameras to monitors, control CCTV
ancillary devices, view live video images, control access to elevator floors and switch auxiliary output
devices.
A predefined command can be sent only by users who have one of the user roles selected in the
predefined command definition ("Operation/Commands/Predefined" screen).
 Change the current threat level
To change the threat level, you right-click on the icon and select Change Threat Level. The icon
changes the threat level to the level selected in the "Setup/Graphics/Setup" screen.
If you dwell the pointer over a device icon, the name of the device is displayed next to the pointer.
You can zoom in and out of a graphic using the toolbar buttons.
A graphic can contain links to other graphics. To display a "sub-graphic", click on the link in the graphic
displayed, or use the Graphic Browser on the left side of the screen.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, the
graphic displays only those icons that are for devices belonging to the currently-selected company. If Filter by
Company is not selected, the graphic displays icons for devices belonging to any company in your company
group.

Note: The "Maintenance/User & Preferences/Roles" screen can be used to prevent commands from being sent
to specified device types, and the status of specified devices from being reported.

Displaying the Graphics screen


There are four methods of displaying the Graphics screen:

16
Symmetry Software Reference Manual

1. You can select an alarm in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen,
then the Graphic option. If the graphic is a plan of the building, this method can enable the operator to
locate the alarm very quickly.
If the alarm has not been acknowledged, either the highest-level or lowest-level graphic that contains the
device is displayed, depending on the setting of Display Lowest Graphic Level in the "Maintenance/User
& Preferences/Client Preferences" screen. If the highest-level graphic is displayed, the link to the sub-
graphic that contains the device flashes with a red border. If the alarm has already been acknowledged,
the graphic that contains the device is displayed.
2. You can use the Graphics option in the "Home/Monitoring" menu to display a graphic manually. You may
want to use this method to view or change the status of a device (for example, to unlock a door).
3. You can select Auto Show Graphic on any Alarm in the "Maintenance/User & Preferences/Client
Preferences" screen or Auto Show Graphic on Alarm in the "Operation/Alarms/Definitions" screen. When an
alarm occurs, the graphic that contains the device is automatically displayed in the Graphics screen, providing the
"Home/Monitoring/Alarms" screen is not open. If the "Home/Monitoring/Alarms" screen is open, the software
assumes that the user would prefer to continue to use this screen. If Auto Show Graphic on any Alarm is used,
the highest-level or lowest-level graphic that contains the device is displayed, depending on Display Lowest
Graphic Level in the "Maintenance/User & Preferences/Client Preferences" screen.
4. You can select Auto Display Graphic On Call Request in the "Maintenance/User & Preferences/Client
Preferences" screen. When an intercom call request occurs, either the highest-level or lowest-level graphic that
contains the intercom is displayed automatically in the Graphics screen (depending on Display Lowest Graphic
Level), providing the "Home/Video & Audio/Intercom Control" screen is not open.
About the icons
Click here for the meaning of each icon.
Icon borders
The color of the border of an icon indicates the status of the device. The following general color scheme is
used. Icons for intercom systems, intrusion zones, intrusion zone groups and intrusion areas use different
colors - click here for details.
 Red (flashing or steady) - Device is in alarm and the alarm has not been acknowledged.
 Half red (flashing or steady) - The device alarm has not been acknowledged, but the device has
been reset. This color is used only if Highlight Unacknowledged Alarms on Reset is selected in
the "Maintenance/User & Preferences/System Preferences" screen.
 Blue (flashing or steady) - The device alarm has been acknowledged, but the device has not been
reset.
 Green (flashing or steady) - The device alarm has been acknowledged and reset, but not cleared.
 Green (when icon selected) - The device is in its normal state.
 Yellow (when icon selected) - The device is disabled.
 Gray or Mauve (when icon selected) - Icon selected.
If you have accessed the Graphics screen from the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen, or the graphic is displayed automatically on an alarm, the border of the icon flashes for devices
in an alarm state. If you have accessed the Graphics screen from "Home/Monitoring/Graphics", the borders of
devices already in alarm do not flash.
The name of the selected device and its status are displayed at the top of the screen.
Right-click commands
Depending on the device type, right-clicking an icon may display a list of commands that you can send to the
device.
Associated Live Video and Associated Playback Video are available if the device has associated cameras.
You can use these options to display live or recorded video from the cameras. For further information, please
refer to "About Camera Views and Camera Device Associations".
Click here for a description of other general commands.

17
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")

About the toolbar buttons


The Graphics screen displays the following toolbar buttons:
Displays/hides the Graphic Browser, where you can
choose the graphic to display.
Enables you to select an icon or link.

Zooms into the graphic.

Zooms out of the graphic.

Zooms in/out to fit the graphic into the available


screen area.
Displays the previous graphic in the sequence of
graphics you have viewed.
Displays the next graphic in the sequence of graphics
you have viewed.
Browsing hierarchical graphics
A graphic can contain links to other graphics. For example, a top-level site plan may contain a link for each
building shown on the graphic. Each link could be used to show a more detailed plan of the relevant building.
Further levels may have been added to provide links from the building plans to floor or zone plans.
You can display these "sub-graphics" either by clicking on the appropriate link in the displayed graphic or by
choosing the sub-graphic using the Explorer-style Graphic Browser on the left side of the screen.
If a graphic name has a "+" to its left, the graphic contains "sub-graphics". Double-click on the graphic name, or
click the "+", to display the names of the sub-graphics.
The Graphic Browser can be displayed or hidden using the Graphic Browser toolbar button.
Installing and setting up graphics
Graphics are installed using the "Setup/Graphics/Add" screen. This screen can import graphics defined in
Windows bitmap, Windows metafile, AutoCAD DXF (partial implementation) and JPEG formats.
Once the graphics have been installed, the "Setup/Graphics/Setup" screen is used to specify, using icons, the
positions of devices and other items on the graphics.
The "Setup/Graphics/Setup" screen is also used to specify links from one graphic to others to define the
graphic hierarchy.

About the Options


Acknowledge
This button enables you to acknowledge an alarm at the selected device. Double-clicking the device icon has
the same effect.

Command Center Screen (Graphical) ("Home/Monitoring/Command


Center")

General
Overview of this screen
You can use this screen to:

18
Symmetry Software Reference Manual

 Send manual commands to perform actions such as to unlock a selected door, make a video
recording or start a patrol tour.
To send a command, select the relevant item (for example, reader) in the tree view, choose the command
in the Available Commands area, then click Send.
 Determine the current status of any item in the tree view. For example, you can determine whether a
reader is in card-only or card-and-PIN mode, or the current enabled/disabled status of a monitor
point.
To determine the status of an item, click "+" next to the item at the lowest level in the tree view. Note that
you can also view the status of devices by using the "Home/Monitoring/Graphics" screen.
The screen automatically displays any change in status of devices. However, in cases where devices are
located at different remote sites but use the same Symmetry dial-up modem, the status of only device can
be shown at a time. The same applies to devices that are located on different LAN chains but which
communicate with the same Symmetry network port.
"Timed out" is displayed if the Symmetry software cannot determine the status of a device (for example,
because a node is switched off).

Note: This screen is available by default (the non-graphical version is displayed if UseOldStatusScreen is set to
"1" in the ini file).
Note: The "Maintenance/User & Preferences/Roles" screen can be used to prevent commands from being sent
to specified device types, and the status of specified devices from being reported. The "Maintenance/User &
Preferences/Command Roles" screen specifies the commands available to each Symmetry user (through their
user role).

Selecting items in the tree view


You can send a command to more than one device in the tree view. To select more than one item, click the
mouse button and draw a selection box around the items. The Available Commands area displays only those
commands that are applicable to all the selected items.
You are able to select only those items that belong to the currently selected company.
Displaying the screen from the Intrusion Status toolbar
If you have displayed the Command Center by clicking a button in the Intrusion Status toolbar, the Command
Center filters the intrusion areas, zones, and other items according to the button clicked. For example, if you
have clicked the Areas Disarmed button, the Command Center displays only those areas that are have a
disarmed status.

Screen Options
Display
You can use the Display menu to select the type of item to list in the left side of the screen.
Filter
You can use the Filter field to filter the items listed in the left side of the screen. For example, entering "Front"
and clicking the Find button to the right of the field causes only those items that contain "Front" to be listed.
Leave the field empty if you do not want to apply a filter.
Status
Selecting an option from the Status menu causes the tree view to display only those items with the selected
status.
Note: Devices such as readers, monitor points and outputs must have been previously opened in the tree for
them to be displayed by the filter.

19
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")

Devices
The Devices tree view contains a list of all the items that you can query the status of or send a command to.
The content of the tree view is dependent on the settings made for Display, Filter and Status.
Sending a command to a group (for example, reader group) sends the selected command to all devices in the
group.
Please refer to "Device Status" (below) for details of device status.
Available Commands
The box on the right-hand side of the screen displays the commands that you can send to the device(s) you
have selected in the tree view.
Click here for a description of each command.
Options
This area may display additional options, depending on the command selected in the Available Commands
area.
Send
Clicking Send sends the selected command to the selected device(s). The button flashes to indicate that the
command has been sent.

Right-Click Options
Expand
Displays the contents or status of the selected item(s) in the tree view (same as clicking "+").
Collapse
Hides the contents or status of the selected item(s) in the tree view (same as clicking "-").
Request Status
Use this right-click option on items in the tree view to obtain the status of devices. For example, you can use
the option to obtain the status of:
 All devices belonging to a selected device type (for example, Readers).
 All devices belonging to a selected group (for example, Reader Group 1).
 A range of selected items in the tree.
Cancel Status
Use this right-click option to hide the status of selected devices (performs the reverse action to Request
Status).

Device Status
Auxiliary output status
Enabled
This indicates that the auxiliary output is functioning correctly.
Output On/Off
Output On - The auxiliary output is on.
Output Off - The auxiliary output is off.
Pulse Time
This shows the length of time the auxiliary output stays in the on state when a pulse command is sent to it.
The value is specified in the definition of the auxiliary output in the "Install/Access Control/Auxiliary Output"
screen.

20
Symmetry Software Reference Manual

Digital Video Camera status


Depending on the type of camera, the following status information is available:
 Video Signal Loss or Video Signal OK
 Recording INACTIVE/Active - Indicates whether video from the camera is currently being recorded.
If recording is in progress, the destination of the recorded video is given.
 Streaming to - Indicates that live video is currently being transferred to a Symmetry NVR.
 Maximum Bandwidth - Shows the maximum network bandwidth used by the camera. The statistics
enable you to determine whether the camera is having an adverse effect on network
communications.
 Connected to - Displays the name of the video server.
 Oldest Standard Recording - Displays the age of the oldest standard recording for the camera on
the video server.
 Oldest Tagged Recording - Displays the age of the oldest tagged recording for the camera on the
video server.
 Picture Refresh - Displays the frame rate used by the camera.
 Picture Size - Displays the resolution used by the camera.
 Picture LossorPicture OK
 Latest Video Date - Gives the date and time of the last video clip recorded.
 Motion Detection Enabled or Motion Detection Disabled - Indicates whether motion detection is
enabled or disabled.
Elevator floor status
Secure Access/Free Access
Secure Access - Indicates that the elevator floor button can only be operated as a result of a valid access-
control transaction.
Free Access - Indicates that anyone can operate the elevator floor button. No access-control transaction
is required to use the floor button.
What is a floor group?
Time To Select A Floor
If a Grant Access command is sent to a floor, people are given free access to operate the elevator floor
button for a limited period of time, as shown by Time To Select A Floor. The length of time is specified by
the installer.
Intrusion panel, area, zone group, zone and output status
Status information is provided for M2150 intrusion systems and those supported by the Full Intrusion
Management interface. The following is a list of the possible status values. The meaning of most are self-
explanatory.
Panel
Offline - The Symmetry software cannot communicate with the intrusion system.
Panel Normal
Panel Fault - Click here for details.
Area
Two status values are provided. The first can be:
Area Normal
Area In Alarm
Area Has Problems - A fault, tamper or alarm condition exists.
Offline - The Symmetry software cannot communicate with the intrusion system.

21
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")

The second status value can be:


Area Disarmed
Area Armed
Area Armed with Reduced Security - Click here for details.
Area Part Armed A [Siemens (Vanderbilt) only]
Area Part Armed B [Siemens (Vanderbilt) only]
Zone group
Two status values are provided. The first can be:
Offline - The Symmetry software cannot communicate with the intrusion system.
Zone Group Disarmed
Zone Group Armed
Zone Group Armed with Reduced Security - Click here for details.
The second status value can be:
Zone Group Normal
Zone Group In Alarm
Zone Group Has Problems - A fault, tamper or alarm condition exists.
Zone
Three status values are provided. The first can be:
Zone Normal
Zone In Alarm
Zone In Fault - Click here for details.
Zone In Tamper - Click here for details.
Offline - The Symmetry software cannot communicate with the intrusion system.
The second status value can be:
Zone Enabled
Zone Disabled - Click here for details.
Zone Bypassed
Zone Force Armed - Click here for details.
A third status value is shown for HiSec and Siemens (Vanderbilt) systems. For HiSec systems, the third
value shows zones as armed/disarmed. For Siemens (Vanderbilt) systems, the third status value can be
one of the following (please refer to the Siemens (Vanderbilt) documentation for meanings):
Zone Closed
Zone Disconnected
Zone Masked
Zone Open
Zone Short
DC Sub (DC Substitution)
Sensor Missing
Pulse Count
Gross Attack
Out Of Bounds
Unstable
Output
Offline - The Symmetry software cannot communicate with the intrusion system.

22
Symmetry Software Reference Manual

Output On
Output Off
Note: For a Siemens (Vanderbilt) panel, Symmetry cannot determine the status of an output unless the
change of status has been activated from Symmetry.
Monitor point status
Enabled/Disabled
Enabled - The monitor point operates normally.
Disabled - The monitor point is effectively ignored, with the exception of cable faults.
Normal State/Alarm State/Cable Fault/Tamper
Normal State - This indicates that the monitor point's cable or alarm is not in one of the above states.
When the above messages are alarms (rather than events), they cannot be cleared until the cable is
repaired, or the monitor point or tamper switchis reset.
Alarm State - Indicates that the monitor point has been triggered; for example, a window has been opened
without authority.
Cable Fault Open - The wires to the monitor point have been open-circuited. This status is generated only
for monitor points that have three-state, four-state or six-state supervision (as set up by the installer).
Cable Fault Short - The wires to the monitor point have been short-circuited. This status is generated only
for monitor points that have three-state, four-state or six-state supervision (as set up by the installer).
Tamper Alarm - Indicates that the monitor point tamper switch has been triggered.
Tamper and Point in Alarm - Indicates that the monitor point tamper switch has been triggered and that
the monitor point has been triggered.
Patrol tour status
Started/Held/Completed/Reset/Running
Started - The tour has been started, but the guard has not yet arrived at the first tour point.
Held - The tour has been temporarily halted by a Patrol Hold command. The patrol tour will resume
automatically when the guard clocks at the next tour point.
Completed - The tour has been completed.
Reset - The Patrol Reset command was used. This may mean that the patrol tour was abandoned or that
the "Home/Monitoring/Command Center" screen was used to acknowledge that the patrol tour was
completed.
Running - The patrol has started and the guard has been to at least one of the tour points.
Last Point Clocked
Last Point Clocked displays the name of the reader or monitor point at which the guard last clocked
during the patrol tour.
Reader Status

Note: Third-party devices may display information other than that shown below. If required, please refer to the
manufacturer's documentation.

Enabled/Disabled
Enabled - The reader is enabled and can operate normally.
Disabled - The reader is disabled. The reader will not be able to read cards or numbers entered on its
keypad (if fitted).
Card Only/Card+PIN/No Reader/Customer Code Only
Card Only - The reader is in card-only mode; that is, there is no need to enter a PIN.

23
Command Center Screen (Graphical) ("Home/Monitoring/Command Center")

Card+PIN - The reader is in card-and-pin mode; that is, the person must enter a PIN after presenting the
card. Executive card holders, as set up in the "Home/Identity/Card Holders" screen, do not have to enter a
PIN. The reader is always in either the Card Only or Card+PIN states, even if the reader is disabled.
(However, the reader can only read cards and PINs when it is enabled.)
No Reader - Communications cannot be established with the reader (for example, it is not connected).
Customer Code Only - The reader will allow access to any card that has a customer code that is the
same as one of the customer codes stored in the reader's node. The transactions are stored in the log.
Click here for further information.

Note: A reader can be switched out of customer-code-only mode by issuing a Card Only or Card+PIN
command.

Customer Code Only - No Store is the same as Customer Code Only, except that each transaction is
not recorded in the log.
Keycard On/Off, with status of In/Out
Keycard On - The reader is operating in keycard mode, which enables a keycard holder or command to
switch the reader between keycard-in and keycard-out states (access rights permitting). A card holder
switches keycard states by presenting the card, followed by PIN with the first and last two digits swapped.
For example, this being 3412 for a PIN of 1234, or 78345612 for a PIN of 12345678. When a reader is in
keycard-out state, all cards except keycards are denied access, irrespective of access rights. When a card
reader is in keycard-in state, normal operation is resumed. Keycard mode can be useful if, for example, the
door is the point of entry for switching a burglar alarm off, and only a few people know how to switch the
alarm off. A card holder can be made a keycard holder by using the "Home/Identity/Card Holders" screen.
Keycard Off - The reader is not operating in keycard mode.
In/Out - The keycard status is either In (the reader is in keycard-in state) or Out (the reader is in keycard-
out state). The reader is always in either the In or Out status, even if keycard mode is off or if the reader is
disabled. (However, the reader can only operate as a keycard reader when keycard mode is on and the
reader is enabled.)
Card Command On/Off
Card Command On - The reader is able to issue card commands.
Card Command Off - The reader is unable to issue card commands.
About Card Commands
User Code On/Off, with status of Code Only/Code+PIN
User Code On - The reader is in user-code mode. In this mode, instead of presenting a card, a person can
gain access by pressing the # key, entering the card number, then pressing the * key.
User Code Off - The reader is not operating in user-code mode.
Code+PIN/Code Only - The user code status is either Code+PIN (people have to enter their PIN after the
card number) or Code Only (a reader does not need a PIN as well as a card number in user-code mode).
The reader is always in either the Code+PIN and Code Only state, even if user-code mode is off or the
reader is disabled. (However, the reader can only read cards and PINs when it is enabled.)
The Code+PIN and Code Only states are completely independent of the Card Only and Card+PIN states.
For example, a reader can be set for both Code Only and Card+PIN. In this case, when the person
presents the card, a PIN has to be entered, but if user-code mode is on, the person can enter the card
number without a PIN.
PC Door Control On/Off
PC Door ControlOn - In this mode, a guard must use the "Home/Identity/Verification" screen to grant or
deny access for each valid access-control transaction at the reader. Click here for further information.
PC Door Control Off - The reader is not in PC door control mode.

24
Symmetry Software Reference Manual

Door Monitor Open, Closed, Cable Fault Open or Cable Fault Short
Door Monitor - Open - The door controlled by the reader is physically open.
Door Monitor -Closed - The door controlled by the reader is physically closed.
Door Monitor -Cable FaultOpen - The wires that monitor the door's status have been open-circuited. This
state is generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Door Monitor -Cable FaultShort - The wires that monitor the door's status have been short-circuited. This
state is generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Door-Locked/Unlocked
Door - Locked - The door controlled by the reader is locked.
Door - Unlocked - The door controlled by the reader is unlocked.
Single Fingerprint, Two Fingerprints or Fingerprint Off
Single Fingerprint - The reader requires a single fingerprint during an access-control transaction, as set
up in the "Install/Access Control/Reader" screen, or by a command.
Two Fingerprints - Two different fingerprints are required.
Fingerprint Off - No fingerprints are required. In this mode, the reader can accept smart cards that do not
contain fingerprint data.

Command Center Screen (Non-Graphical)


("Home/Monitoring/Command Center")

General
Overview of this screen
This screen is available only if UseOldStatusScreen is set to "1" in the ini file.
You can use this screen to view or print the current status of one or more devices, groups of devices or patrols.
For example, you can view whether a card reader is currently in card-only mode or in card-and-pin mode. You
can also send commands to the items that you are viewing; for example, to change a reader's mode of
operation, or to start, halt or reset a patrol tour.
The screen responds dynamically to any change in the status of a device. That is, the displayed status of a
device can change while you are viewing the information.

Note: You cannot use this screen for cameras, camera groups or intrusion systems.

If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is deselected (the
default), you can find out the current status of any item that belongs to a company in your company group. If
Filter by Company is selected, you can find out the current status of any item that belongs to the currently
selected company.
You cannot select two or more devices that are located at different remote sites but use the same dial-up
modem. Similarly, you cannot select two or more devices that are located on different LAN chains if they
communicate with the same network port.

Selection Screen Options


Using the Selection screen
The Selection screen is displayed when you select Command Center from "Home/Monitoring". You can use
the Selection screen to select the devices you want to view in the Status screen.

25
Command Center Screen (Non-Graphical) ("Home/Monitoring/Command Center")

To use this screen:


1. Use Select Type to choose the type of item.

Note: You cannot use this screen for cameras or camera groups.

2. Click Find.
3. Highlight the devices you want to view.
Clicking All highlights all items listed. The All button is grayed out if the displayed list of devices includes
devices that are located at different remote sites but use the same dial-up modem.
Clicking Clear removes the highlighting from all items listed.
4. Click OK.
Click here for an overview of Selection screens and how to use them.

Definition Screen Options


Type Selected
This read-only field displays the type of item you selected from the Selection screen.
Select Status
This pull-down list enables you to filter the information displayed in the screen. For example, for readers, you
can choose to display the status of all readers, or only those whose door is closed, locked, open or unlocked.
Command
Click this button to send a command to the items you have highlighted.
Meaning of the commands
Print
Select this button to print all the information contained in the Status screen. If the screen contains enough
information to display a scroll bar, all information is printed, not just the amount that is currently displayed at the
current scroll position. The information is sent to the default Windows printer.
Close
This takes you out of the screen. You will not lose any data.

Device Status
Reader status
Mode/Status:
Enabled/Disabled
Enabled - The reader is enabled and can operate normally.
Disabled - The reader is disabled. The reader will not be able to read cards or numbers entered on
its keypad (if fitted).
with status of:Card Only/Card+PIN/No Reader/Storage/Customer Only
Card Only - The reader is in card-only mode; that is, there is no need to enter a PIN.
Card+PIN - The reader is in card-and-pin mode; that is, the person must enter a PIN after
presenting the card. Executive card holders, as set up in the "Home/Identity/Card Holders"
screen, do not have to enter a PIN. The reader is always in either the Card Only or Card+PIN
states, even if the reader is disabled. (However, the reader can only read cards and PINs
when it is enabled.)
No Reader - Communications cannot be established with the reader (for example, it is not
connected).

26
Symmetry Software Reference Manual

Storage - The reader will allow access to any card that has a customer code that is the same
as one of the customer codes stored in the reader's node. The transactions are stored in the
log. Click here for further information.
Note: A reader can be switched out of customer-code-only mode by issuing a Card Only or
Card+PIN command.
Customer Only is the same as Storage, except that each transaction is not recorded in the
log.
Keycard On/Off
Keycard On - The reader is operating in keycard mode, which enables a keycard holder or
command to switch the reader between keycard-in and keycard-out states (access rights permitting).
A card holder switches keycard states by presenting the card, followed by PIN with the first and last
two digits swapped. For example, this being 3412 for a PIN of 1234, or 78345612 for a PIN of
12345678. When a reader is in keycard-out state, all cards except keycards are denied access,
irrespective of access rights. When a card reader is in keycard-in state, normal operation is
resumed. Keycard mode can be useful if, for example, the door is the point of entry for switching a
burglar alarm off, and only a few people know how to switch the alarm off. A card holder can be
made a keycard holder by using the "Home/Identity/Card Holders" screen.
Keycard Off - The reader is not operating in keycard mode.
with status of:In/Out
In/Out - The keycard status is either In (the reader is in keycard-in state) or Out (the reader is
in keycard-out state). The reader is always in either the In or Out status, even if keycard mode
is off or if the reader is disabled. (However, the reader can only operate as a keycard reader
when keycard mode is on and the reader is enabled.)
Card Command On/Off
Card Command On - The reader is able to issue card commands.
Card Command Off - The reader is unable to issue card commands.
About Card Commands
User Code On/Off
User Code On - The reader is in user-code mode. In this mode, instead of presenting a card, a
person can gain access by pressing the # key, entering the card number, then pressing the * key.
User Code Off - The reader is not operating in user-code mode.
with status of:Code Only/Code+PIN
Code+PIN/Code Only - The user code status is either Code+PIN (people have to enter their
PIN after the card number) or Code Only (a reader does not need a PIN as well as a card
number in user-code mode).
The reader is always in either the Code+PIN and Code Only state, even if user-code mode is
off or the reader is disabled. (However, the reader can only read cards and PINs when it is
enabled.)
The Code+PIN and Code Only states are completely independent of the Card Only and
Card+PIN states. For example, a reader can be set for both Code Only and Card+PIN. In this
case, when the person presents the card, a PIN has to be entered, but if user-code mode is
on, the person can enter the card number without a PIN.
PC Door Control On/Off
PC Door ControlOn - In this mode, a guard must use the "Home/Identity/Verification" screen to
grant or deny access for each valid access-control transaction at the reader. Click here for further
information.
PC Door Control Off - The reader is not in PC door control mode.

27
Command Center Screen (Non-Graphical) ("Home/Monitoring/Command Center")

Timed Out
The Symmetry software cannot communicate with the device that the reader is connected to.
Single Fingerprint, Two Fingerprints or Fingerprint Off
Single Fingerprint - The reader requires a single fingerprint during an access-control transaction, as set
up in the "Install/Access Control/Reader" screen, or by a command.
Two Fingerprints - Two different fingerprints are required.
Fingerprint Off - No fingerprints are required. In this mode, the reader can accept smart cards that do not
contain fingerprint data.
Monitor:
Open, Closed, Cable Fault Open or Cable Fault Short
Open - The door controlled by the reader is physically open.
Closed - The door controlled by the reader is physically closed.
Cable FaultOpen - The wires that monitor the door's status have been open-circuited. This state is
generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Cable FaultShort - The wires that monitor the door's status have been short-circuited. This state is
generated only for door monitors that have three-state or four-state supervision (as set up by the
installer).
Lock:
Locked/Unlocked
Locked - The door controlled by the reader is locked.
Unlocked - The door controlled by the reader is unlocked.
Monitor point status
Mode:
Enabled/Disabled
Enabled - The monitor point operates normally.
Disabled - The monitor point is effectively ignored, with the exception of cable faults.
Timed Out
The Symmetry software cannot communicate with the device that the monitor point is connected to.
State:
Normal State/Alarm State/Cable Fault/Tamper
Normal State - This indicates that the monitor point's cable or alarm is not in one of the above
states. When the above messages are alarms (rather than events), they cannot be cleared until the
cable is repaired, or the monitor point or tamper switchis reset.
Alarm State - Indicates that the monitor point has been triggered; for example, a window has been
opened without authority.
Cable Fault Open - The wires to the monitor point have been open-circuited. This status is
generated only for monitor points that have three-state, four-state or six-state supervision (as set up
by the installer).
Cable Fault Short - The wires to the monitor point have been short-circuited. This status is
generated only for monitor points that have three-state, four-state or six-state supervision (as set up
by the installer).
Tamper Alarm - Indicates that the monitor point tamper switch has been triggered.
Tamper and Point in Alarm - Indicates that the monitor point tamper switch has been triggered and
that the monitor point has been triggered.

28
Symmetry Software Reference Manual

Auxiliary output status


Mode:
Output On/Off
Output On - The auxiliary output is on.
Output Off - The auxiliary output is off.
Timed Out
The Symmetry software cannot communicate with the device that the auxiliary output is connected
to.
State:
Pulse Time
This shows the length of time the auxiliary output stays in the on state when a pulse command is
sent to it. The value is specified in the definition of the auxiliary output in the Install/Access
Control/Auxiliary output screen.
Patrol tour status
State:
Started/Held/Completed/Reset/Running
Started - The tour has been started, but the guard has not yet arrived at the first tour point.
Held - The tour has been temporarily halted by a Patrol Hold command. The patrol tour will resume
automatically when the guard clocks at the next tour point.
Completed - The tour has been completed.
Reset - The Patrol Reset command was used. This may mean that the patrol tour was abandoned
or that the "Home/Monitoring/Command Center" screen was used to acknowledge that the patrol
tour was completed.
Running - The patrol has started and the guard has been to at least one of the tour points.
Last Point Clocked:
Last Point Clocked displays the name of the reader or monitor point at which the guard last clocked
during the patrol tour.
Floor group status
State:
Secure Access/Free Access
Secure Access - Indicates that the elevator floor button can only be operated as a result of a valid
access-control transaction.
Free Access - Indicates that anyone can operate the elevator floor button. No access-control
transaction is required to use the floor button.
What is a floor group?
Time To Select A Floor:
If a Grant Access command is sent to a floor, people are given free access to operate the elevator floor
button for a limited period of time, as shown by Time To Select A Floor. The length of time is specified by
the installer.

Change Threat Level ("Home/Monitoring/Change Threat Level")


You can use this screen to change the current threat level. Select the threat level, then click OK.
The current threat level is displayed in the bar at the bottom of the Symmetry window.

29
Change Company Screen ("Home/Monitoring/Change Company")

If the selected threat level requires authentication (as set up in the "Setup/Configuration/Threat Levels" screen), a
"Confirm Threat Level Change" box is displayed. Two people who have the Authorize Change of Threat Level
user privilege ("Maintenance/User & Preferences/Accounts" screen) must enter their username and password
before the current threat level can be changed to be the selected level.
Warning - changing the threat level can significantly affect system operation:
 Cards with a Deactivate at Level value that is less than or equal to the selected level are made
inactive. Deactivate at Level is set in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
 Cards with a Deactivate at Level value that is greater than the selected level are made active, if
previously made inactive due to the current threat level.
 Scheduled and trigger commands may be deactivated/activated.
 Any commands associated with the threat level (in the "Setup/Configuration/Threat Levels" screen)
are executed.

Note: Changing the threat level can cause a lot of information to be downloaded to the access-control nodes
(which control readers and other security management equipment). The download can take a large amount of
time to complete.

You can also change threat level using a Change Threat Level trigger command.
For an overview of threat level management, please refer to the Threat Level Manager Installation and User Guide.

Change Company Screen ("Home/Monitoring/Change Company")


The Change Company screen is available from the "Home/Monitoring" menu if you have more than one company in
your company group. The screen enables you to change the company you are administering.
Choose the company from the menu. Only those companies that are in your company group are available.
Some screens operate on only the currently-selected company if Filter by Company is selected in the Client
Preferences screen. Please refer to the help for the Filter by Company option.

Note: If your company group is changed to contain more than one company, you need to log out, then in to
obtain the Change Company option.

Controls Screen ("Home/Monitoring/Controls")

General
Overview of this screen
The "Home/Monitoring/Controls" screen is available only with the Commend Controls license and only at a
client PC that is connected to a CCTV switcher unit.
The screen enables you to control equipment at "control points" around the site. A control point is either a
defined access point to the site (such as a vehicular or public entrance), or a location where equipment such as
lights need to be switched on or off.
In a typical application, you would use the screen to answer an incoming intercom call from a person at an
access point, verify the person's identity using an intercom link and CCTV camera, then open/close a barrier
and/or operate a traffic light, as appropriate.
You can use the screen to manage several calls at the same time, to review any barriers that are currently open
and to operate any equipment at any control point.
When you first display the "Home/Monitoring/Controls" screen, it displays:
 A pull-down menu, which by default shows All Control Centers. If you are using a multi-user
Commend Controls systems, the menu displays all control centers defined in the

30
Symmetry Software Reference Manual

"Operation/Controls/Control Centers" screen. The control center you choose determines the
control groups that are made available to you.
Note: You can access only those control centers belonging to companies in your company group. The
Filter by Company setting in the "Maintenance/User & Preferences/Client Preferences" screen is
ignored.

 Select Call, Select Open and Select Any near the top-left corner of the screen, which provide three
different modes of using the screen. The content of the box below these options depends on the
mode used.
 Up to four panels along the bottom of the screen, one per control point, and each belonging to the
same control group. Each panel contains buttons to control the equipment at the control point, and
each panel may show different buttons, depending on the equipment installed at the control point.
 An area on the right-hand side of the screen, which displays an image from a selected CCTV
camera. The image always relates to the control point in the panel at the bottom-left corner of the
screen.
You can expand the camera image to cover more of the screen area by double-clicking on the image or
pressing the F5 key on your keyboard. If you do this, only the panel in the bottom-left corner of the screen
will be visible (the one that always relates to the image displayed on the screen). Double-clicking or
pressing F5 again returns the screen to its normal view, with up to four panels displayed along the bottom
of the screen.
All actions you take, for example to open/close barriers, are logged in the user activity log, which can be viewed
by using the "Reports/History/Activity" or "Reports/History/Predefined Reports/Activity" screen.
If you minimize the "Home/Monitoring/Controls" screen, the screen is maximized automatically when a new call
is received, irrespective of the currently-selected mode.
Using the screen in Select Call mode
Purpose of the Select Call Option
The Select Call option in the "Home/Monitoring/Controls" screen enables a guard to respond to incoming
intercom messages.
When a caller generates a call request at a remote intercom belonging to the selected control center (or to
any control center if All Control Centers is selected), the name of the control point that the intercom
belongs to (such as "South Entrance Gate") is added to the Call Requests box and a sound is made.
Each control point may give a different sound. At busy periods of the day, the Call Requests box may
display the names of several control points, each for a different intercom. The control points are ordered in
the Call Requests box by call priority, as set up in the "Operation/Controls/Control Points" screen.
The option enables you to control the equipment at a selected control point or at any other control point
belonging to the same control group.
Responding to a Call
To respond to a call, double-click on the appropriate name in the Call Requests box, or single-click and
choose Select. The following occurs:
1. Buttons to operate, for example, the barrier or intercom at the control point are displayed in a panel
in the bottom-left corner of the screen.
2. The sound associated with the call is cancelled. Note that the sound made corresponds to the call
at the top of the Call Requests box. Therefore, after responding to a call, a sound may continue.
3. If the intercom has been set up in Duplex mode, ("Install/Video & Audio/CCTV/Control Intercom"
screen), the audio link between your master intercom and the intercom at the control point is
automatically opened. This is indicated by the control point's microphone button being in the
"pressed" (highlighted green) position. You can now talk with the caller. Alternatively, if the
intercom has been set up in Simplex mode, you need to press the microphone button to speak with
the caller.

31
Controls Screen ("Home/Monitoring/Controls")

4. If the control point has a camera, the image from the camera is displayed in the
"Home/Monitoring/Controls" screen. If the camera has pan and tilt controls, the camera
automatically moves to its preset 1 position, as set up by the installer.
5. Up to three other control-point panels may be displayed along the bottom of the screen. These
belong to the same group of control points as the one you selected. The name of each control point
is displayed at the top of each panel. You can use the buttons in these panels to control, for
example, the barriers or cameras at these other control points.
Up to two of these control points may each have an associated camera. If the control point in the second
panel from the left has a camera, its image is displayed on CCTV monitor 2. Likewise, if the control point in
the third panel from the left has a camera, its image is displayed on CCTV monitor 3.
Clearing a Call
Once you have answered the caller, then used the relevant buttons to open/close the barriers/gates, you
can select Clear to remove the selected call from the Call Requests box.
Using the screen in Select Open mode
Purpose of the Select Open Option
Selecting Select Open lists all control points at which the controlled device (normally a gate or barrier) is
open. Only control points in the selected control center are included.
The option enables you to control the equipment at a selected open control point or at any other control
point belonging to the same group of control points as the one you selected.
Selecting a Control Point
When you double-click on a control point listed in the Control Points box (or single-click and choose
Select), the following occurs:
1. Buttons to operate, for example, the barrier or intercom at each of the control points in the same
group as the selected control point are displayed in panels along the bottom of the screen.
2. If the control point in the bottom-left corner of the screen has a camera, its image is displayed in the
"Home/Monitoring/Controls" screen. If the camera has pan and tilt controls, the camera
automatically moves to its preset 1 position, as set up by the installer.
If the control point in the second panel from the left has a camera, its image is displayed on CCTV monitor
2. Likewise, if the control point in the third panel from the left has a camera, its image is displayed on
CCTV monitor 3.
Refreshing the List
Selecting Clear refreshes the list of open control points.
Using the screen in Select Any mode
Purpose of the Select Any Option
Selecting Select Any lists all control groups, in the selected control center (if All Control Centers is
displayed, all control groups are listed, as set up in the "Operation/Controls/Control Groups" screen).
The option enables you to control the equipment at any control point in the selected group.
An asterisk (*) to the left of a control group name indicates that an access point within this group has a call
request. If necessary, use Select Call mode to respond to the call.
Selecting a Control Group
When you double-click on a group listed in the Control Groups box (or single-click and choose Select),
the following occurs:
1. Buttons to operate, for example, the barrier or intercom at each of the control points in the group
are displayed in panels along the bottom of the screen.

32
Symmetry Software Reference Manual

2. If the control point in the bottom-left corner of the screen has a camera, its image is displayed in the
"Home/Monitoring/Controls" screen. If the camera has pan and tilt controls, the camera
automatically moves to its preset 1 position, as set up by the installer.
If the control point in the second panel from the left has a camera, its image is displayed on CCTV monitor
2. Likewise, if the control point in the third panel from the left has a camera, its image is displayed on
CCTV monitor 3.
Order of Listed Control Groups
The control groups are ordered in the Control Groups box by call priority, as set up in the
"Operation/Controls/Control Points" screen. The group containing the access point with the highest call
priority is listed first. Groups that have the same priority are listed in alphabetical order. Any groups that
have an access point with call request (that is, those listed in Select Call mode) are highlighted with an
asterisk (*) and are displayed at the top of the list.
Order of Control Points
The control points shown in the boxes along the bottom the screen are, by default, shown in the order as
defined in the control group. However, if an access point has a call request, this is shown in the box in the
bottom-left corner. If there is more than one access point with a call request, the access points are ordered
by priority.

General Options
Comment
Choose this button if you want to select or enter a comment (for example, "Visitor for Mr Smith allowed access
to parking lot 2"). The comment will be stored in the History User log, with the date and time, and can be viewed
later by using the "Reports/History/User Audit" screen.
You can select any comment belonging to any company in your company group. You do not have to have a
control point or control group selected.
The comment is logged against the company currently selected for the Admin options.
Select
You can access the controls for a control point by clicking on the name of the control point or group, then
choosing Select or pressing the F12 key on your keyboard.
Clear
If you are in Select Call mode, this option removes the selected call from the list.
In all modes, Clear also resets the panels along the bottom of the screen. If a default control group has been
selected ("Operation/Controls/Control Groups" screen), the panels will show the control points for the default
group. As normal, the CCTV image for the control point in the bottom-left corner of the screen will be shown in
the "Home/Monitoring/Controls" screen, the CCTV image for the second panel will be displayed on monitor 2,
and the CCTV image for the third panel on monitor 3. If there is no default control group, the panels and
monitors will be blank.
Clear also closes any open intercom link.
You can choose Clear either by selecting the Clear button or by pressing the Esc key on your keyboard.

Control-Point Buttons
Open, Close and STOP (button text may vary)
(Button text may vary.) These buttons are typically configured to open/close/stop a barrier at the control point,
but the buttons may have been named and set up for some other purpose (such as to switch a light on/off or
grant access at a reader).
The STOP button is typically configured to override the Open/Close button press to stop a barrier while it is in
motion. A second press of the STOP button cancels the "stop".

33
Tasks Screen ("Home/Monitoring/Tasks")

The Close button can be set up to be selected automatically by setting up an auto close time: right-click in any
non-button area of the control-point panel, and enter the close date/time in the dialog displayed.
Status indicators may be displayed above the buttons. A green indicator is lit above the Open button when the
barrier or other device it controls is opened/switched. A red indicator is lit above the Closed button when the
barrier or other device it controls is closed/switched. If sensors are fitted to the device, the indicators may show
the actual status of the device; alternatively, the indicators may simply show whether you last selected the
Open/Closed button (this is set up in the "Operation/Controls/Control Points" screen). If the device has an in-
motion sensor, a yellow indicator is lit while the device is moving. If no in-motion sensor is fitted, the yellow
indicator is lit only if you have selected the STOP button.
Microphone button
If you press and hold the left mouse button on a microphone button, an audio link is established between your
intercom and the intercom at the corresponding control point while you keep the button pressed. Right-click on
the button if you want the audio link to remain open when you release the mouse button. Selecting a
microphone button that is already selected switches off the intercom link.
Right-clicking on a microphone button also causes the CCTV image from the camera at that control point to be
displayed on the "Home/Monitoring/Controls" screen, with the buttons displayed to control pan, tilt, zoom and
focus, and to move the camera to preset positions. The control point's panel moves to the bottom-left corner of
the screen (if it was not already there). The image that was displayed on the screen is switched to (the now
available) monitor 2 or 3.
Traffic light button
This is normally configured to operate a traffic light. Selecting the button when the green traffic light icon is
displayed will cause the icon and lights to change to red, and vice versa.
Camera button
Selecting this button enables you to control the camera at the control point. Depending on camera model,
buttons to control pan, tilt, zoom, focus are displayed, and buttons to move the camera to preset positions.
If not already done, the camera image at the control point is automatically displayed on the screen. The image
that was displayed on the screen is switched to (the now available) monitor 2 or 3.

Note: When you select a Camera button, the control point's panel moves to the bottom-left corner of the screen
(if it's not already in that position).

Selecting the green-highlighted Camera button again (which is always in the panel at the bottom-left corner of
the screen) returns to displaying the Select Call, Select Open or Select Any list.
On and Off buttons (button text may vary)
Selecting these buttons causes a device to switch on/off. If the device is currently on, a yellow indicator is lit
above the On button, and vice versa.

Tasks Screen ("Home/Monitoring/Tasks")

General
Overview of this screen
This screen allows you to list, view, process and create tasks, depending on your user privileges.
A task defines an action that must be completed by a specified user, or by any user that has a specified user
role. Each task has a due date and time; if the task is not completed on time, its status automatically changes to
"overdue".

34
Symmetry Software Reference Manual

Listing Existing Tasks


The Selection screen allows you to list all completed and uncompleted tasks. For each task, the screen
shows the task subject, the due date and time, the name of the user or user role the task is assigned to,
and the current status of the task.
You can use the options in the upper area of the Selection screen to apply filters, which cause only tasks
that match selected criteria to be displayed.
Creating a New Task
You can create a new task by clicking New in the Selection screen, or by clicking Copy after opening an
existing task. When you create a task, you specify:
 The due date and time of the task. If the task is not completed on time, its status
automatically changes to "overdue".
 The name of the user or user role that is assigned the task. If the task is assigned to a user
role, any user who has that role can complete it. For further information, refer to the help for
the Assigned To option.
 The task subject, which should be a brief description of the task.
 Whether to generate an alarm if the task becomes overdue or immediately on creation of the
task.
 Any instructions to complete the task.
 The recurrence period, such as every day or every Friday. When the task is completed, a
new instance of the task is automatically generated, with a due date that reflects the
recurrence period. For example, if a task that is due every Friday is completed, a new
instance of the task is automatically generated with a due date of the following Friday. For
further information, refer to the help for the Recurrence tab.
 Whether to include file attachments, such as diagrams or plans.
Opening a Task
You can open an existing task by double-clicking the task in the Selection screen, or by selecting the task
and clicking Open. You may want to open a task to:
 View task instructions.
 Add comments.
 Mark the task as "started" or "complete".
 Change the due date/time.
 Assign the task to a different user or role.
 Determine the recurrence period.
 View or add file attachments.
Once you have opened a task, you can use arrow buttons near the top-right corner of the screen to scroll
through each task.
Printing Tasks
You can print all tasks listed in the Selection screen by clicking the Print button.
Completing a Task
You can mark a task as complete by opening the task and clicking the Complete button. Alternatively, if
the task has caused an alarm, you can open the alarm in the "Home/Monitoring/Alarms" screen and click
Complete.
Completing a task removes it from the "Home/Monitoring/Alarms" screen and generates a new task,
depending on the settings in the Recurrence tab.
Completed tasks are deleted automatically after the period specified by Purge Daily Logs After in the
"Maintenance/User & Preferences/System Preferences" screen.

35
Tasks Screen ("Home/Monitoring/Tasks")

Handling Task Alarms


A task appears in the "Home/Monitoring/Alarms" screen if it generates an alarm, which can occur
immediately on creation of the task, or when the task is overdue (depending on the setup of the task).
Selecting/opening a task alarm allows you to view the details of the task, in the same way as opening the
task from the Tasks screen.
Clearing all alarms in the Alarms screen (using the Clear button) completes all tasks that are in alarm.
Completing a task removes it from the Alarms screen.
If a task has caused an alarm because it is overdue, changing the due date so that the task is no longer
overdue removes the alarm condition.
All task alarms are treated as "system" alarms for the purposes of alarm routing
("Operation/Alarms/Routing") and alarm reporting ("Operation/Alarms/Reporting").
Workflow Triggers
Creating, opening or completing a task can start a workflow, as set up in the "Setup/Workflow/Workflow
Designer" screen.
Using the Selection screen
The Selection screen is displayed when you select Tasks from "Home/Monitoring". You can use the Selection
screen to list, open or create tasks.
Click here for an overview of Selection screens and how to use them.
The following options are specific to this Selection screen and are used to filter the tasks displayed when you
click Find:
Tasks Status
You can use the checkboxes to filter the tasks by status. You can select one or more of the following:
 Completed - Completed tasks.
 Overdue - Tasks that are overdue; that is, that have a due date that is before today.
 Due Today - Tasks that are due to be completed by today.
 Started - Tasks that have been started.
 Pending - Tasks that have a due date after today.
Date Selection
You can use the Date Selection options to filter the tasks by date.
For example, if Pending is selected, choosing Predefined, Next 7 days followed by Find lists all tasks
that are pending in the next 7 days.
The Date Selection options are available if you have selected Completed or Pending.
Other Filters
Assigned To
When a task is defined, it is assigned to a specific user name or role. You can use the Assigned To
menu to filter the tasks by user name or role.
The user names and roles in the menu depend on your own user role, and your privileges set by
Task List Assignment in the "Maintenance/User & Preferences/Accounts" screen.
The following possible choices are available:
 Selecting a user name lists tasks that are assigned to that user name or to the role to
which that user belongs.
 Selecting a role (if available) lists tasks that are assigned to that user role.
 Selecting All (if available) lists all tasks, irrespective of who they are assigned to.
Subject
You can use this field to filter the tasks by subject. You can use wildcards if required.

36
Symmetry Software Reference Manual

For example, entering M* allows all tasks that have a subject starting with "M" to be listed.
You can use the Print button in the Selection screen to create a report of the tasks listed in the Selection
screen.
Note: The settings in the Selection screen persist when you close the screen. When you re-open the screen,
the same settings are automatically selected.

About the Options


Created On
This shows the date and time the task was created.
Due On
This specifies the date and time that the task is (or was) due.
Assigned To
This specifies the user name or role the task is assigned to.
The user names and roles in the menu depend on your own user role and Task List Assignment in the
"Maintenance/User & Preferences/Accounts" screen, which can be set to All Users, Same User Profile or
User Only.
If you assign a task to a role, only the following users will be able to view and process the task:
 Users who have the specified role.
 Users who have the All Users privilege.
If you assign a task to a user, only the following users will be able to view and process the task:
 The specified user.
 Users who have the same role as specified user and have the Same User Profile privilege.
 Users who have the All Users privilege.
Subject
This specifies the subject or name of the task.
Created By
This displays the name of the user who created the task.
Alarm
Specify the conditions under which an alarm is generated for this task.
Please refer to "Overview of this screen" for further information about viewing task alarms.
Status: Completed/Overdue/Due Today/Pending
The current status of the task is shown near the top-right corner of the screen. The status can be one of the
following:
 Completed - The task is complete. The name of the user who completed the task, and date and
time of completion, are displayed in the banner above the tabbed area.
 Overdue - The due date for the task is before today, and therefore the task is overdue.
 Due Today - The task is due to be completed today.
 Pending - The due date for the task is after today.
Tabs:
Details
Use this tab to view or specify the task instructions.

37
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")

Comments
Use this tab to view or specify any comments about the task as it progresses. Previous comments are
listed on the right-hand side of the tab, with the date and name of the user who added the comment.
Recurrence
This tab defines the recurrence period for the task.
When a task is completed, a new instance of the task is created automatically. The due date and time of
the new instance are set according to the defined recurrence period, the date of completion and the due
date and time of the previous instance.
Example 1:
1. A task is due on 12th October at 12:00.
2. The task is completed any time on 12th October (early or late).
3. The recurrence period is daily (Daily and Every weekday selected).
4. New instance of task is set with a due date of 13th October at 12:00.
Example 2:
1. A task is due on 12th October at 12:00.
2. The task is completed on 16th October at 10:00 (late).
3. The recurrence period is daily (Daily and Every weekday selected).
4. New instance of task is set with a due date of 17th October at 12:00. The task was not carried out
on the 13th, 14th and 15th, and no additional task is scheduled for 16th October at 12:00.
If No Recurrence is selected, the task does not recur.
The Range of recurrence options specify the number of occurrences of the task, or the period over which
it must be carried out.
Attachments
This tab lists any files attached to the task, such as pictures or diagrams.
You can use Add File to add an attachment, Open File to open a selected attachment, and Delete File to
delete a selected attachment.
Copy/Delete/Started/Complete/Save/Close
You can click Started or Completed to indicate that you have started or completed the task. Once clicked,
Started changes to Not Started, which allows you to reverse the status.
Completing a task removes it from the "Home/Monitoring/Alarms" screen and generates a new task, depending
on the settings in the Recurrence tab.
The other buttons are common to many Definition screens. Click here for details of these options.

Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")

General
Purpose of the Virtual Matrix Screen
The Virtual Matrix screen is available if a Symmetry camera license is installed. It enables you to view live
pictures simultaneously from up to 36 digital video cameras or Web pages. You can have up to two Virtual
Matrix screens open at the same time on the same PC.
Each image is displayed in a "cell" located on the right-hand side of the screen. You can change the number of
cells and their positions using the Change Layout option.

38
Symmetry Software Reference Manual

Options in the screen enable you to record video, replay recorded video, start camera sequencing, view alarms
and view current activity.
About Cells
The cells on the right-hand side of the screen display live images from cameras and Web pages.
To display live video or a Web page in a cell, find the camera, camera group or Web page in the Cameras and
Multimedia tree view located on the left side of the screen, then drag and drop it into a cell. Alternatively, select
the cell, right-click on the camera, camera group or Web page and select Add to View.
If you add a camera group to a cell, a camera tour is started for all cameras in the group (you can start and stop
the tour from the Options panel).
You can also drag and drop images from one cell to another.

Double-clicking
Double-clicking a cell performs one of the following actions, depending on the setting of Expand Cell on
Double Click in the "Maintenance/User & Preferences/Client Preferences" screen:
 If Expand Cell on Double Click is not selected, double-clicking swaps the image with the
image in the lowest-numbered cell that is physically larger than the one selected (for
example, cell 1). This feature can be used to switch the image in a small cell to larger "spot
monitor".
 If Expand Cell on Double Click is selected, double-clicking changes the layout to a single
cell and displays the image in that cell. Double-clicking again reverts to the previous layout.
This is the same as the right-click Expand Cell option.
Cell Title Bars
By default, each cell has a title bar containing the cell number and the name of the camera or URL of the Web
page. You can hide or display the title bar by right-clicking in the cell and selecting/deselecting Captions. You
can hide or display the cell number by right-clicking in the cell and selecting/deselecting Cell Numbers.
The following icons are located in the top-left corner of each cell:
Record Video. Click to record video from the camera (same as selecting Record Video from the right-
click menu).
Mute/Unmute. Click to mute/unmute audio from the camera. The audio icon is available only if the
camera supports audio and audio is enabled in the camera definition screen.
Analog pan/tilt/zoom enabled. Click to swap to digital pan/tilt/zoom mode. While in analog
pan/tilt/zoom mode:
 To zoom in or out, use the mouse wheel.
 To pan, click the central icon, hold the mouse pointer down and move the mouse - the
pointer projecting from the center of the picture shows the direction of pan and speed
(stretch the pointer to increase speed).
Digital pan/tilt/zoom enabled. If analog pan/tilt/zoom is available, click the icon to swap to analog
pan/tilt/zoom mode. If analog pan/tilt/zoom is not available, click the icon to disable digital pan/tilt/zoom
(removes the central icon).
While in digital pan/tilt/zoom mode:
 To zoom in or out, use the mouse wheel. The central icon shows the center of the
zoom. Note: zooming in/out does not change the zoom level at the camera; it zooms
in/out of the picture provided from the camera.
 To pan, click the central icon, hold the mouse pointer down and move the mouse - the
elongated pointer projecting from the center of the picture shows the direction of pan
and speed (stretch the pointer to increase speed).
Digital Zoom Active. This indicates that the image shown in the video cell is currently digitally
zoomed. If analog pan/tilt/zoom is available, click the icon to swap to analog pan/tilt/zoom mode. If
analog pan/tilt/zoom is not available, click the icon to disable digital pan/tilt/zoom (removes the central
icon).

39
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")

Digital pan/tilt/zoom disabled (default). Click to swap to digital pan/tilt/zoom enabled. You may wish
to disable digital pan/tilt/zoom to remove the icon from the center of the cell.
Select preset. Click to select one of the camera's preset positions to view. For 360-degree cameras,
the available presets may be dependent on the Camera View, which you can select from the cell's
right-click menu.

About Views
Once you have decided which cameras, camera groups and/or Web pages to view, and have moved each into
a cell, you can save the configuration as a "view" using the Save button in the Matrix panel. The next time you
open the Virtual Matrix screen, you can select the view from the pull-down menu, which automatically displays
the Web pages and camera images in that view.
Recording and Replaying Video
Right-clicking on a video image and selecting Record Video (or clicking the button in the top-left corner of the
title bar) enables you to record the video images being displayed. This produces a user recording.
You can replay video by right-clicking on a video image and selecting Instant Replay.
About the Panels
The screen contains the following panels along the left side of the screen:
 Matrix - Contains options mainly for selecting, creating and deleting views.
 Controls - If the currently selected view is from a camera, you can use this to zoom in/out, focus,
pan and tilt and activate presets. Only those controls that the camera supports are available, as
set up in the camera definition screen.
 Options - Provides various options that affect the appearance and operation of the screen.
 Cameras and Multimedia - Displays all the cameras, camera groups and Web pages you can
display, and allows you to add new links to Web pages.
Displaying and Hiding Panels
The title bar of each panel contains an button, which can be in one of the following two states:

Click this to hide the panel.

Click this to display the panel.

On the right-hand side of the panel area, you will see a button that can be in one of the following two states:
Click this to hide the entire left side of the screen.
Click this to re-display the left side of the screen.

Matrix Panel
View pull-down menu
You can use this menu to:
 Display any view you have previously saved.
 Select (New View) to configure a new view, which you can save using the Save button.
Refresh
Refreshes the content of the cells currently being viewed. You may want to use this option if, for example, a
Web page displayed in a cell is not being displayed correctly.
Save
Enables you to save the current view.

40
Symmetry Software Reference Manual

Delete
Deletes the current view.
Playback
Displays the "Home/Video & Audio/Video Playback" screen (if you have permissions to use this screen).
Change Layout
Change Layout enables you to choose the number of cells to display, and their positions.
The colored borders are relevant only if you are using 360-degree cameras such as Oncam Grandeye or
CompleteView cameras. If you drop a 360-degree camera into a cell, the other empty cells of the same color
will, by default, display views from the same camera to form the full 360 degrees. For example a layout of one
panoramic call and two standard aspect cells of the same color will display a 180-degree panoramic view, and
two views covering the remaining 180 degrees.
For the auto-population of 360-degree camera views to work, please ensure that:
 No other cells of the same color already contain a camera image, unless you drag and drop the 360-
degree camera into the only populated cell of the same color.
 The camera supports all of the view types associated with cells in the layout group.

Controls Panel
About this panel
The graphic in the Controls panel enables you to change a selected camera's pan, tilt, zoom, focus or preset
positions, and start/stop tours, depending on whether the camera supports these operations. Clicking the
relevant part of the graphic changes the camera position, etc.
The camera definition screen (in "Install/Video & Audio/Digital Video") specifies the controls that are available
for each camera. The graphic provides only those controls that the camera supports.
If required, pan, tilt and zoom can be controlled by a supported joystick.
For 360-degree cameras, the available presets may be dependent on the Camera View, which you can select
from the cell's right-click menu.
Variable pan and tilt
The graphic allows variable control of pan, tilt and zoom for cameras that support this feature. To use this
feature, press and hold the mouse button when the pointer is in the center of the graphic or on a pan/tilt control.
The camera will then follow the direction the mouse pointer is moved. Moving the pointer nearer or further away
from the center changes the speed of the pan/tilt action. The graphic appears as follows:

You can zoom in or out by pressing the CTRL keyboard button and moving the mouse wheel.
Start/Stop/Show All Preset Tours
The three buttons near the bottom-right corner of the graphic are for cameras that have preset tours set up (as
configured via the "Install/Video & Audio/Digital Video" screen).
Start Preset Tour - This starts the preset tour marked as the default in the camera definition screen.
Stop Preset Tour - This stops the currently-running preset tour.

41
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")

Show All Preset Tours - This shows all preset tours set up for the camera in the camera definition screen. You
can select a tour to start.

Note: "Camera Group" tours are different and can be started from the Options panel.

Options Panel
Start Sequence / Stop Sequence
This is used to start and stop the sequencing of pictures to the largest cell(s) in the matrix.
Selecting Start Sequence causes the system to display each image in turn in the largest cell in the matrix. For
example, if cell 1 is the largest cell, each image will be displayed in cell 1 for a specified length of time. You are
prompted for the time period when you select Start Sequence. You can start a sequence only if there is at
least one cell that is larger than the others.
If two or more cells of equal size are larger than the others, the system will switch multiple images at the same
time. For example, if cells 1 and 2 are of equal size and are larger than the others, the system will switch cells 3
and 4 into 1 and 2, then 5 and 6, etc.

Note: The largest cell(s) should be empty before you select Start Sequence. If they are not empty, the images
in these cells will not be included in the sequence. Start Sequence is not available for views that contain wide-
screen cells.

The current sequence status (stopped or started) and the sequence time period are saved when you save the
view.
Show Alarms / Hide Alarms
Selecting Show Alarms displays any alarm information routed to this computer, as set up in the
"Operation/Alarms/Routing" screen. Selecting Hide Alarms removes the information from the screen.
You can double-click an alarm to open the Acknowledge Alarms screen.
Right-clicking an alarm displays options that are similar to those available in the "Home/Monitoring/Alarms"
screen.

Note: You require permissions to use the "Home/Monitoring/Alarms" screen to display alarms.

Full Screen / Restore Screen


Selecting Full Screen maximizes the Virtual Matrix screen by hiding title bars, toolbars and other screen
elements.
Restore Screen returns the screen to its normal state.
Show Activity / Hide Activity
Selecting Show Activity displays system activity. Selecting Hide Activity removes the information from the
screen. Right-clicking an alarm displays applicable options.
The Virtual Matrix screen provides similar options to those available in the "Home/Monitoring/Activity" screen.
For details of the information displayed and the options available, please click here.

Note: You require permissions to use the "Home/Monitoring/Activity" screen to display activity.

Start Tour / Stop Tour


A camera tour starts when you drop a camera group into a cell. The image from each camera in the group is
displayed in turn. You can set the time that each camera is displayed using the Camera Tour Time right-click
menu option.
Selecting Stop Tour stops the tour. You can restart the tour by selecting Start Tour.

42
Symmetry Software Reference Manual

If you stop a camera tour, you can right-click the cell and choose options to display the previous camera,
display the next camera or change the length of time that each camera image is displayed (Camera Tour
Time).

Note: "Preset Tours" are different and can be started and stopped from the Controls panel.
Note: If the camera group includes DVR cameras, all DVR cameras in the group stream video at all times. For
example, if the group contains eight DVR cameras, all eight cameras are continuously streaming video. This
will have an impact on the CPU load and may affect system and network performance. You can use the CPU
indicator at the bottom of the Symmetry window to monitor the effect that a camera tour is having on CPU
usage.

Cameras and Multimedia Panel


About this panel
The tree view lists the cameras, camera groups and Web pages you can display in the cells of the Virtual Matrix
screen.
The tree view has an All Cameras section. This contains a Cameras section listing each camera individually,
and a Camera Groups section listing the cameras in each defined camera group ("Setup/Device
Groups/Cameras" screen). There is also a My Folders section, which you can use to contain links to Web
pages, or cameras dragged and dropped from elsewhere in the tree view. If you drag and drop a camera group,
all cameras in that group are added to the folder.
Initially, the tree view contains no Web pages. You can add one by selecting a folder in the tree view and
clicking the Create URL button.
To display live pictures from a camera or Web page, drag and drop the camera, camera group or Web page
from the tree view into a cell. Alternatively, double-click, or right-click and select Add to View; this displays the
image in the lowest-numbered available cell. If you add a camera group to a cell, a camera tour is started for all
cameras in the group (you can start and stop the tour from the Options panel).
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, the tree
view lists only those cameras and groups belonging to the currently-selected company. If Filter by Company is
not selected, the tree view lists cameras and groups belonging to any company in your company group.
Right-clicking on an item in the tree view presents a menu. The options displayed depend on the item selected.
Create Folder
Creates a new folder, which can be used to store your links to Web pages, cameras or camera groups. The
option is available only after selecting a folder in the tree view.
Any personalized folders you create are available only to you. Personalized folders and their contents are
stored individually for each Symmetry user.
The option is also available by right-clicking on a folder and selecting Create Folder.
You can rename a folder by clicking on its name, or by using the Rename right-click option.
Create URL
Enables you to add a Web page to the tree view. The option is available only after selecting a folder in the tree
view and only if the Create/Amend URL permission has been selected in your user role ("Home/Video & Audio
/Virtual Matrix" section in the "Maintenance/User & Preferences/Roles" screen).
Any URLs you create are available only to you. Personalized folders and their contents are stored individually
for each Symmetry user.
The option is also available by right-clicking on a folder and selecting Create URL.
Delete
Deletes a selected folder or Web page in the tree view.
The option is also available by right-clicking on a folder or Web page and selecting Delete.

43
Virtual Matrix Screen ("Home/Video & Audio/Virtual Matrix")

Cell Right-Click Options


Captions
Hides or displays the title bar of the cells.
Cell Numbers
Hides or displays the cell number in the title bar of each cell.
The cell number is used, for example, to determine the sequence of cells to display in a camera tour (started
using the Start Sequence option).
Lock Aspect Ratio
Determines whether or not to maintain the aspect ratio of the camera image in each cell.
Changing this option from unchecked (unticked) to checked (ticked) causes the camera image to be
immediately resized to the correct aspect ratio.
When the option is checked, the aspect ratio of the image is maintained if you resize or change the layout of the
screen.
Camera View
This option is available for 360-degree cameras that support dewarping, such as CompleteView cameras. Use
the menu to select the dewarped camera view to display.
The camera view you select may affect the available presets, since each view can have different presets (as
configured in the camera definition screen in Symmetry)
Expand Cell
Determines whether or not to expand the cell to fill the entire cell area of the screen.
Previous Camera
Displays the previous camera in the group.
This option is available only if the cell contains a camera group and the Stop Tour has been selected from the
Options panel.
Next Camera
Displays the next camera in the group.
This option is available only if the cell contains a camera group and the Stop Tour has been selected from the
Options panel.
Camera Tour Time
Allows you to change the length of time that each camera image is displayed during a camera tour. The default
camera tour time is configured in the "Maintenance/User & Preferences/System Preferences" screen.
This option is available only if the cell contains a camera group and the Stop Tour has been selected from the
Options panel.
Instant Replay
Opens the Video Playback screen, which allows recorded video from the selected camera to be replayed.
Record Video
Either starts a user recording of the video image displayed in the cell, or displays a Record Video screen,
depending on the setting of Remember options in the Record Video screen. Clicking the button in the top-left
corner of the cell's title bar has the same effect.
The option is not available for Web pages.
Listen To Audio
This option switches on audio. The option is available only if the camera supports audio.

44
Symmetry Software Reference Manual

Record Video Options


This is available only if Remember options is selected in the Record Video screen. The option displays the
Record Video screen, where you can choose the settings for a user recording.
Remove
Removes the Web page or camera image from the cell. Clicking the Close button in the top-right corner of the
cell's title bar or dragging the image to the Cameras and Multimedia panel has the same effect.
Reconnect Video
Re-establishes communications with the camera in the cell. You may want to use this option if there was a
problem that prevented the camera image from being displayed correctly.

Video Playback Screen ("Home/Video & Audio/Video Playback")

General
About the Video Playback Screen
The Video Playback screen enables you to replay recordings stored by devices such as the Symmetry Network
Video Recorder (NVR) and other third-party Digital Video Recorders (DVRs). Up to four recordings can be
replayed simultaneously.
The screen is available only if a Symmetry camera license is installed.
If the recording was made by an IP camera, the system obtains the recording from a Symmetry NVR repository
(storage folder).
If the recording was made by a Digital Video Recorder (DVR), the recording is obtained from the hard disk of
the DVR.
About Cells
Each image is displayed in a "cell" located on the right-hand side of the screen. You can swap between
displaying one and four cells by right-clicking on a cell and selecting/deselecting Expand Cell.
Cell Title Bars
By default, each cell has a title bar containing the cell number and the name of the camera. You can hide or
display the title bar by right-clicking in the cell and selecting/deselecting Captions. You can hide or display the
cell number by right-clicking in the cell and selecting/deselecting Cell Numbers.
The following icons are located in the top-left corner of each cell:
Mute/Unmute. Click to mute/unmute audio from the camera. The audio icon is available only if the
camera supports audio and audio is enabled in the camera definition screen.
Digital pan/tilt/zoom enabled. Click the icon to disable digital pan/tilt/zoom (removes the central icon).
While in digital pan/tilt/zoom mode:
 To zoom in or out, use the mouse wheel. The central icon shows the center of the
zoom. Note: zooming in/out does not change the zoom level at the camera; it zooms
in/out of the picture provided from the camera.
 To pan, click the central icon, hold the mouse pointer down and move the mouse - the
elongated pointer projecting from the center of the picture shows the direction of pan
and speed (stretch the pointer to increase speed).
Digital Zoom Active. This indicates that the image shown in the video cell is currently digitally
zoomed. Click the icon to disable digital pan/tilt/zoom (removes the central icon).
Digital pan/tilt/zoom disabled (default). Click to swap to digital pan/tilt/zoom enabled. You may wish
to disable digital pan/tilt/zoom to remove the icon from the center of the cell.
Select preset. This option is available for Onvif Oncam Grandeye 360 cameras (not for CompleteView
360 or other cameras). Click to select one of the camera's preset positions to view. The available

45
Video Playback Screen ("Home/Video & Audio/Video Playback")

presets can be dependent on the Camera View, which you can select from the cell's right-click menu.

Displaying Recorded Video


To display recorded video, you need to find the video recording in the database, then drag and drop it into a
cell. Use the following procedure:
1. In the Cameras and Multimedia tree view located near the top-left corner of the screen, select the camera
that was used for the recording.
2. Use the Include pull-down menu to specify the types of video recordings to find from the database. Select
All Video if you want to find all recordings.
3. Use From and To to specify the date and time range of the recordings to find.
4. Click the down-arrow next to the Find button to choose the source of the video to find.
5. Click the Find button. The Results panel lists all recordings that are of the correct type and include any part
of the specified time range. Recordings that were actioned within the time range (as indicated by the
When time) are also listed.
6. Drag and drop any recording listed in the Results panel into a cell. Alternatively, double-click a recording to
play it in the lowest-numbered available cell. Playback starts from the Start time shown in the Results
panel and ends at the End time.
Note: When dragging tagged (video by alarm/event), user or bookmarked recordings, stored on a DVR,
hold down the 'Ctrl' key to play just that clip rather than starting at the beginning of the recorded video.
If required, you can drag and drop images from one cell to another.
About the Time Line
The time line shows periods during which recordings exist for the currently selected cell, and your current
position in the recording. You can drag and drop the marker to replay from a different time.
Click here for a key to the colors.
About the Results Panel
The Results panel gives the following information, grouped by recording device:
 Camera - The name of the camera that was used for the recording.
 What - This displays one of the following:
For recordings created using a Record Video command: the name of the alarm/event that triggered the
recording and the card number (if available).
For bookmarked or user recordings: the description specified at the time of the user recording or
bookmark.
For other recordings: "Standard Recording".
 Where/Who - This displays one of the following:
For tagged recordings created using a Record Video command: the name of the device or person that
triggered the recording.
For user or bookmarked recordings: the name of the Symmetry user who actioned the recording.
This information is blank for a standard recording.
 When - The date and time when the bookmark or user recording was made, or the time of the
alarm/event that triggered the recording. This information is blank for a standard recording.
 Start - The date and time of the start of the video recording.
 End - The date and time of the end of the video recording.
 Duration - The duration of the video clip.
The number of recordings listed in the Results panel is at least the number of Windows IIS licenses you own.

46
Symmetry Software Reference Manual

Screen Options
Using the tree view
The tree view lists the cameras you can choose for video playback.
The tree view has an All Cameras section. This contains a Cameras section listing each camera individually,
and a Camera Groups section listing the cameras in each defined camera group ("Setup/Device
Groups/Cameras" screen). There is also a My Folders section, which contains the folders and cameras
selected in the Virtual Matrix.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, the tree
view lists only those cameras and groups belonging to the currently-selected company. If Filter by Company is
not selected, the tree view lists cameras and groups belonging to any company in your company group.
Include
Use this menu to choose the types of recordings to list in the Results area:
 All Video - Lists all types of recordings.
 Video by Alarm - Lists only tagged recordings associated with an alarm; that is, generated by a
Record Video trigger command, triggered by an alarm message.
 Video by Alarm & Event - Lists tagged recordings created using a Record Video trigger command,
triggered by an alarm or event message. For example, video tagged by events actioned by a
Symmetry NVR are listed when you choose this option.
 Video by Bookmark - Lists only bookmarked recordings.
 Video by User Recording - Lists user recordings.
Time Zone
This option is displayed if cameras are in different time zones. Select the time zone in which you are located.
The system will return all video clips relative to the time zone in which you are located. For example, if you
select GMT +01:00, and time range of 19:00-21:00, devices located in the GMT time zone will return video clips
from 18:00-20:00.
Date and Time (From, To, For)
Use the From and To fields to specify the date and time range of the recordings to find.
When you click the Find button, the Results panel lists recordings that include any part of the time period
specified by the From and To fields.
The For field indicates the number of minutes between the From date and time, and the To date and time.
Changing the value in this field changes the From date and or time.
Search menu
Three search options are available:
 Search All - Returns all video that matches the other criteria.
 Search Symmetry NVR - Returns all video that matches the other criteria and is stored in a
Symmetry NVR.
 Search Encoder/DVR - Returns all video that matches the other criteria and is stored on a device
that has its own storage (such as a DVR).
The currently-selected option is displayed in bold. The default option is specified in the "Maintenance/User &
Preferences/Client Preferences" screen.
Playback buttons

Cell Right-Click Options


Captions
Hides or displays the title bar of the cells.

47
Intercom Screen ("Home/Video & Audio/Intercom")

Cell Numbers
Hides or displays the cell number in the title bar of each cell.
The cell number is used, for example, to determine the cell used when you double-click a recording listed in the
Results panel. In this case, the lowest-numbered unoccupied cell is used to replay the recording.
Lock Aspect Ratio
Determines whether or not to maintain the aspect ratio of the camera image in each cell.
Changing this option from unchecked (unticked) to checked (ticked) causes the camera image to be
immediately resized to the correct aspect ratio.
When the option is checked, the aspect ratio of the image is maintained if you resize or change the layout of the
screen.
Camera View
This option is available for 360-degree cameras that support dewarping, such as CompleteView cameras. Use
the menu to select the dewarped camera view to display.
For Onvif Oncam Grandeye cameras, the camera view can affect the available presets, since each view can
have different presets (as configured in the camera definition screen in Symmetry).
Expand Cell
Toggles the screen between displaying just one cell or four cells.
When four cells are displayed, right-clicking and selecting Expand Cell causes the selected cell to expand.
Double-clicking a cell has the same effect.
Remove
Removes the camera image from the cell. Clicking the Close button in the top-right corner of the cell's title bar
has the same effect.

Intercom Screen ("Home/Video & Audio/Intercom")

General
Purpose of the Intercom Screen
The "Home/Video & Audio/Intercom" screen is used to manage intercom calls from a Zenitel Pulse intercom
system. If you are using a Stentofon Alphacom intercom system, use the "Home/Video & Audio/Intercom
Control" screen instead.
You can use the "Home/Video & Audio/Intercom" screen to:
 Answer calls from intercoms. A call is made when a call request button is pressed at an intercom,
typically by visitors or other personnel who require access to the building. When a call is received,
you can choose to answer the call using the intercom located at your PC. After speaking with the
caller, you can press a Command button to perform an action such as opening a door or barrier.
 Open a line between the intercom located at your PC and any other intercom. You can do this even
if no call request has been received.
 View video from cameras associated with the intercoms.
The screen can be used only if the installer has used the "Install/Video & Audio/Intercom/Clients" screen to set
up your PC as an Intercom client.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.

Note: You can manage only those intercoms that belong to the currently selected company.

48
Symmetry Software Reference Manual

Note: All calls from an intercom are routed to a specific Symmetry intercom client. It is not possible to use
different Symmetry intercom clients to manage calls from the same intercom.

Receiving and Answering a Call


1. When a call is received from an intercom, it is listed in the Call Log in the center of the screen, and the
corresponding intercom icon shows a white flash, which rotates around the border of the icon:

2. To answer the call, click the icon shown above, or right-click the call in the Call Log and select Connect.
The icon changes to:

If cameras are associated with the intercom, live video from each camera is displayed in a separate cell on
the right-hand side of the screen.
3. You can now speak with the person at the intercom.
4. If the intercom has been associated with a command (in the "Install/Video & Audio/Intercom/Stations"
screen), the Command icon is enabled at the bottom of the intercom panel, which can have one of two
appearances:
Icon Meaning/Purpose

Click to grant access through a door or barrier controlled by Symmetry.

Click to issue a predefined command to operate an auxiliary output device (such as a light
or other barrier).

5. When you are ready, terminate the call by clicking:

The icons change to their default state, and the Call Log is updated.
Calling Other Intercoms
You can open a line to any intercom simply by clicking the button associated with the intercom you want to
connect to, even if no call request has been received.
If you have been in a call with an intercom or missed a call, you can right-click the entry in the Call Log and
choose Call Back.

Screen Options and Features


Group
You can use the Group menu to display only those intercoms that are in a specific intercom group (as set up in
the "Setup/Device Groups/Intercom" screen). Select All from the Group menu to display intercoms from all
groups.
Using the Intercom Panels
The main area of the screen displays a panel for each intercom. For example:

49
Intercom Screen ("Home/Video & Audio/Intercom")

If there are more intercom panels than can fit on the screen at any one time, you can display others by using
the page controls located in the bottom bar of the screen.

Intercom Names
To the left of the large icon near the top-right corner is displayed the station number and name of the intercom
that the panel is for (e.g. "104", "Main Gate"), and under this is the name of the intercom that is it attempting to
communicate with (e.g. "Reception").

"Unavailable" is displayed for the name of the intercom that is calling if the intercom is connected to a different
Zenitel Pulse server.

Call Icon
The Call icon in the top-left corner can have any of the following states. Note: The icon is grayed out for your
intercom client.
Icon Meaning/Purpose

Default (ready) state.

The intercom is calling you. Click to answer.

This indicates an intercom that is currently calling another.

You are in a conversation. You can click to place the call on hold (click again to resume).

Another intercom is ringing this intercom.

Another intercom rang this intercom, and there is a conversation in progress.

Status
The current status of the intercom is given near the center of the panel (e.g. "Online", "Calling" or "Ringing").
"Unavailable" is displayed if the intercom uses a different Pulse server from the one your intercom client is
using - you cannot communicate with these intercoms.

Mute Icon

50
Symmetry Software Reference Manual

Clicking (located near the top-right corner) mutes the call sound. Clicking again does not re-enable the
sound. The icon is enabled if the panel is from an intercom station (not an intercom client), the status is
"Calling" and an associated sound has been defined in the "Install/Video & Audio/Intercom/Stations" screen.
The sound and mute button are automatically enabled on the next incoming call from any intercom.

Favorites Icon
Clicking (located in the top-right corner) marks the intercom as a favorite. You can display only favorites by
clicking the same icon located in the bottom bar of the screen.

Call Action Icons


The icons along the bottom of the panel have the following meanings. Note: The icons are grayed out for your
intercom client.
Icon Meaning/Purpose
Click to hang up the current call.

Click to forward the current call to another intercom.


This is available if cameras are associated with the intercom (as set up in the "Install/Video &
Audio/Intercom/Stations" screen). Click to display video from the cameras.
This door icon is available if the intercom is associated with a command to open a door or
barrier (as configured in the "Install/Video & Audio/Intercom/ Stations" screen). Click to grant
access.
This icon is available if the intercom is associated with a command to operate an auxiliary
output device (as configured in the "Install/Video & Audio/Intercom/ Stations" screen). Click to
operate the device - the device switches on, then off after a predefined period of time. Only
this icon or the door icon can be available at the same time.
Using the Bottom Bar (Search, Page Size, Page Icons and Favorites)
The bottom bar appears as follows:

Search
You can use this field to search for an intercom by name. Enter any part of its name.

Page Size
You can choose the number of intercom panels to display on the same page.

Page Controls
You can use the icons to the right of the Page Size menu to choose to display a different page of intercom
panels.

Favorites
Click to display only favorites. You can choose an intercom to be a favorite by clicking the icon in the top-
right corner of the intercom panel. Favorites can be different for each Symmetry user on each intercom client
(so the same user can have different favorites on different intercom clients).
Using the Call Log
The Call Log is the area in the center of the screen that list all call operations that have taken place. You can
scroll up and down the Call Log (maximum 100 entries). The most recent entry is at the top of the list.

51
Intercom Screen ("Home/Video & Audio/Intercom")

Right-Click Menu
Right-clicking an entry in the Call Log can display icons for the following options:
 Connect - Answers an incoming call from the intercom.
 Disconnect - Disconnects the call you are currently having with the intercom.
 CallBack - Allows you to call the intercom back. This is available if the log entry is for an answered
or missed call.

Camera Icon

If cameras are associated with the intercom and the cameras have recorded video, you can click the icon
to replay video from the time of the call.
Using the Video Layout Controls
You can use the controls in the top-right corner of the screen to choose the number of camera images to
display at any one time, and their layout:

Using Live Video Cells


If cameras are associated with an intercom, live video from the cameras is displayed on the right-hand side of
the screen when you answer a call from the intercom. Live video is also displayed if you click the following icon
in the intercom panel:

Up to four cameras can be associated with the same intercom.

Note: Double-clicking in a video cell causes the cell to expand to occupy the right side of the screen. Double-
clicking again returns the right side of the screen to its previous appearance. If you do not double-click again
within 30 seconds, the other video feeds are closed to save network bandwidth.

Top Bar Options


The following icons can be displayed in the bar at the top of each video cell:
Icon Meaning/Purpose
Click to use the camera's pan-tilt-zoom controls (if available). To use this feature, press and hold
the mouse button when the pointer is in the image, then move the pointer to move the camera in
the same direction. You can zoom in or out by pressing the CTRL keyboard button and moving
the mouse wheel.
Click to stretch the picture to fit the cell.
Click to view recorded, rather than live, video (if available). You can choose to start playback
from 1, 5, 10, 30 or 60 minutes before the current time (if available).
Click to save a snapshot of the current picture to a file (by default in "Program Data\Security
Management System\Intercom\Images").
Click to add a two-minute bookmark to the recording for the period leading up to the current
time. Bookmarks make it easier to locate events of interest when viewing recordings in the
"Home/Video & Audio/Video Playback" screen.
Using Video Replay Cells
If cameras are associated with an intercom, recorded video (if available) can be replayed by:

52
Symmetry Software Reference Manual

 Clicking when viewing live video. You can choose to start playback from 1, 5, 10, 30 or 60
minutes before the current time (if available). The cell changes to display recorded, rather than
live, video.

 Clicking in the Call Log. This displays the recordings from all cameras (if available). Playback
begins from the time the call was answered.

Note: Symmetry tags video recordings when the call is started, answered, finished and forwarded. These tags
can make it easier to locate events of interest in the "Home/Video & Audio/Video Playback" screen.

Top Bar Options


The following icons can be displayed in the bar at the top of each video cell:
Icon Meaning/Purpose
Click to stretch the picture to fit the cell.
Click to view live, rather than recorded, video.

Bottom Bar Options


The following icons can be displayed in the bar at the bottom of each video cell:
Icon Meaning/Purpose
Click to speed up, play, pause or slow down playback.

Drag and drop the slider to play from a different time.

Click to loop playback.


Click to save a snapshot of the current picture to a file (by default in "Program
Data\Security Management System\Intercom\Images").
Click to add a bookmark to the recording at the current time. Bookmarks make it easier to
locate events of interest when viewing recordings in the "Home/Video & Audio/Video
Playback" screen.
Click to export the video to a file (by default in "Program Data\Security Management
System\Intercom\Video"). The image must be paused before you can export video. The
period of video exported is the same as the period of playback you selected when you
started video playback. For example, if you selected 10 minutes, the period exported is
10-minute period prior to the time you started playback. If you started playback from the
Call Log, the period exported is the same as the duration of the call.

CCTV Cameras Screen ("Home/Video & Audio/CCTV Cameras")

General
Overview of this screen
Note: Symmetry does not currently support CCTV switchers, and therefore this screen.

This screen is available only if the CCTV license has been installed.
The screen enables you to control a selected camera's pan, tilt, zoom, focus and position (camera type
permitting) and to display the live pictures from the camera on the selected monitor. In the Selection screen,

53
CCTV Cameras Screen ("Home/Video & Audio/CCTV Cameras")

select the monitor, then click Find. Cameras connected to the same CCTV switcher as the monitor are listed.
Choose the camera, then click Open.

Note: the CCTV Cameras screen always displays the pictures from the monitor that is hardwired to your PC.
This monitor may be different from the monitor you select in the Selection screen.

You can select only those cameras or monitors that belongs to a company in your company group.
Click here for an overview of CCTV switching.
Using the Selection screen
The Selection screen is displayed when you select CCTV Cameras from "Home/Video & Audio". You can use
the Selection screen to select a monitor and camera. Click here for an overview of Selection screens and how
to use them.
The following options are specific to this Selection screen:
Select a Monitor
Before selecting Find, choose the monitor that the camera is to be switched to.
Camera Description
This option determines the cameras listed when you select Find. If the box is blank, all cameras connected
to the same switcher unit as the monitor are listed. If you want to narrow the search, type the camera
name in the box. You can find a range of cameras by using wildcards.

Definition Screen Options


Camera Selected
This read-only field displays the camera you selected in the Selection screen.
Monitor Selected
This read-only field displays the monitor you selected in the Selection screen. It is the monitor that is displaying
the pictures from the selected camera.

Note: the CCTV Cameras screen always displays the pictures from the monitor that is hardwired to your PC.
This monitor may be different from the monitor you selected in the Selection screen.

Camera Control (Pan, Tilt, Zoom, Focus, Preset)


These buttons enable you to control the pan/tilt, zoom, and focus of the camera, and to move the camera to a
pre-set position.
The screen displays only those controls that the camera supports (for example, controls for pan/tilt will be
missing if the camera does not support pan/tilt).
Some CCTV switcher units (such as Ernitec) support variable-speed pan and tilt controls.
Ancillary Control
These buttons enable you to control the ancillary devices. There is one pair of buttons for each ancillary device.
The upper button switches the device on and the lower button switches the device off.
If you select the "on" button, the device may switch on permanently, or switch on for a pre-defined period of
time only (as set up in the "Install/Video & Audio/CCTV/Ancillary" screen).
Dwelling the cursor over a button shows a tooltip, giving the name or purpose of the ancillary device.
Freeze/Resume
This toggles between Freeze and Resume. Selecting Freeze causes the CCTV image displayed in the CCTV
Cameras screen to be frozen. You can then print the image, if required. Selecting Resume returns the live
CCTV picture.

54
Symmetry Software Reference Manual

Print
This prints the screen, including the CCTV image. This button is enabled when you select Freeze.

Intercom Control Screen ("Home/Video & Audio/Intercom Control")

General
Purpose of the Intercom Control Screen
The "Home/Video & Audio/Intercom Control" screen is used to manage intercom calls from a Stentofon
Alphacom intercom system. If you are using a Zenitel Pulse intercom system, use the "Home/Video &
Audio/Intercom" screen instead.
You can use the "Home/Video & Audio/Intercom Control" screen to:
 Answer call requests. A call request is created when a call request button is pressed at an intercom,
typically by visitors or other personnel who require access to the building. When a call request is
received, you can choose to open a line between the intercom located at your PC and the intercom
from which the call request was made. After speaking with the caller, you can press a Command
button, which can perform an action such as opening a door or barrier.
 Open a line between the intercom located at your PC and any other intercom. This allows you to
speak with people at other intercoms around the building, even if no call request has been
received.
The screen can be used only if the installer has used the "Install/Video & Audio/Intercom/Clients" screen to set
up your PC as a Stentofon Alphacom Intercom client.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Displaying the Required Buttons
The main area of the screen shows the following button for each intercom:

You can use the Intercom Group menu to display buttons for All Intercoms, or for only those in a selected
group (as defined in the "Setup/Device Groups/Intercoms" screen).
If there are more buttons than can fit on the screen at any one time, you can use the arrow buttons to display
the remaining buttons.

Note: You can display buttons for only those intercoms belonging to the currently selected company.

Receiving Call Requests


When a call request is received from an intercom, it is listed in the Requests area on the right of the screen,
and the corresponding button changes to the following (with a flashing pale blue border):

The Requests area can list multiple call requests. The call requests are listed in order of receipt, with the oldest
at the top. Arrow buttons are provided for scrolling up/down the list. Each intercom can be associated with a
different sound, and the sound played is always the one associated with the call request at the top of the list.
If you minimize the "Home/Video & Audio/Intercom Control" screen, the screen is maximized automatically
when a new call request is received.

55
Intercom Control Screen ("Home/Video & Audio/Intercom Control")

Answering Call Requests


You can answer a call request as follows:
1. Press the intercom button (with the pale blue border), or select the call request from the Requests list and
click the Connect button. Clicking Connect without selecting a call request connects to the first in the list.
It is not possible for more than one user to connect to the same intercom at the same time.
2. If you have to wait to connect to the intercom (for example, because a handset has to be picked up at the
intercom), you will see the button change to the following (olive border):

3. When a successful connection is made, the button changes to the following (orange border):

4. Speak with the person at the intercom.


5. If the intercom has been associated with a command (in the "Install/Video & Audio/Intercom/Station"
screen), the Command button is enabled. Pressing the button sends the command. Typically, the command is
used to open a door or barrier for the caller.
6. When you want to terminate the conversation, click the button shown above or choose Connect again. The
call request is removed from the list, and the button changes to display the default icon.
Calling Other Intercoms
You can open a line to any intercom simply by clicking on the button associated with the intercom you want to
connect to, even if no call request has been received. Once a successful connection is made, the button of the
intercom you are using (if shown) is displayed as follows and the one you are connecting to is displayed with an
orange border.

If the intercom has been associated with a command, the Command button is enabled while you are
connected to the intercom.
You can terminate the call simply by clicking the button again (or another button).

Note: Any two intercoms currently communicating are indicated with the above button icon. This enables you to
determine which intercoms are currently in use.

Silencing Sounds
Clicking the Silence button silences the sound until a new call request is received.
Clearing Call Requests
You can clear any call request listed in the Requests area by selecting the call request and clicking the Clear
button. The button representing the intercom from which the call request was made returns to its default state.
Using the Stations List
Clicking the Stations button displays a list of intercoms. All intercoms are listed if Intercom Group is set to All
Intercoms; otherwise, only those in the selected group are listed.
You can use the list of intercoms in the same way as the intercom buttons to answer a call request from a
selected intercom, or to call a different intercom.
The button text changes to Requests; clicking the button returns the list to displaying outstanding call requests.

56
Symmetry Software Reference Manual

Displaying a Graphic of the Location of an Intercom


If an intercom's location has been specified on a graphic using the "Setup/Graphics/Setup" screen, you can
display the graphic by selecting the intercom in the Requests area, followed by the Graphic button.
Displaying Video
Live video is appears automatically on the right-hand side of the screen when there is a call request from an
intercom that has an associated camera, as configured in the "Install/Video & Audio/Intercom/Stations" screen.
Live video can also be displayed by clicking a call request from an intercom that has an associated camera.
Various options are available in the title bar (such as to select a camera preset position), and from the right-
click menu (such as to record video). These are the same as are available in the Virtual Matrix.
If the camera is a pan-tilt-zoom (PTZ) camera, you can mode the camera by holding down the right mouse key
while moving the mouse pointer within the area.
Video privacy zones are maintained, if configured for the camera.

General Options
Graphic
If an intercom's location has been specified on a graphic using the "Setup/Graphics/Setup" screen, you can
display the graphic by selecting the intercom in the Requests area, followed by the Graphic button.

Video Status Screen ("Maintenance/Video/Video Status")

General
You can use this screen to view the current status of:
 Symmetry NVRs
 Cameras
 CompleteView video servers (NVRs) and their cameras

Note: The screen may take some time to obtain all video status results. A progress bar near the center of the
screen indicates approximate percentage completion.

Cameras - IP/Encoder section


The "Cameras - IP/Encoder" section shows general information about the cameras, such as the total number of
cameras, and the number of cameras that are recording.
Latest Video Recorded shows the number of cameras that have recorded video older than a specified number
of days (by default, 7). You can change the number of days using the Settings button. The field shows a
warning cross if the number of cameras that have recorded video older than the specified number of days
exceeds the Warn if count is more than setting.
Network Video Recorders section
The "Network Video Recorders" section lists each Symmetry and CompleteView NVR, information such as the
IP address or network name, and their status. You can click a column header to sort by that column (click again
to reverse the sort order).
Test Report Details section
The "Test Report Details" section provides status information about each digital video device. You can filter the
content using the Filter Report By and Description. Clicking Clear clears this status information.
Clicking a device in the "Test Report Details" section provides additional information about the device, such as
repository, performance, memory and version information for a CompleteView video server.

57
Card Holders Screen ("Home/Identity/Card Holders")

Screen Options
Filter Report By / Description
Filter Report By allows you to list only those cameras with a selected status. Description allows you to filter
the results further by camera name. For example, if you select Cameras Recording from Filter Report By,
and enter "North" in the Description field, only cameras that are recording whose name includes "North" are
listed.
After entering text in the Description field, press Enter or click to action the filter.
Leaving the Description field empty means "match all".

Analyze
You can refresh the screen by clicking Analyze.
Settings
This gives access to settings for the Video Status screen, such as the Auto-Update Interval and Camera Not
Recording Warning settings.
Clear
Clears the current "Test Report Details". Click Analyze to refresh the report details.
Save
Clicking Save allows you to save the report to txt files (SystemInfo.txt and DiagnosticLog.txt). Windows Event
Viewer log files are also created. The file names are prefixed with the current date and time.
Print
Clicking Print prints a Video Diagnostic Report.

Card Holders Screen ("Home/Identity/Card Holders")

General
Overview of this screen
You can use the Card Holders screen to create, find, view, modify, copy or delete card holders and their details.
A card holder is a standard employee or official of your organization.
A card holder's details can include their card number, PIN, access rights, biometric information and any special
options that the card holder may have, such as being an executive or keycard holder. You can also use the
screen to assign badges and view a card's last 25 transactions.

Note: You may have no access to some card holders, tabs or options, depending on your permissions.
Permissions to tabs and options are set up in the "Maintenance/User & Preferences/Roles" screen.
Permissions to access a specific card holder are set up using the Permissions button when defining the card
holder.

Click here for information about adding and editing card details.
Using the Selection screen
The Selection screen is displayed when you select Card Holders from "Home/Identity". You can use the
Selection screen to create a new card holder or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

58
Symmetry Software Reference Manual

The following options are specific to this Selection screen:


Filter By
(Other options are displayed below Filter By, depending on the option you choose.)
Card Data Title
Card Format
Card Name
Card Number
Employee Reference
Active and Inactive Date
Select By Status
(other filter options on the screen may affect the number of card holders listed when you select Find.)
Active
All
Expired
Force Card Inactive
Forced Cardholder Inactive
Inactive
Lost
Not Issued
Not Yet Valid
Stopped
Temporary
Vacation

Definition Screen Options


Last Name/First/Middle Name
About the Previous and Next Buttons
When you are in the Definition screen, you can use the following icons located in the top-right corner of the
screen to display the previous or next record in the database:

If you have made any changes, you are prompted to save those changes before the previous or next record is
displayed.
Card Details Tab
Card Number
Active Date
Inactive Date\Time
Employee Ref
Approving Official
Badge Design
Company Name
PIN Code
IDS Code
Card Issue Level

59
Card Holders Screen ("Home/Identity/Card Holders")

Facility/Customer Code
Live
Import
Clear
Export
Card Status:
Badge Expires
Usage Remaining
Deactivate at Level
Card Format
Icon:
Active
Inactive
Expired
New
Not Yet Valid
Stop
Vacation
Force Cardholder Inactive
Force Card Inactive
Stop
Set for Batch Printing
Card Lost
Additional Options:
Area Occupancy Card
Card Watch
Command Card Holder
Conditional Card
Executive Card (and exemptions)
Extended Door Times
Keycard Holder
Patrol Card
Visitor Escort
Allow Double Present Toggle Mode Activation
Assa DSR:
Passage / Double Swipe Mode
Deadbolt Override
Access Rights Tab
Click here for general information about this tab.
Page View/Normal View
Show All
Expand
Collapse
Listing

60
Symmetry Software Reference Manual

Assign
Remove
Dates
Threat
Reset
Personal Tab
About the Personal Tab
Visitor Management Login:
Allow Visitor Management Login for this Cardholder
User Name
Password
Locator Tab
Locating a Card Holder
Reset Passback
Visitors Tab
The Visitors tab is displayed if Visitor Escort has been selected, the card holder has a card number and the
card status is New or Active.
The upper area of the Visitors tab lists the visitors that the card holder has been assigned to escort. The lower
area lists those visitors who have not yet been assigned an escort. Date Assigned is the date the visitor was
assigned to the escort.
You can select one or more visitors and click Remove (to remove them from the upper area) or Assign (to add
them to the upper area) as appropriate.
Visitors can be added or their details changed using the "Home/Identity/Visitors" screen.

Note: You might not have access to the Visitors tab, depending on your user permissions, as set up in the
"Maintenance/User & Preferences/Roles" screen.

Biometrics Tab
About the Biometrics Tab
The Biometrics tab allows you to capture and store the person's signature (to print on a badge) and to
enroll biometric data, such as a fingerprint from a fingerprint enrollment reader.
You can encode smart cards by using the Encode button or from the enrollment dialog displayed by
selecting Capture S813 (if S81x enrollment readers are being used).
Overview of Fingerprint Readers

Note: You may have no access to some tabs and buttons, depending on your user permissions, as set
up in the "Maintenance/User & Preferences/Roles" screen.

Status \ Capture Suprema


This field and button are used for capturing fingerprints from Suprema BioLite N2 fingerprint enrollment
readers.
Status - When fingerprint data has been captured, this displays the number of fingerprints enrolled, and
the number used for normal access control.
Capture Suprema - Selecting this option enables you to capture fingerprints. The fingerprint data is saved
when you select Encode, Badge or Save.

61
Card Holders Screen ("Home/Identity/Card Holders")

Status \ Capture S813


This field and button are used for capturing fingerprints from S81x fingerprint enrollment readers.
Status - When fingerprint data has been captured, this displays the number of fingerprints enrolled, the
number used for normal access control and the number used for duress.
Capture S813 - Selecting this option enables you to capture fingerprints. The fingerprint data is saved
when you select Encode, Badge or Save.
Bioscrypt Biometric Fingerprint Template: Status \ Capture
This field and button are used for capturing fingerprints from Bioscrypt fingerprint enrollment readers.
Status - "Template Stored in Database" is displayed when the fingerprint data has been captured.
Capture - Selecting this option enables fingerprint data to be captured from a Bioscrypt fingerprint
enrollment reader. The fingerprint data is saved when you select Encode, Badge or Save.
Biometric Hand Template: Status \ Capture
This field and button are used for capturing hand prints from an HKCR Biometric Hand Geometry Unit.
Overview of Hand Templates and HGUs
Status - "Template Stored in Database" is displayed when the Biometric hand template has been
captured.
Capture - Selecting this option requests the template number of the hand currently presented to the Hand
Geometry Unit (HGU) to be captured. This number is saved when you select Encode, Badge or Save.
Follow the displayed instructions when you select the option.
Signature:
Live
Import
Import Pad
Export
Biometric Enrolment:Capture
Click Capture starts a third-party application to enrol fingerprint, iris, facial or other biometric data. The
application name and location are specified in the [EnrollApp] or [BioEnrolment] section of multimax.ini
(see the Symmetry Software Installation Manual).
The application starts with one or more parameters, as documented in the Symmetry Software Installation
Manual.
Vacation Tab
This tab allows you to view and specify the card holder's vacation times in a calendar.
Note: This tab is available only if your user role (as defined in the "Maintenance/User & Preferences/Roles"
screen) allows you to access it.
Vacations are used to specify times when individual card holders are taking a period of leave or rest from work.
During a vacation, the card holder is not able to gain access - this is to comply with employment law in
countries that require people to be offsite during vacations. Card holders who are on vacation have a status of
"Vacation" in the Card Details tab.
If a card holder attempts to gain access during a vacation, a "Card Holder on Vacation" alarm/event message is
generated and the card holder is not granted access.
Before specifying vacations, set up standard times for vacations (such as 00:00 to 12:00, and 00:00 to 24:00) in
the "Operation/Times/Hours" screen. You can specify non-standard times directly into the Vacation tab by
selecting the <Variable> option from the menu near the bottom-left corner of the tab.
Vacation times have a resolution of one hour.

62
Symmetry Software Reference Manual

What is the difference between holidays and vacations?


Holidays are defined in the "Operation/Times/Holiday" screen and are used to specify public holidays, site
shutdown periods and other dates. Holidays can be used to affect the access rights of many people within
the organization.
Vacations are specific to individual card holders. They are used to specify leave or rest periods that require
the card holder to be offsite to comply with employment laws.
Adding and removing vacations
To add vacations:
1. Select the vacation date(s). You can drag the mouse, use shift-click or ctrl-click to select multiple
dates.
2. In the menu near the bottom-left corner of the tab, select one of the following:
 An existing hours definition, as set up in the "Operation/Times/Hours" screen.
Alternatively, enter the hours definition number (if you know it) in the box to the left of
the menu. The bar will display the hours in the selected hours definition.
 <Create New> - To create a new hours definition.
 <Edit Existing> - To edit the hours definition currently selected in this menu.
 <Variable> - To specify hours directly in the bar to the right of the menu. You can
specify the hours graphically by clicking and dragging the mouse. Alternatively,
double-click the bar to specify the hours in a dialog. Note: the help for the
"Operation/Times/Hours" screen gives detailed information about using the bar.
3. Click Assign. The vacation hours are applied to the selected date(s).
If you want to remove vacations, select the date(s), then click Remove.
Viewing or changing existing vacation dates
Each date indicates the number of the hours definition used on that date. For example, if May 27th shows
"2", then hours definition number 2 is used on that date. A "v" indicates a date that uses the <Variable>
hours definition.
The color shown in each day of the calendar depends on the color assigned to the hours definition in the
"Operation/Times/Hours" screen. Days that use the <Variable> hours definition are colored orange-brown.
Hovering the cursor over a vacation date displays the name of the hours definition used on that date.
The bar near the bottom of the tab shows the intervals in the hours definition assigned to the currently
selected date. The menu to the left of the bar shows the name of the hours definition. Right-clicking in the
bar displays standard Cut, Copy, Paste and Delete options, together with a Times option to enter the
intervals manually.
To override the hours definition used on a selected date, click on the date, choose the hours definition
(using the menu or field near the bottom-left corner of the tab), then click Assign.

Note: You can select multiple dates by pressing Shift or Ctrl between clicks, or by clicking and dragging
the mouse (standard Windows techniques). If the dates have different hours definitions assigned, the
menu displays "Multiple Hours Selected".

Copy
Move
Badge
Encode
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

63
Visitors Screen ("Home/Identity/Visitors")

Visitors Screen ("Home/Identity/Visitors")

General
Overview of this screen
You can use the "Home/Identity/Visitors" screen to create, find, view, modify, copy or delete visitor details.
Click here for information about adding and editing card details.
Click here for general information about visitor management.
Using the Selection screen
The Selection screen is displayed when you select Visitors from "Home/Identity". You can use the Selection
screen to create a new visitor or to find an existing one to edit. Click here for an overview of Selection screens
and how to use them.
The following options are specific to this Selection screen:
Filter By
(other options are displayed below Filter By, depending on the option you choose)
Card Format
Today's Visitors
Visitor Card Name
Visitor Card Number
Visitor Data Title
Visitor Visiting
Arriving and Departing
Select By Status
(other filter options on the screen may affect the number of visitors listed when you select Find.)
Active
All
Expired
Force Cardholder Inactive
Inactive
Lost
Not Issued
Not Yet Valid
Stopped
Visitor Active
Visitor Closed
Visitor Pending
Auto Update and Minutes

Definition Screen Options


Last Name/First/Middle Name
Representing
Vehicle
Visitor Details Tab
Arriving, Arriving Time, Departing, Departing Time

64
Symmetry Software Reference Manual

Visiting
Contact Number
Visitor Escort
Badge Design
Badge Expires
Set for Batch Printing
Message
History
Visitor Status:
Pending
Active
Closed
Stop
Stop
Sign In
Sign Out
Close
Live
Import
Clear
Export
Visitor's Business Card:
Scan
Import
Export
View
Card Details Tab
Card Number
Active Date
Inactive Date\Time
Approving Official
Company Name
PIN Code
Card Issue Level
Facility/Customer Code
Card Status:
Badge Expires
Usage Remaining
Deactivate at Level
Card Format
Icon:
Active
Inactive
Expired

65
Visitors Screen ("Home/Identity/Visitors")

New
Not Yet Valid
Force Cardholder Inactive
Card Lost
Additional Options:
Area Occupancy Card
Card Watch
Extended Door Times
Executive Card (and Exemptions)
Access Rights Tab
Click here for general information about this tab.
Page View/Normal View
Show All
Expand
Collapse
Listing
Assign
Remove
Dates
Threat
Reset
Personal Tab
About the Personal Tab
Locator Tab
Locating a Card Holder
Reset Passback
Biometrics Tab
About the Biometrics Tab
The Biometrics tab allows you to capture and store the person's signature (to print on a badge) and to
enroll biometric data, such as a fingerprint from a fingerprint enrollment reader.
You can encode smart cards by using the Encode button or from the enrollment dialog displayed by
selecting Capture S813 (if S81x enrollment readers are being used).
Overview of Fingerprint Readers

Note: You may have no access to some tabs and buttons, depending on your user permissions, as set
up in the "Maintenance/User & Preferences/Roles" screen.

Status \ Capture Suprema


This field and button are used for capturing fingerprints from Suprema BioLite N2 fingerprint enrollment
readers.
Status - When fingerprint data has been captured, this displays the number of fingerprints enrolled, and
the number used for normal access control.
Capture Suprema - Selecting this option enables you to capture fingerprints. The fingerprint data is saved
when you select Encode, Badge or Save.

66
Symmetry Software Reference Manual

Status \ Capture S813


This field and button are used for capturing fingerprints from S81x fingerprint enrollment readers.
Status - When fingerprint data has been captured, this displays the number of fingerprints enrolled, the
number used for normal access control and the number used for duress.
Capture S813 - Selecting this option enables you to capture fingerprints. The fingerprint data is saved
when you select Encode, Badge or Save.
Bioscrypt Biometric Fingerprint Template: Status \ Capture
This field and button are used for capturing fingerprints from Bioscrypt fingerprint enrollment readers.
Status - "Template Stored in Database" is displayed when the fingerprint data has been captured.
Capture - Selecting this option enables fingerprint data to be captured from a Bioscrypt fingerprint
enrollment reader. The fingerprint data is saved when you select Encode, Badge or Save.
Biometric Hand Template: Status \ Capture
This field and button are used for capturing hand prints from an HKCR Biometric Hand Geometry Unit.
Overview of Hand Templates and HGUs
Status - "Template Stored in Database" is displayed when the Biometric hand template has been
captured.
Capture - Selecting this option requests the template number of the hand currently presented to the Hand
Geometry Unit (HGU) to be captured. This number is saved when you select Encode, Badge or Save.
Follow the displayed instructions when you select the option.
Signature:
Live
Import
Import Pad
Export
Biometric Enrolment:Capture
Click Capture starts a third-party application to enrol fingerprint, iris, facial or other biometric data. The
application name and location are specified in the [EnrollApp] or [BioEnrolment] section of multimax.ini
(see the Symmetry Software Installation Manual).
The application starts with one or more parameters, as documented in the Symmetry Software Installation
Manual.
Copy
Move
Badge
Encode
Copy/Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
You may not have access to Copy, depending on your user permissions, as set up in the "Maintenance/User &
Preferences/Roles" screen.

67
Identity Verification Screen ("Home/Identity/Verification")

Identity Verification Screen ("Home/Identity/Verification")

Introduction
Purpose of this screen

Note: To use this screen, Identity Verification must have been selected in the Symmetry Device Integrations
screen during the installation of Symmetry, as described in the Symmetry Software Installation Manual.

This screen enables you to monitor the identity of people at "entry points" to the site and control access at
those entry points. An entry point is a reader at a door, barrier, turnstile or other device that controls access. Up
to 27 entry points can be monitored simultaneously.
Normally, the screen is configured to display live video at each entry point.
When a card holder or visitor performs an access-control transaction, the screen automatically displays the
stored image of the card holder or visitor, providing that person is known to Symmetry. This allows you to check
the person's stored image against the live video image.
Optionally, the screen can be set up in manual verification mode (otherwise known as PC Door Control mode).
In this mode, you are required to choose whether to allow or deny access for each valid access-control
transaction.
The entry points displayed at any one time are defined in a "view", as set up in the "Setup/Identity
Verification/View" screen. If more than one view has been set up, you can choose to display a different view by
clicking the following icon located near the top-right corner of the screen:

You can select any view set up for a company in your company group. The name of the view you are currently
displaying is shown at the top of the screen. The next time you open the screen, the last view you used is
automatically displayed.
Information displayed
The screen displays a cell for each entry point in the view. Each cell contains the following (from left to right):
 Live video image(s) at the entry point, if cameras have been associated with the entry point in the
"Setup/Identity Verification/Entry Point" screen. If the camera view allows Pan-Tilt-Zoom (PTZ),
you can use the mouse for PTZ movements.
 An area for the stored image of a card holder/visitor. An image is displayed in this area when a card
known to Symmetry is used at the entry point, or when you select a card using the Lookup Card
Holder button.
 An area for buttons such as Grant Access, Deny Access, Unlock, Pause, etc.
 An area that shows:
o The last transaction (alarm/event) at the entry point, such as "Door Forced" or "Granted
Access". The alarm/event text is displayed in the color defined in the
"Operation/Alarms/Definitions" screen. For details of the meaning of alarms/events, please
refer to Alarm/Event Messages.
o The date and time of the alarm/event.
o Any card or personal details of the card holder/visitor who caused the alarm/event (if
known). The card and personal details to include are specified in the "Setup/Identity
Verification/Data Titles" screen.
Note: Your user role may restrict the views, video images and commands you can use. This is controlled by the
Permissions button in the appropriate screens. For example, the Permissions button in the
"Operation/Commands/Predefined" screen may limit the predefined commands that are available to your user
role.

68
Symmetry Software Reference Manual

Note: The Auto Clear After option in the "Setup/Identity Verification/Data Titles" screen specifies the length of
time the stored image and card/personal details are displayed following a grant/deny access transaction.
The Video Verification screen can also display previous transactions if the current view contains only one entry
point and Rotate View is set in the "Setup/Identity Verification/View" screen. The number of previous
transactions displayed is specified by Entry Point History Limit, also configured in the "Setup/Identity
Verification/View" screen. When Rotate View is set, the top cell of the screen displays the standard live
information. The remaining cells display the previous transactions, including still video image(s) taken at the
time of each transaction.
Using manual and automatic verification modes
An entry point can be in one of the following two modes, as selected by the Enable Manual Verification or
Enable Automatic Verification button:
Manual verification mode
If an entry point is in manual verification mode (PC Door Control mode on), you must choose whether to
grant or deny access after each valid access-control transaction. You can do this using the Grant Access
or Deny Access button.
When using manual verification mode, a sound can be made when there is a transaction at the reader.
The sound is configured in the "Setup/Identity Verification/Entry Point" screen.
Automatic verification mode
If an entry point is in automatic verification mode (PC Door Control mode off), the system automatically
grants or denies access depending on access rights. In addition, if Card Alarm Notification is set in the
"Setup/Identity Verification/Entry Point" screen, a card alarm (such as "At Wrong Door") prompts the user
of the "Home/Identity/Verification" screen to choose whether to grant or deny access.
In automatic verification mode, the Grant Access button is also permanently available. This enables you
to grant access at any time, without a card transaction taking place at the reader. However, if the person
requiring access is a card holder in the database, it is recommended that you use the Lookup Card
Holder button to locate the card holder in the database, then click Grant Access or Deny Access. This
allows the card holder's antipassback status to be maintained (if used), the card holder to be located using
the "Home/Identity/Locator" screen, and the grant/deny access selection to be logged. See below for other
important information about Lookup Card Holder.
Note: Any action you take to, for example, grant or deny access is logged in the User Audit log
("Reports/History/User Audit"), with the card number, if known.
Note: The Lookup Card Holder, Grant Access and Deny Access buttons are available only if enabled in the
"Setup/Identity/Entry Point" screen.
About the side bar
The side bar contains a button for each entry point in the view. A button is highlighted in red if there is a
transaction at the entry point that needs you attention, such as an incoming intercom call. Clicking the button
brings the entry point into view if it is not currently displayed. The title bar of the entry point is pulsed if attention
is required. The text (tag name) displayed in each button is defined in the "Setup/Identity Verification/Entry
Point" screen.
The side bar also contains standard scroll-up and scroll-down buttons.
Clicking the following button displays the entry point that you should service first (that is, has been outstanding
the longest):

You can move the side bar to the opposite side using the following:

69
Identity Verification Screen ("Home/Identity/Verification")

Buttons
The following buttons are available for each entry point:
Grant Access (icon set in the "Setup/Identity Verification/Entry
Point" screen) - Click to grant access.
The button is available if Allow Grant Access is selected in the
"Setup/Identity Verification/Entry Point" screen and one of the
following is true:
 You have used the Lookup Card Holder button to
locate a card holder in the database.
 The entry point is in manual verification mode and
there has been a valid access-control transaction,
as determined by the person's access rights. The
button is made available only for a limited period.
 The entry point is in automatic verification mode.
You can grant access at ant time. See Using
manual and automatic verification modes, above.
The door will automatically re-lock after a pre-defined period (as set
up in the "Install/Access Control/Reader" screen).
Deny Access (icon set in the "Setup/Identity Verification/Entry
Point" screen) - Click to deny access.
The button is available if Allow Deny Access is selected in the
"Setup/Identity Verification/Entry Point" screen and one of the
following listed above is true.
Unlock/Lock - Click to unlock or lock the entry point. The icon
indicates the current state.

Connect Intercom/Disconnect Intercom - Click to speak to the


person at the entry point, or to hang up after you have finished. The
green handset icon displays a flashing border when there is an
incoming call request.
These buttons are available if an intercom has been added to the
entry point in the "Setup/Identity Verification/Entry Point" screen.
Lookup Card Holder - You can use this button to find any card
holder defined in the "Home/Identity/Card Holders" screen. You can
then use the Grant Access or Deny Access button.
This option may be useful if, for example, the card holder has
forgotten his/her card.
By default, after locating a card holder in the database, you can
grant access only if that person's access rights allow entry through
the door at that time. If the Allow Temporary Cardholder Access
Rights permission is selected in your user role, you can grant
access irrespective of the person's access rights. In this event, the
cell displays "User Allowed Access with Bypass".
Pause/Resume - Click Pause to pause the live video image. Click
Resume to resume live video display.
If Auto Pause Video (Manual Verification) is selected in the
"Setup/Identity Verification/Entry Point" screen, the image is
automatically paused when there is an access control transaction in
manual verification mode. Live video resumes once you have
granted/denied access.
Live video resumes automatically if video is paused and there is a
new transaction at the entry point, but will then re-pause if Auto

70
Symmetry Software Reference Manual

Pause Video (Manual Verification) is set. Live video also resumes


if paused and you grant/deny access.
Print - Click to print the live picture, card/personal information and
the picture of the card holder or visitor stored in the database. The
default Windows printer is used.
Command 1/2/3 - Click to action a predefined command. These
button(s) are available if command(s) been added to the entry point
in the "Setup/Identity Verification/Entry Point" screen.
Add Activity Comment - This is displayed only if enabled in the
"Setup\Identity Verification\Entry Point" screen. Click to add a
comment for the currently-displayed alarm\event message.
Enable Automatic Verification/Enable Manual Verification -
Click to switch between automatic and manual verification modes.
See Using manual and automatic verification modes, above.

Locator Screen ("Home/Identity/Locator")

General
Overview of this screen
This screen helps you to determine the current location of one or more card owners. It shows, for each selected
person, the name of the reader the person used.
Click Find to list the locations of everyone who matches the search criteria.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is deselected (the
default), you can find the location of any person who is associated with a company in your company group. If
Filter by Company is selected, you can find the location of any person who is associated with the currently
selected company.

Screen Options
Company Name
Select the Symmetry company that the person you wish to locate is associated with.
Filter By
The Filter By option enables you to reduce the number of people listed in the screen when you select Find.
Filter By can make it easier for you to locate an existing card holder.
Once you have selected an option from the Filter By pull-down list, other fields are displayed that enable you to
be even more selective about the card holders to list.
The following Filter By options are available:
Card Data Title
Card Name
Card Number
Visitor Card Name

71
Bulk Card Amendments Screen ("Home/Identity/Bulk Card Amendments")

Bulk Card Amendments Screen ("Home/Identity/Bulk Card


Amendments")

General
About the Bulk Card Amendments Screen
You can use the Bulk Card Amendments screen to change the details of multiple card holders or visitors in one
operation. The changes you make are applied to all the selected people.
You can change information such as the active/inactive date, badge design, inactive status, access rights and
personal data.

Note: You may have no access to some card holders, visitors, tabs or buttons, depending on your permissions.
Permissions to tabs and buttons are set up in the "Maintenance/User & Preferences/Roles" screen.
Permissions to access a specific visitor or card holder are set up using the Permissions button when defining
the visitor or card holder. Also, note that you are not given access to the details of card holders or visitors
whose details are already being edited by another user logged in.

Using the Bulk Card Amendments Screen


To use the Bulk Card Amendments screen:
1. Select Visitor Cards if you want to find visitors, or leave the option unchecked to find standard card
holders.
2. Use Filter By to choose the method of finding the card holders or visitors to amend.

Note: If Card Holders by Company is selected in the "Maintenance/User & Preferences/System


Preferences" screen, you can find only those card holders and visitors who belong to the currently-
selected company. If Card Holders by Company is not selected, a Company menu is displayed, which
allows you to filter the listed card holders or visitors according to the company they belong to.

3. Click Find. The people matching Filter By and Company (if applicable) are listed in the left-hand area of
the screen.
4. In the left-hand area of the screen, select the card holders or visitors you want to amend, then click the >>
button.

Note: If you select a card holder or visitor who does not belong to the currently-selected company, you
can make changes only in the Access Rights tab. The options in the Card Details and Personal Details
tabs are grayed out to prevent you from making changes in those tabs.

5. If required, repeat steps 1 to 4 using different filter options to select other card holders or visitors.
6. Amend the details in the appropriate tabs, then click OK.

Screen Options
Selection Tab
Filter By
(Other options are displayed below Filter By, depending on the option you choose.)

Note: When you select a filter such as Card Holders Associated with a Reader Group, the secondary
menu (in this case, Reader Group) lists only those items that belong to the currently-selected company.
This reflects the behavior of the Access Rights tab, which allows you to assign access rights only to
reader groups, etc. that belong to the currently-selected company.

72
Symmetry Software Reference Manual

Card Data Title


Card Holders Associated with a Door
Card Holders Associated with a Floor/Output Group
Cards Associated with a Reader Group
Cards Associated with a Timecode
Cards Associated with an Access Code
Card Name
Card Number
Cards Deactivated at this Threat Level
Cards Expiring Between Badge Date
Cards Expiring Between Inactive Date
Cards Unused For This Number of Days Prior to Today
Cards Using This Door
Cards Using This Door Group
Cards Using This Time Zone
Employee Reference
Company
This menu is displayed only if there is more than one company set up in Symmetry and Card Holders By
Company is not selected in the "Maintenance/User & Preferences/System Preferences" screen.
The Company menu allows you to filter the listed card holders or visitors according to the company they
belong to. When you click Find, the left-hand area of the screen lists only those card holders or visitors
who belong to the selected company. If you choose <All Companies>, all card holders or visitors who
match Filter by are listed, irrespective of their company.
If Visitor Cards is selected, the Company menu lists all companies that have visitors. If Visitor Cards is
not selected, Company lists all companies that have card holders.
Visitor Cards
All
Clear
Delete All
Entries Found
Entries Selected
>>
<<
Card Details Tab
Change Active Date to
Change Inactive Date to
Change Badge Design to
Badge Expires
Reset Passback Location to Neutral
Change Permissions to
Force Cardholder Inactive Setting
Change Deactivate at Threat Level to:
Change Usage Remaining
Notes

73
Bulk Card Amendments Screen ("Home/Identity/Bulk Card Amendments")

Access Rights Tab


Overview
You can use the Access Rights tab to remove or add access rights for the selected cards.
The tab operates almost in the same manner as the Access Rights tab in the "Home/Identity/Card Holders"
or "Home/Identity/Visitors" screen. See "Overview of the Access Rights tab" if you need general
information about this tab. The following describes the features that are available only when setting up
access rights from the Bulk Card Amendments screen.

Note: You may not be able to select certain access codes, readers, reader groups, floor groups and
shared floor/reader groups, depending on the permissions assigned to those items when they were
defined (using the Permissions button).

Existing Access Rights


[Existing Access Rights]is displayed in an access rights section (such as theReaderssection) if
one or more of the selected cards has access rights already defined for that section. All access
rights belonging to all of the selected cards are displayed. For example, if:
"Card Holder 1" has access rights of "Reader 1 @ Time Code 1" and
"Card Holder 2" has access rights of "Reader 2 @ Time Code 2"
Then theExisting Access Rightssection will display both, that is:
"Reader 1 @ Time Code 1"
"Reader 2 @ Time Code 2"
Note that the access rights listed in an [Existing Access Rights] section are not automatically
added to each card when you select OK. The [Existing Access Rights] section only enables you to
view the existing access rights and to remove existing access rights.
Existing access rights to shared reader groups or shared floor groups are grayed out if they are not
shared to the currently-selected company.
Removing an Access Right
If you remove an existing access right from the [Existing Access Rights] section, such as "Reader
1 @ Time Code 1", it is removed from any card that has that access right.
Adding an Access Right
You can add an access right by clicking Assign on an access rights section, such as the Readers
section. The access right will be added to every selected card that does not already have that
access right.
Once you have selected a new access right, you cannot add further card holders to the selection list.
Multiple Date Ranges in Advanced Access Rights
You will see[Multiple Date Ranges]next to an advanced access right section (such as "Advanced
1") if different cards have a different date range for the access right.
If you enter a date range, it will be applied to the selected advanced access right for all selected
cards.
Page View/Normal
Show All
Expand
Collapse
Assign
Remove
Dates
Threat

74
Symmetry Software Reference Manual

Reset
Personal Details Tab
You can use the Personal Details tab to amend the personal details of all selected card holders or visitors.
Existing personal data is not shown in the screen.
Personal data you enter or choose in a field overwrites any existing personal data in that field for all selected
card holders or visitors. No changes are applied to those fields that you leave unchanged.
The "Setup/Identity/Personal Data/Card Holder Titles" screen and "Setup/Identity/Personal Data/Visitor Titles"
screen can specify fields to be mandatory or "List Only". These restrictions are ignored when defining personal
data in the Bulk Card Amendments screen.
Selecting a Remove option will remove any personal data specified for that title for all selected card holders or
visitors.

Note: Your user permissions ("Maintenance/User & Preferences/Roles" screen) may stop you from accessing
groups of personal data titles in this screen.
Note: Click here for further details.

Find
This button, which is available only when the Selection tab is displayed, lists the people who match the Filter
By selections.
The button is grayed out if there any records listed in the right-hand area of the screen (to prevent the same
person from being selected more than once).
Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Print Badges Screen ("Home/Identity/Print Badges")

General
Overview of this screen
You can use this screen to print one or a series of badges in one operation.
Use the Selection screen to select the badges you wish to print, then select Open to display the Print Badges
screen. You can use the Print Badges screen to change the badge design, encoding options and printer setup,
and to start the printing process.

Note: If a card holder has more than one card defined in the "Home/Identity/Card Holders" screen (not
applicable at Central Card Handler clients), the badge is printed using the card number of the first card.

You can print badges only for people who are associated with the currently selected company.
If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System
Preferences" screen, the same card credentials cannot be encoded onto more than one card. For further
details, please refer to the help for Prevent Duplicate Credential Encoding in the System Preference screen.
Using the Selection screen
The Selection screen is displayed when you select Print Badges from "Home/Identity". You can use the
Selection screen to select the badges to print. Click here for an overview of Selection screens and how to use
them.
The following option is specific to this Selection screen:

75
Print Badges Screen ("Home/Identity/Print Badges")

Filter By
The Filter By option in the Print Badges screen enables you to reduce the number of people listed in the
Selection screen when you select Find. Filter By can make it easier for you to find an existing badge for
printing.
Once you have selected an option from the Filter By pull-down list, other fields are displayed that enable
you to be even more selective about the people to list.
The following Filter By options are available:
Badges Flagged for Batch Printing
Card Data Title
Card Number
Last Name
Visitor Data Title
Visitor Last Name
(Other options are displayed below Filter By, depending on the option you choose.)

Screen Options
Setup
Click this button to set up the printer options. Click here for details.
Print
Select this button if you want to print (and optionally encode) the card.
You may not have access to this button, depending on your user permissions, as set up in the
"Maintenance/User & Preferences/Roles" screen.
Reset
Choose this button to clear the Set for Batch Printing option in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen for everyone selected in the Selection screen. You can use this option without
having to print the badges.
Badge Design
Select Card Holder Assigned if you wish to use the badge design previously selected in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
The badge design determines the appearance of the badge, as set up using the "Setup/Identity/Badge
Designer" screen.
You can select an alternative badge design if you wish to override the badge design assigned in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Encoder Format
Select Card Holder Assigned if you wish to use the encoder format previously selected using the Badge
button in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
You can select an alternative format if you wish to override the format assigned in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.
Select None if you do not want to encode the badge, or if the printer does not support encoding.
Track
If the badge printer allows you to encode the badge, select the track number to use (cards may have more than
one magnetic track).
The installer can set up the default track in an ini file.
This option is not available if you have selected Card Holder Assigned for the Encoder Format, since the
track number is controlled by the Badge option in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.

76
Symmetry Software Reference Manual

bpi
If the badge printer allows you to encode the badge, select the bpi (bits per inch) setting. Micromax always uses
75bpi. This option is not available if you have selected Card Holder Assigned for the Encoder Format, since
the bpi setting is controlled by the Badge option in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
Print Selection
Displays the number of badges to be printed.
Smartcard Format
DES Fire Encoding
Select Sector to use
Site number

Home and Full Screen


Home - Displays your home screen, as defined in the "Maintenance/User & Preferences/Accounts" screen.

Note: If Lock Position is selected in the "Maintenance/User & Preferences/Home Screens" screen, you are not
able to close, adjust the size or change the position of the home screens.

Full Screen - Displays the window in full-screen mode. Full-screen mode displays the window at its maximum size,
with the ribbon bar, title bar and status area removed. F11 can be used to switch full-screen mode off or on.
You can use the remaining View options to rearrange the positions of the open screens.

77
Operation Menu

Hours Definition Screen ("Operation/Times/Hours")

General
Overview of this screen
"Hours definitions" are used in:
 Time codes ("Operation/Times/Time Codes"), which in turn, are used in the definitions of:
 Access rights (such as in the "Home/Identity/Card Holders" screen).
 Scheduled commands ("Operation/Commands/Scheduled" screen).
 Trigger commands ("Operation/Commands/Trigger" screen).
 M2150 intrusion area arm/disarm warnings ("Setup/Device Groups/Intrusion Areas" screen).
 The specification of vacation hours in the Vacation tab of the "Home/Identity/Card Holders" screen.
The Category option determines the end use of the hours to be one of the above. Hours that use the General
category can be used for any of the above except vacation times.
Note: Vacation hours have a resolution of one hour; all others have a resolution of one minute.
Note: If you edit an existing hours definition for vacation hours, a message warns you that the change will
update the relevant card holder states within one hour. The change actually takes place at the start of the next
hour (for example, if the time is currently 09:30, the change will affect card holders at 10:00). Selecting "Don't
show this message again" hides the message only for your Symmetry username.
An hours definition consists of a series of time intervals within a 24-hour period. There can be up to ten
intervals in an hours definition.
When an hours definition is used in access rights, each time interval determines the times when people will be
able to gain access. When used for commands, the intervals determine when commands take place. When
used for M2150 intrusion area arm/disarm warnings, the intervals determine the times when an area is
expected to be armed and disarmed.
Defining the intervals
There can be up to ten time intervals in an hours definition.
You can use the button to the right of the bar to choose the color in which to display the time intervals. This
allows different hours definitions to be displayed in different colors in a time code (which is of particular benefit
when using the Calendar Overview tab in the Time Code Definition screen).
To add an interval graphically
Click on any part of the bar, then drag the mouse to define the interval. The interval's start and end times
are shown on the right-hand side of the bar. The start and end times snap to the nearest hour or half hour.
To move an interval graphically
Click on the interval, then drag it to its new position. Overlapping intervals are merged automatically.
To change an interval's times graphically
Click on the interval, then click on and drag the left-hand or right-hand edge to its new position.

78
Symmetry Software Reference Manual

To add or change times textually


Double-click anywhere in the bar (or click the right-hand mouse button in the bar and select Times) then
enter or change the times in the dialog box. If you want a start time of midnight, use 00:00. If you want an
end time of midnight, use 24:00. The end time must be greater than the start time.
You can use a resolution of one minute for hours definitions except those that have the Vacation category.
In this case, the resolution is one hour.
To delete an interval
Click on the interval, then press the Delete key, or press the right-hand mouse button on the interval and
select Delete.
To paste an interval to another hours definition
Left-click on the interval to cut or copy. Right-click, select Cut or Copy, then right-click in the bar in the
other hours definition and select Paste. You can also use the Ctrl+X, Ctrl+C and Ctrl+V keys to cut, copy
or paste in the normal way.

Note: You can select more than one interval to delete, cut or copy by holding down the Ctrl key and left-clicking
on each interval.

Selection Screen Options


Using the Selection screen
The Selection screen is displayed when you select Hours from "Operation/Times". You can use the Selection
screen to create a new hours definition or to find an existing one to edit. Click here for an overview of Selection
screens and how to use them.
The following options are specific to this Selection screen:
Hours Category - Use this option before selecting Find to find only those hours definitions that have been
defined for the selected purpose. Choose All Categories to list all hours definitions. Choose General to list
those that have been defined for any use.
Hours Number - Each new hours definition has a unique number automatically assigned. You can enter the
number in the Selection screen to find an existing hours definition.

Definition Screen Options


Description
This is the name of the hours definition.
Hours Number
Each new hours definition has a unique number automatically assigned.
Category
Use this option to specify the purpose of the hours definition. The option is grayed out if the hours definition is
already used.
For further information, please refer to the "Overview of this screen" above.
Copy/Delete/Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

79
Time Codes Screen ("Operation/Times/Time Codes")

Time Codes Screen ("Operation/Times/Time Codes")

General
Overview of this screen
Time codes are used when setting up the following:
 Access rights (such as in the "Home/Identity/Card Holders" screen).
 Scheduled commands ("Operation/Commands/Scheduled" screen).
 Trigger commands ("Operation/Commands/Trigger" screen).
 M2150 intrusion area arm/disarm warnings ("Setup/Device Groups/Intrusion Areas" screen).
When creating a new time code, you specify which of these purposes the time code will be used for. If, for
example, you choose the time code to be used with scheduled commands, it cannot be used for trigger
commands.
When used for access rights, the time code determines the times during which people will be able to gain
access. When used for commands, the time code determines when the commands will take place. When used
for M2150 intrusion arm/disarm warnings, the time code determines the times when an area is expected to be
armed and disarmed.
The time codes you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Time Codes from "Operation/Times". You can use the
Selection screen to create a new time code or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
The following option is specific to this Selection screen:
Time Code Category - Use this option to specify the purpose of the time code to find or create. Choose
All Categories to list all time codes. Choose General to list those that have been defined for any use.

Defining Time Codes


About the Tabs
The Time Code Definition screen contains three tabs:
 Standard Weekly Hours. The Standard Weekly Hours tab enables you to choose the default hours
to use for each day of the week.
Select an "hours definition" ("Operation/Times/Hours") for each day. An hours definition contains one or
more time intervals, which determine when, for example, people will be able to gain access (if the time
code is used for access rights).
 Holiday Hours. Use this tab to specify the hours for holidays.
You use the tab to choose the hours for each "holiday type" (as defined in the "Operation/Times/Holiday"
screen). The selections you make override those in the Standard Weekly Hours tab. For example, there
may be a holiday type of "Public Holidays" defined, and you may have assigned the "1pm-to-2pm" hours
definition to this holiday type. If May 1st is in "Public Holidays", then on May 1st, only the "1pm-to-2pm"
hours will apply, and the default hours specified in the Standard Weekly Hours tab will be overridden.
 Calendar Overview. This gives you calendar view of how the time code is set up and enables you to
override the Standard Weekly Hours for specific dates.
Using the Standard Weekly Hours Tab
To Define a Time Code:
1. In the Hours box, select an "hours definition" from the list. Hours definitions are defined using the
"Operation/Times/Hours" screen. If required, you can use the Filter Hours field (see below) to reduce the
number of hours definitions listed in the Hours box.

80
Symmetry Software Reference Manual

The Ref column shows the unique number of the hours definition. This was automatically assigned by
Symmetry when the hours definition was created in the "Operation/Times/Hours" screen.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of hours definitions listed. A message at a bottom of the list
indicates when there are unlisted hours definitions available that match Filter Hours.
2. Click:
 (next to a day of the week) - To assign the selected hours definition to the day.
Alternatively:
 Drag and drop the hours definition to the day, or
 Double-click to assign to the next unassigned day, or
 Enter the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
 Everyday - To assign the selected hours definition to every day of the week.
 Weekdays - To assign the selected hours definition to weekdays (Monday to Friday).
 Weekends - To assign the selected hours definition to Saturday and Sunday.
3. Each time interval in the hours definition is shown graphically as a solid block of color in the time line. The
color is chosen in the "Operation/Times/Hours" screen. Hovering the pointer over an interval shows the start and
end time of that interval in a popup.
To assign no hours to any day, simply do not assign an hours definition to that day.

Other Options:
(next to a day of the week) - Removes the hours definition from that day. Alternatively:
 Drag and drop the hours definition from the day to the Hours box, or
 Delete the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
Clear All - Clears the hours definition from every day.
Modify (displayed only if you have sufficient permissions) - Allows you to edit the selected hours definition.
View (displayed only if Modify is not displayed) - Allows you to view the selected hours definition.
New - Allows you to create a new hours definition.
Using the Holiday Hours Tab
To Define the Hours to use for a specific Holiday:
1. In the Hours box, select an "hours definition" from the list. Hours definitions are defined using the
"Operation/Times/Hours" screen. If required, you can use the Filter Hours field (see below) to reduce the
number of hours definitions listed in the Hours box.
The Ref column shows the unique number of the hours definition. This was automatically assigned by
Symmetry when the hours definition was created in the "Operation/Times/Hours" screen.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of hours definitions listed. A message at a bottom of the list
indicates when there are unlisted hours definitions available that match Filter Hours.
2. Click:
 (next to a holiday) - To assign the selected hours definition to the holiday. Note: Rows
where the holiday name is "Unused" should be ignored. Alternatively:
 Drag and drop the hours definition to the holiday, or
 Double-click to assign to the next unassigned holiday, or
 Enter the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
 Everyday - To assign the selected hours definition to every day of the week.

81
Time Codes Screen ("Operation/Times/Time Codes")

3. Each time interval in the hours definition is shown graphically as a solid block of color in the time line. The
color is chosen in the "Operation/Times/Hours" screen. Hovering the pointer over an interval shows the start and
end time of that interval in a popup.
To assign no hours to any holiday, simply do not assign an hours definition to that holiday.

Other Options:
(next to a holiday) - Removes the hours definition from the holiday. Alternatively:
 Drag and drop the hours definition from the holiday to the Hours box, or
 Delete the hours definition reference number in the Ref column on the right side of the
screen and press the Enter key.
Clear All - Clears the hours definition from every holiday.
Modify (displayed only if you have sufficient permissions) - Allows you to edit the selected hours definition.
View (displayed only if Modify is not displayed) - Allows you to view the selected hours definition.
New - Allows you to create a new hours definition.
Using the Calendar Overview Tab
This tab shows the hours that will be used on each day over the next year.
By default, the tab reflects the information set up in the Standard Weekly Hours and Holiday Hours tabs.
However, it is possible to use the Calendar Overview tab to override the hours used for any day that is not a
holiday.
Each date indicates the number of the hours definition used on that date. For example, if May 27th shows "2",
then hours definition number 2 is used on that date. If the number is in italic, the date is a holiday.
A holiday that has no hours definition assigned is shown with an italic "0". This shows that the time code will not
operate on this date.
The color shown in each day of the calendar depends on the color assigned to the hours definition in the
"Operation/Times/Hours" screen.
Hovering the cursor over any non-holiday displays the name of the hours definition used on that date. Hovering
the cursor over any holiday also displays the name of the holiday type.
The bar near the bottom of the dialog shows the intervals in the hours definition assigned to the currently
selected date. The menu to the left of the bar shows the name of the hours definition. Right-clicking in the bar
displays Edit (to edit the hours definition) and New (to create a new hours definition for the selected date).
These options are repeated in the menu (<Create New> and <Edit Existing>).
To override the hours definition used on a selected date, click on the date, choose the hours definition (using
the menu or field near the bottom-left corner of the dialog), then click Assign. Assign operates only for dates
that are not holidays.

Note: You can select multiple dates by pressing Shift or Ctrl between clicks, or by clicking and dragging the
mouse (standard Windows techniques). If the dates have different hours definitions assigned, the menu
displays "Multiple Hours Selected".

If you want to remove an override made from the Calendar Overview tab, select the date(s), then click
Remove.

Definition Screen Options


Time Code Description
This is the name of the time code.
Category
This displays the selected purpose of the time code.

82
Symmetry Software Reference Manual

"Area Warning" is used for M2150 intrusion systems to define the required armed and disarmed periods in the
"Setup/Device Groups/Intrusion Areas" screen.
Filter Hours
The Filter Hours field appears only if the number of hours definitions exceeds the value of Selection List
Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen.
You can use the Filter Hours field to list only those hours definitions whose name includes the text you enter.
For example, the hours definition named "ABC123" is listed if you enter "C1", or "AB", etc. After entering the
text, press Enter or click to action the filter.
Leave the Filter Hours box empty if you do not want to use a filter.
Type sub filter here
You can use this field to list only those hours definitions whose name includes the text you enter.
If Filter Hours is also displayed, Type sub filter here operates only on the results of the Filter Hours filter.
Copy/Delete/Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Holiday Screen ("Operation/Times/Holiday")

General
Introduction
This screen enables you to specify your organization's holiday dates, such as public holidays and site shutdown
periods. You need to define the holiday dates if you want access rights, command operation or alarm routing to
be different on holidays. The holidays set up in this screen are available to all companies on the system.
Each holiday date must be assigned to at least one holiday type. For example, you may have the holiday types
named "Christmas Shutdown" and "Public Holidays" and decide to assign December 25th to both. You can
name the holiday types in the lower area of the screen.
It is the holiday types, rather than the holiday dates, that are used in other screens. Holiday types are used in
time codes ("Operation/Times/Time Codes") and by the installer to set up alarm routing
("Operation/Alarms/Routing").
Holiday types make it easy for you to set up access rights, command operation or alarm routing for holidays.
For example, in the "Operation/Times/Time Codes" screen, simply selecting the hours for a holiday type
allocates the hours to every holiday in that holiday type.

Note: Older node types (prior to the multiNODE-2) are able to use only four holiday types.

What Happens when there is a Holiday?


When a holiday date is reached, the system:
1. Determines which holiday types(s) the date belongs to.
2. Determines the hours set up for those holiday types in the "Operation/Times/Time Codes" screen, and uses
only those hours for all access rights, trigger commands and scheduled commands that use the time
code.
3. Changes alarm routing, as specified by the installer in the "Operation/Alarms/Routing" screen.
Using the Screen
To use the screen:
1. In the Holiday Types area (near the bottom of the screen), type a name for each holiday type you want to
create. For example:

83
Access Codes Screen ("Operation/Times/Access Codes")

The colored box to the left of each text field shows the color that will represent the holiday type in the
calendar.
2. Select the date(s) that you want to allocate to a holiday type.
You can drag the mouse, use shift-click or ctrl-click to select multiple dates. You can use the scroll bar to
access dates in following years.
3. Click Assign.
4. In the dialog that is displayed, choose the holiday types that you want the dates to belong to.
5. Click anywhere in the calendar. The dates are now colored to indicate the holiday type(s) they belong to. If
a date belongs to more than one holiday type, it is displayed in a mustard color (hover the cursor over the date to
see the holiday types assigned to that date).
You can select one or more dates then Remove to remove the dates from all holiday types.

Screen Options
Clear
Removes all dates from all holiday types.
Holiday Check 7 Days Prior
If you select this option, a Holiday Check dialog is automatically displayed when a user logs in to Symmetry at
any time during the 7-day period prior to a holiday date. The dialog is displayed only when logging in at the
client PC specified by Route Holiday/Advance/Retard Checks to in the "Maintenance/User &
Preferences/System Preferences" screen.
The Holiday Check dialog enables the user to check that the holiday date is correct before it occurs. The dialog
has OK and Cancel buttons. Selecting OK prevents the message from being displayed again for the holiday
date (details of the user who selects OK are saved in the History log). Selecting Cancel causes the message to
be displayed again at the next login.
In order for the Holiday Check dialog to be displayed, the Symmetry services at the server must be running
across midnight at the beginning of the first day that the message is due. This will be the case if Symmetry has
been installed correctly.
Clear
Clears the screen.
Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Access Codes Screen ("Operation/Times/Access Codes")

General
Overview of this screen
An access code is a pre-defined set of access rights that allow access to any of the following:
Reader groups
Readers
Floor groups
M2150 intrusion areas

84
Symmetry Software Reference Manual

Access codes are used to set up access rights in, for example, the "Home/Identity/Card Holders" screen.
The access rights are displayed in a graphical tree view. You can expand the branches of the tree to view their
contents in the normal way.
The access codes you set up in this screen can be used only for a card holder or visitor who is associated with
the currently-selected Symmetry company. You can use the Change Company option in the
"Home/Monitoring" menu to change the company that you are administering.

Note: The Access Codes Definition screen alerts you if you attempt to create two access codes containing the
same access right assignments. This is to prevent the system from becoming 'cluttered' with unnecessary
access codes.
Note: You may not be able to select certain access codes, readers, reader groups, floor groups, shared
floor/reader groups or intrusion areas, depending on the permissions assigned to those items when they were
defined (using the Permissions button).

Benefits of Access Codes


Access codes can save time if you need to assign the same complex access rights to more than one person.
For example, you could set up an access code called Admin Staff containing all the access rights needed by
the card holders working in the Administration department. You could then assign this access code in the
"Home/Identity/Card Holders" screen to all card holders who work in the Administration department.
Once an access code has been assigned to the access rights of card holders or visitors, you can change the
access rights of all these people in one simple operation by modifying the access code.
Prerequisites
Before defining access codes, make sure that the items necessary to define the required access codes have
been set up:
 Reader Groups ("Setup/Device Groups/Readers")
 Readers ("Install/Access Control/Reader")
 Floor Groups ("Setup/Device Groups/Floors")
 Time Codes ("Operation/Times/Time Codes")
 Areas ("Setup/Device Groups/Intrusion Areas")
Using the Selection screen
The Selection screen is displayed when you select Access Codes from "Operation/Times". You can use the
Selection screen to create a new access code or to find an existing one to edit.
The Select by Status menu allows you to list all access codes, or only those that have been forced inactive
using Force Access Code Inactive in the definition screen.
Click here for an overview of Selection screens and how to use them.

Defining Access Codes


Using the Access Rights tab
The Access Rights tab allows you to assign and remove access rights to the access code.
You can assign access rights as follows:
1. In the Assigned Access Rights tree view, select the appropriate branch. For example, Readers.
2. Select the Assign button or the same option in the right-click menu.
3. Specify the required access rights in the screen displayed.
You can remove an individual access right or any group of rights from the access code as follows:
1. In the Assigned Access Rights tree view, select the individual access right, or the whole rights branch, to be
removed. For example: to remove all reader group access rights, select Reader Groups.
2. Select the Remove button or the same option in the right-click menu.

85
Access Codes Screen ("Operation/Times/Access Codes")

Note: If A schedule override exists is displayed at the top of the tab, the access code is disabled on certain
days, as defined in the Schedule tab.

Assigning Access Rights to Card-Relay Output Groups


You can set up access rights to an output group by right-clicking on the controlling reader. Click here for
further information.

Using the Schedule tab


The Schedule tab allows you to deactivate the access code on specified days, or to activate the access code
on days where it has been previously deactivated. An access code cannot be used to gain access on days
where it is deactivated.
You may, for example, want to deactivate the access code during holiday periods to prevent anyone who relies
on the access code from gaining access during those periods.
The tab shows the current year and the next four years. Active dates are shown in green. Deactivated dates are
shown in red.
To use the tab:
1. Select the date(s) that you want to activate or deactivate.
You can drag the mouse, use shift-click or ctrl-click to select multiple dates. You can use the scroll bar to
access dates in following years.
3. Click Enable (to activate) or Disable (to deactivate). These options are also available by right-clicking.

Note: The active/inactive status of an access code on a specified date is relevant only if the access code is
being used on that date. Please be aware that advanced access rights (e.g. set up in the "Home/Identity/Card
Holders" screen) may cause an alternative access code to be used during specific periods of the year, rather
than the access code that you have chosen to disable on selected dates.
Note: The schedule covers the current year and the next four years. After this period, all days are, by default,
enabled. It is therefore advisable to set up a task every year or two (using the "Home/Monitoring/Tasks" screen)
to configure the new, as yet unconfigured, years in the schedule.

When an access code is inactive on the current day (either by being forced inactive or through the Schedule
tab), the access code icon is grayed out in the Access Rights tree (e.g. in the "Home/Identity/Card Holders"
screen).

Definition Screen Options


Access Code Name
Specify a name for the access code.
Force Access Code Inactive
Selecting this checkbox deactivates the access code until you reactivate it by removing the checkmark. When
deactivated, an access code does not provide access wherever it is assigned.
You may want to use this option if, for example, you want to temporarily disallow access for all card holders
who use the access code to gain access. Removing the checkmark and saving changes re-enables the access
code.
Selecting this checkbox grays out the Schedule tab to indicate that the whole access code is inactive.
Instead of using this checkbox, you may prefer to use the Schedule tab to disable the access code on specified
days only.

86
Symmetry Software Reference Manual

Page View/Normal View


This button toggles the tree view display between the normal view and a whole page view that uses the full
screen. This makes it easier for you to view the access rights when many access rights have been defined.
Expand
This button fully expands all contents of the currently-selected item in the tree view.
Collapse
This button fully collapses the currently-selected item in the tree view.
Assign
This button displays the appropriate screen for assigning reader, reader group, floor group or intrusion area
access rights to this access code.
For example, to assign access rights to a reader group, select Reader Groups then Assign.
You can also select this option via the right-click menu from the appropriate entry in the tree view.
Remove
This button removes access rights. Select the individual access right, or the whole rights branch, to remove,
then select Remove.
You can also select this option via the right-click menu, from the appropriate entry in the tree view.
Reset
This button reloads the currently-assigned access rights from the database. A warning prompt reminds you that
unsaved changes to the access rights will be lost.
Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Scheduled Commands Screen


("Operation/Commands/Scheduled")

General
Overview of this screen
A scheduled command causes a start command, then a stop command, to be executed, typically at a device or
group of devices, such as readers, monitor points and auxiliary outputs. A scheduled command could, for
example, switch lights on and off at specific times.
The start command is executed at every start time in a time code. The stop command is executed at every end
time in the time code.
For a new scheduled command, make sure that appropriate time codes have been set up
("Operation/Times/Time Codes" screen).
You are able to set up scheduled commands only for the devices or groups assigned to the currently selected
company. The installer defines the devices that are assigned to each company.
You cannot send commands to individual auxiliary outputs or monitor points that are used to control and
monitor an elevator panel. Use the Floor Groups selection type to control access to elevator floor buttons.

Note: You must close the Selection screen before the system actions any new or changed scheduled
commands.
Troubleshooting Note: If a node is not actioning scheduled commands correctly, you may need to
synchronize the node with the database by selecting Sync Scheduled Commands Now, then OK in the
"Maintenance/Time/System Time" screen.

87
Scheduled Commands Screen ("Operation/Commands/Scheduled")

Using the Selection screen


The Selection screen is displayed when you select Scheduled from "Operation/Commands". You can use the
Selection screen to create a new scheduled command or to find an existing one to edit. Click here for an
overview of Selection screens and how to use them.
The following options are specific to this Selection screen:
Select Type
Use this pull-down list before selecting Find or New. It allows you to choose the type of device for the
scheduled command that you wish to find or create.
If you set up a command for a group, the command will be sent to all devices in the group at the same
time.

Note: If you select Door or Door Group, you can create a command only to disable or enable certain
"door" alarms (e.g. Door Held Open). In all other respects a door is the same as a reader, and a door
group is the same as a reader group. Click here for further information.

Find By Location
Use this field if you want to reduce the number of entries listed when you select Find. If the option is blank,
all entries are listed (if no other filtering options are set in the screen).
Find by Location is a filter on the name of the device or item that the command applies to. Only those
commands that apply to the named device or item are listed when you select Find. Find by Location is
different from Description, which is a filter on the name of the command.
You can use wildcards if required.
Active and Inactive Date
Enter or select a date if you want to list only those commands that have a validity period (as specified in
the Definition screen) for one or more dates on or between the Active Date and Inactive Date.
If Active Date is blank, it means "any date up to the Inactive Date". If Inactive Date is blank, it means
"any date after the Active Date".
Select by Status
Select All if you want to list all commands, irrespective of status. Otherwise, choose:
 Active - to list only those commands that have a status of "Active"; that is, can operate
normally.
 Expired - to list only those commands that have expired (that is, where the current date is
after the To date shown in the Definition screen).
 Inactive - to list only those commands that are inactive (as determined by the Force
Inactive or Threat Level options in the Definition screen).
 Not Yet Valid - to list only commands that are not yet valid (that is, where the current date is
before the From date shown in the Definition screen).

Definition Screen Options


Description
This is the name of the scheduled command.
Configuration Tab
Device
Select the type of item that the scheduled command applies to. For example, choose Reader if you want
to set up a scheduled command for a reader.

88
Symmetry Software Reference Manual

Location
Choose the specific device or item that the command applies to. The items in this menu depends on what
you have selected in Device.
If you require any further details about the meaning of Location, refer to the description of the appropriate
command. For example, refer to the command descriptions if you want to set up a "Disable All Door
Alarms" command, but the door is not listed in the Location menu.
Start Command and Stop Command
When you select a start command the opposite command is inserted automatically in the Stop Command
box, if appropriate (although you are still able to select a different stop command). If you do not want a
start or stop command, select None.
Meaning of each command
When
Select the time code to be used from the Time Codes box, then click ">". The start command is executed
at each start time in the time code, and the stop command is executed at each end time. Alternatively,
double-click the time code, or drag and drop it to the right-hand area.
The area to the right gives a graphical representation of the time intervals defined by the time code. You
can use Modify/View to modify or view the selected time code (the option displayed depends on your
permissions), or New to create a new time code.
The start command is executed immediately you select OK if Sync Command on Close is selected in the
Options tab and the time code is currently in an ON period.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of time codes listed. An information message indicates when
there are unlisted time codes available that match Filter Time Codes (see below).
To remove the time code used, click "<" or drag and drop the time code to the Time Codes box.
Filter Time Codes
The Filter Time Codes field appears only if the number of time codes exceeds the value of
Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen.
You can use the Filter Time Codes field to list only those time codes whose name includes the text
you enter. For example, the time code named "ABC123" is listed if you enter "C1", or "AB", etc.
Enter the text and click to action the filter. Leave the field empty if you do not want to use a filter.
Type sub filter here
You can use this field to list only those time codes whose name includes the text you enter.
If Filter Time Codes is also displayed, Type sub filter here operates only on the results of the
Filter Time Codes filter.
Override Tab
Purpose of this tab
This tab allows you to override the start time, stop time, start and stop time, or time code assigned to the
scheduled command, or to disable the scheduled command entirely. The override applies between the
specified dates.
You may want to use this feature to change the operation of the scheduled command during, for example,
a site shutdown period.
Setting up the override
To set up the override:
1. Choose the required option from the Override menu.
2. Specify the Start Time, Stop Time or Time Code as applicable. If necessary, please refer to the
help for the Configuration tab for details of selecting a time code.

89
Scheduled Commands Screen ("Operation/Commands/Scheduled")

If you override the start or stop time, the new specified time overrides all start/stop times in the time
code.
Example of changing start or stop time
For example, if the time code is defined as follows:
 Start = 09:00, Stop = 12:00, Start = 14:00, Stop = 17:00
Overriding the stop time with a time of 18:00 results in the following:
 Start = 09:00, Start = 14:00, Stop = 18:00
3. Use the calendar buttons to specify the start date and end date of the override.
4. Save the changes.
5. If Reason Required for Scheduled Command Override is selected in the "Maintenance/User &
Preferences/System Preferences" screen, enter the reason for the override. The reason, the date of the
change and the user's name is recorded in the command's notes, which you can view by clicking the Item
Notes button:

Note: Setting up an override automatically selects Sync Command on Close in the Options tab.
Options Tab
From/To
The scheduled command will be executed on and between the From and To dates only (subject to the
on/off periods defined in the selected time code). The day after the To date, the command will no longer
operate and its status changes to Expired. If you leave the To date blank, the command will operate for all
dates from the From date.

Note: If you select a To date, do not use a time code that stops at midnight. If you do, the last stop
command in the date range will not be executed. If you require the stop command to be executed, use a
end time of 23:59.

Force Inactive
Stops the command from being executed at all.
Activate at Threat Level
Select the threat level at which you want the command to become active.
Click here for examples and details of how this option operates with Deactivate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Deactivate at Threat Level
Select the threat level at which you want the command to deactivate.
Click here for examples and details of how this option operates with Activate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Report As
Determines whether the Scheduled Operation' message generated when the command is executed should
be reported as an alarm, event or not at all.
An event simply records the message in the log file. You can use the "Home/Monitoring/Activity" screen to
view the contents of the log file.
An alarm displays the message in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screens, and also adds the message to the log file.

90
Symmetry Software Reference Manual

Note: The system may have been set up in the "Operation/Alarms/Routing" screen to prevent node or
system alarms from being displayed in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen.

Scheduled commands executed at nodes


If the command is executed at a node (that is, when Actioned By is "Node"), the event or alarm may
not be generated, even though you have selected Event or Alarm. This occurs if the Scheduled
Operation' message is set to Disabled by the installer in the "Install/Access Control/Node" screen
(for the node controlling the device in the THEN part of the trigger command).
Normally, an installer would choose the Disabled setting only for a remote node, since stopping the
remote node from generating an alarm or event prevents the remote node's log from getting too full
and will stop the remote node from calling the main site just to report the execution of a scheduled
command.
Forced Action By Server
This forces the command to be executed at the server, rather than at any node.
You may want to select this option if, for example, you want a command to be actioned according to the
time at the server rather than the time in a node located on a LAN or dial-up chain.
The command is always executed from the server if, for example:
 The IF alarm/event message in a trigger command can be generated at a node that is
different from the node connected to the THEN device.
 The command (or the IF message in a trigger command) relates to a reader group, monitor
group or auxiliary-output group.
 The command relates to the use of a CCTV switcher unit. That is, if the command type is
Switcher Video, Switcher Ancillary or Switcher Alarm.
 The IF alarm/event message is Duress.
 You set up a door alarms scheduled command (e.g. "Disable All Door Alarms") for a door
group.
Sync Command on Close
If you are setting up a new scheduled command and you select Sync Command on Close, the Start
Command is executed immediately you select OK, then Close in the Selection screen, providing the
selected time code is currently in an active period (that is, the current time is between a start and end time
in the time code).
The scheduled command is executed normally after this time (that is, the Start Command and Stop
Command are executed normally at the on and off times in the time code).
Status
This displays one of the following:
 The current status of the command, as determined by the Validity Period settings.
 OVERRIDDEN if an override is currently active, as set up in the Override tab.
Actioned By
This shows where the command will be stored and actioned.
Copy/Delete/Notes/Apply/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

91
Predefined Command Screen ("Operation/Commands/Predefined")

Predefined Command Screen ("Operation/Commands/Predefined")

General
Introduction
This screen enables you to set up commands that will be available only to users who have a nominated user
role. User roles are set up in the "Maintenance/User & Preferences/Roles" screen.
Predefined commands are available for use in, for example, the following screens:
 "Home/Monitoring/Command Center" (a separate branch in the tree is provided for predefined
commands)
 "Home/Monitoring/Graphics" (separate icons are provided for predefined commands)
 "Setup/Workflow/Workflow Designer"
These screens allow users to send predefined commands that are assigned to the user's role.
If Send Predefined Commands Only is selected in the "Home/Monitoring/Graphics" section of a user role,
users with that role are able to send only predefined commands from the "Home/Monitoring/Graphics" screen
(standard commands cannot be sent).
Predefined commands are associated with a user role, not a company. This allows users to execute a
predefined command for a device that does not belong to a company in the user's company group.
Using the Selection screen
The Selection screen is displayed when you select Predefined from "Operation/Commands". You can use the
Selection screen to create a new predefined command or to find an existing predefined command to edit. Click
here for an overview of Selection screens and how to use them.

Definition Screen Options


Description
Enter a name for the predefined command.
Type
Choose the type of command.
Location
Choose the specific item that relates to the chosen Type.
Command
Choose the command. Click here for details of each command.
User Roles Available for Selection
This shows all user roles that do not yet have access to issue the selected command. Use the >> button to
move selected roles from this list to Assigned User Roles.
Assigned User Roles
This shows the user roles that have access to issue the selected command. You can use the << button to
remove selected roles from this list.
Copy/Delete/Notes/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

92
Symmetry Software Reference Manual

Trigger Commands Screen ("Operation/Commands/Trigger")

General
Overview of this screen
A trigger command (otherwise known as a conditional command) causes a command to be executed at a
device or group of devices if an alarm/event message is received from another device within an on period of a
specified time code. A trigger command could, for example, switch a video camera on when a monitor point is
activated at certain times of the day. A trigger command can also be used to run a specified exe file (set the
Then device to Server and choose the Run Command Line command).
There are three parts to a trigger command:
 "If" - Specifies the message that will trigger the trigger command.
 "Then" - Defines the command that will be sent. You can define more than one "Then" part for the
same trigger command - this allows the same "If" condition to trigger more than one command.
 "When" - Specifies the time code that determines when the trigger command can be generated.
For a new trigger command, make sure that appropriate time codes have been set up ("Operation/Times/Time
Codes" screen). You can create groups of devices from the appropriate screen in "Setup/Device Groups".
You are able to set up trigger commands only for cards, devices, groups, and other items assigned to the
currently selected company. The installer defines the items that are assigned to each company.
You cannot send commands to individual auxiliary outputs or monitor points that are used to control and
monitor an elevator panel. Use the Floor Groups selection type to control access to elevator floor buttons.

Note: You must close the Selection screen before the system actions any new or changed trigger commands.

Troubleshooting
If you are not able to get a trigger command working, try the following:
 In the trigger command definition, make sure that the time code is valid for the times you
want the trigger command to operate.
 In the Options tab, make sure that command has not been disabled by the Validity Period
or Force Inactive.
 Some alarms/events are not generated if the device is disabled (such as Monitor Point in
Alarm). Use the "Home/Monitoring/Command Center" screen to determine whether the
device is disabled.
 If applicable, try changing the setting of Force action at in the Options tab of the trigger
command definition to specify whether to action the command at the node or Symmetry
server. If this corrects the problem, please contact your Technical Support Representative.
 Monitor the "Home/Monitoring/Activity" or "Reports/History/Activity" screen to find out
whether the alarm/event that triggers the command is being generated.
Note: The alarm/event message may be disabled in the device definition screen (such
"Install/Access Control/Readers") or in the "Operation/Alarms/Definitions" screen. Either setting will
prevent the alarm/event message from being displayed in the Activity screen or in reports. If the
trigger command is actioned at the Symmetry server, the command should trigger successfully
irrespective of the setting in the"Operation/Alarms/Definitions" screen; it will not trigger if disabled in
the device definition screen. If the trigger command is actioned at the node, the command should
trigger successfully irrespective of the setting in the device definition screen.
Using the Selection screen
The Selection screen is displayed when you select Trigger from "Operation/Commands". You can use the
Selection screen to create a new trigger command or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.

93
Trigger Commands Screen ("Operation/Commands/Trigger")

The following options are specific to this Selection screen:


Active and Inactive Date
Enter or select a date if you want to list only those commands that have a validity period (as specified in
the Definition screen) for one or more dates on or between the Active Date and Inactive Date.
If Active Date is blank, it means "any date up to the Inactive Date". If Inactive Date is blank, it means
"any date after the Active Date".
Select by Status
Select All if you want to list all commands, irrespective of status. Otherwise, choose:
 Active - to list only those commands that have a status of "Active"; that is, can operate
normally.
 Expired - to list only those commands that have expired (that is, where the current date is
after the To date shown in the Definition screen).
 Inactive - to list only those commands that are inactive (as determined by the Force
Inactive or Threat Level options in the Definition screen).
 Not Yet Valid - to list only commands that are not yet valid (that is, where the current date is
before the From date shown in the Definition screen).

Definition Screen Options


Description
The unique name of the trigger command.
Configuration Tab
If (Device, Location, Interface, Message and Address)
Device
Choose the type of device that should activate the trigger command. If you choose a group, the
trigger command can be activated by any device in the group.
Setting Device to Transactions allows you to create a trigger command by specifying the text in an
alarm/event message. One or more of the "who", "what" and "where" text can be specified. For
example, the command can trigger whenever Alex Taylor performs a transaction by defining only the
"who" text, and setting it to be equal to Taylor, Alex,. If more than one item of the alarm/event text is
specified (using the Add button), all must be true for the command to trigger. Tip: The alarm/event
text can be determined by running an Activity Report ("Reports/History/Activity").
Location
If applicable, select the device or group that is to activate the trigger command, or in the case of
intrusion systems, the intrusion alarm/event message.
If Device is set to Intercom Stations, the menu includes all call stations defined in the "Install/Video
& Audio/Intercom/Stations" screen, and all intercom clients set up as call stations using the Show as
a Call Station option in the "Install/Video & Audio/Intercom/Clients" screen.
Interface
This is displayed ifThorGuard IntrusionorThorGuard Readersis selected from theDevicemenu.
If the trigger command is to be actioned by a message that the Symmetry server collects from the
ThorGuard Management Software (TGMS), select the interface number of the ThorGuard central
unit that you want the command to respond to. TGMS server must be running for the menu to
display a list of available interface numbers. Unknown is displayed next to the interface number if
you are editing an existing command with the TGMS server offline.
Message
If applicable, select the specific alarm/event message that should activate the trigger command.

94
Symmetry Software Reference Manual

Meaning of each Alarm/Event Message


Address
This is displayed ifThorGuard IntrusionorThorGuard Readersis selected from theDevicemenu.
Specify the address of the ThorGuard input or reader, as appropriate.
Select a Card
This is displayed if Message is, for example, Cardwatch or Card Expired.
Use the button to choose the specific card holder you want to trigger the command. Alternatively,
choose Any Card if you want any card to trigger the command.
Then (Device, Location, Command and Command No.)
Device
Choose the type of device to send the command to.
Location
Select the specific device or group of devices to send the command to. If you require any further
details about the meaning of this option, refer to the description of the appropriate command.
Address
This is displayed only if the HISEC Symmetry Video Management software is installed and you have
selectedThorGuardfrom the "Then"Devicemenu.
Specify the address of the ThorGuard virtual input that the command should activate or deactivate.
Command
Select the specific command to send to the device or group of devices when the trigger command is
activated.
Meaning of each command
Command No.
If you want more than one command to be triggered by the same "If"condition, click the add
command button (see below) and enter the additional "Then" details. You can use the arrowed
buttons to scroll through the commands. The delete command button (see below) deletes the
currently displayed command.

= Add Command

= Delete Command
When
Select the time code to be used from the Time Codes box, then click ">". The THEN command is
executed only when the IF message occurs between any pair of start and end times in the time code.
Alternatively, double-click the time code, or drag and drop it to the right-hand area.
The Type sub filter here field allows you to filter the items listed.
The area to the right gives a graphical representation of the time intervals defined by the time code. You
can use Modify/View to modify or view the selected time code (the option displayed depends on your
permissions), or New to create a new time code.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of time codes listed. An information message indicates when
there are unlisted time codes available that match Filter Time Codes (see below).
To remove the time code used, click "<" or drag and drop the time code to the Time Codes box.
Filter Time Codes
The Filter Time Codes field appears only if the number of time codes exceeds the value of
Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen.

95
Trigger Commands Screen ("Operation/Commands/Trigger")

You can use the Filter Time Codes field to list only those time codes whose name includes the text
you enter. For example, the time code named "ABC123" is listed if you enter "C1", or "AB", etc.
Enter the text and click to action the filter. Leave the field empty if you do not want to use a filter.
Type sub filter here
You can use this field to list only those time codes whose name includes the text you enter.
If Filter Time Codes is also displayed, Type sub filter here operates only on the results of the
Filter Time Codes filter.
Options Tab
From/To
The trigger command will be executed on and between the From and To dates only (subject to the on/off
periods defined in the selected time code). The day after the To date, the command will no longer operate
and its status changes to Expired. If you leave the To date blank, the command will operate for all dates
from the From date.
Force Inactive
Stops the command from being executed at all.
Activate at Threat Level
Select the threat level at which you want the command to become active.
Click here for examples and details of how this option operates with Deactivate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Deactivate at Threat Level
Select the threat level at which you want the command to deactivate.
Click here for examples and details of how this option operates with Activate at Threat Level.
This option is available only if the Threat Level Manager license is installed.
Report As
Determines whether the 'Trigger Operation' message generated when the command is executed should be
reported as an alarm, event or not at all.
An event simply records the message in the log file. You can use the "Home/Monitoring/Activity" screen to
view the contents of the log file.
An alarm displays the message in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screens, and also adds the message to the log file.

Note: The system may have been set up in the "Operation/Alarms/Routing" screen to prevent node or
system alarms from being displayed in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen.

Trigger commands executed at nodes


If the command is executed at a node (that is, when Actioned By is "Node"), the event or alarm may
not be generated, even though you have selected Event or Alarm. This occurs if the 'Trigger
Operation' message is set to Disabled by the installer in the "Install/Access Control/Node" screen
(for the node controlling the device in the THEN part of the trigger command).
Normally, an installer would choose the Disabled setting only for a remote node. Stopping the
remote node from generating an alarm or event prevents its log from getting too full and stops it from
calling the main site just to report the execution of a trigger command.
Force Action at
This allows you to choose where the command should be stored and actioned.

96
Symmetry Software Reference Manual

Default
Selecting Default causes the command to be actioned from its normal location, which for commands
that affect access control equipment, is normally an access control node.
Server
Selecting Server causes the command to be stored and actioned from the Symmetry server. You
may want to select this option if, for example, you want a command to be actioned according to the
time at the server rather than the time in a node located on a LAN or dial-up chain.
The command is always executed from the server if, for example:
 The "If" alarm/event message in a trigger command can be generated at a node that is
different from the node connected to the "Then" device.
 The command (or the "If" message in a trigger command) relates to a reader group,
monitor group or auxiliary-output group.
 The command relates to the use of a CCTV switcher unit. That is, if the command type
is Switcher Video, Switcher Ancillary or Switcher Alarm.
 The IF alarm/event message is Duress.
 The command relates to a door group to disable or enable door alarms.
Status
Shows the current status of the command, as determined by the Validity Period settings.
Actioned By
This shows where the command will be stored and actioned.
Copy/Delete/Notes/Apply/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Alarm Instructions Screen ("Operation/Alarms/Instructions")

General
Overview of this screen
An alarm instruction contains instructional information, such as "Call Duty Supervisor". You can use up to five
alarm instructions when using the "Operation/Alarms/Definitions" screen to specify what an operator should do
when acknowledging an alarm.
Each alarm instruction can be used in more than one alarm definition. This allows general alarm instructions
such as "Call Duty Supervisor" or "Call Police" to be used in many alarm definitions.
The instructions you set up in this screen are available when you are using the "Operation/Alarms/Definitions"
and "Operation/Alarms/Reporting" screens for the currently selected company.
You can format the text as required using the options in the toolbar. You can also insert tables and import files
(which can include text and graphics).
Using the Selection screen
The Selection screen is displayed when you select Instructions from "Operation/Alarms". You can use the
Selection screen to create a new alarm instruction or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.

Using the Definition Screen


Formatting options
You can use the formatting options in the toolbar near the top of the screen to format text as required. From left
to right, the options are:

97
Alarm Instructions Screen ("Operation/Alarms/Instructions")

Font
Point size
Bold
Italic
Underline
Left justify
Right justify
Center justify
Bulleted list
Numbered list
Magnification
Highlight color
Text color
Right-click menu
The right-click menu allows you to:
 Cut, copy and paste text, when text is selected.
 Insert a table, when no text is selected (see "Table tools" below).
 Modify or format a table, when the cursor is in a table (see "Table tools" below).
 Insert or modify hyperlinks (see "Using hyperlinks" below).
Table tools
You can insert a table by right-clicking when no text is selected, and choosing Insert, Table. A dialog prompts
you to specify the number of columns, rows and other settings.
Right-clicking when the cursor is in a table and selecting Format Table displays a Table Properties dialog,
which provides options to configure properties such as line color, margins and cell height.
The Table Properties dialog also includes a Formulas tab. If the cursor is in a single cell, you can use the
Formulas tab to insert a formula into the cell. For example, the formula "SUM(A1 + A2)" would display the sum
of the cells A1 and A2 in the selected cell.
The table right-click menu also provides options for inserting and deleting rows and columns. You can even
insert a table into a table cell.

Note: The table options provided are similar to those available in Microsoft Word. For further information,
please refer to help available on the internet.

Using hyperlinks
If Create Hyperlink is selected in your user role (as configured in the Options branch of the "Maintenance/User
& Preferences/Roles" screen), you can use the Add a Hyperlink button to insert a hyperlink.
If Activate Hyperlink is selected in your user role (as configured in the Options branch of the
"Maintenance/User & Preferences/Roles" screen), you can activate hyperlinks in this screen. Users who
process alarms, such as in the "Home/Monitoring/Alarms" screen must have the same privilege to activate
hyperlinks in alarm instructions.
Import File
You can import the following file types:
 .doc or .docx (Microsoft Word)
 .txt (plain text file)
 .htm or .html (HTML)
 .rtf (Rich Text Format)

98
Symmetry Software Reference Manual

Imported information can include text, graphics and formatting.

Note: Complex formatting may be lost when you save the alarm instruction.

Copy/Delete/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Alarm Comments Screen ("Operation/Alarms/Comments")

General
Overview of this screen
An alarm comment is one or more lines of text, such as "Intruder Apprehended". When acknowledging or
clearing an alarm, a user can select one of these standard comments or type a different comment using the
keyboard.
A comment can also be selected when:
 Using the "Home/Monitoring/Controls" screen (available only with the Controls license).
 Double-clicking an alarm\event message in the "Home\Monitoring\Activity" or
"Home\Identity\Verification" screen.
The comments you create will belong to the currently selected company.
When acknowledging a single alarm, the system makes available for selection only those comments that
belong to the same company that owns the device in alarm. The installer defines the devices that are assigned
to each company. If the alarm is not related to a device belonging to a specific company, all comments from all
companies will be displayed.
When acknowledging multiple alarms, the system makes available for selection all comments belonging to the
currently selected company.
When using the "Home/Monitoring/Controls" screen, you can use any comment that belongs to any company in
your company group.
If Alarm Comments Mandatory is selected in the "Maintenance/User & Preferences/Client Preferences"
screen, it is mandatory to select or enter a comment when acknowledging or clearing an alarm.
Using the Selection screen
The Selection screen is displayed when you select Comments from "Operation/Alarms". You can use the
Selection screen to create a new alarm comment or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

Definition Screen Options


Copy/Delete/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

Alarm Commands Screen("Operation/Alarms/Commands")

General
Overview of this screen
This screen enables you to associate a command with items such as monitor points, readers, intrusion areas
and intrusion transactions (as set up in the "Install/Intrusion/Intrusion/Device Configuration" screen). If the item

99
Alarm Commands Screen("Operation/Alarms/Commands")

generates an alarm, you can execute the associated command by clicking the Command button when
acknowledging the alarm.
You may, for example, want to associate a command that switches on the reception lights when there is an
alarm in an intrusion area named "Reception".
The screen enables you to access only those items assigned to the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Instructions from "Operations/Alarms". You can use the
Selection screen to create a new alarm instruction or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
The following option is specific to this Selection screen:
Select Alarm Type - Use this pull-down list before selecting Find. It allows you to choose the type of device
that you wish to find.

Definition Screen Options


Type Selected
This read-only field shows the type of item you selected in the Selection screen.
Alarm Location
This displays the name of the item you selected in the Selection screen.
If you selected an intrusion transaction, the field displays "Various Intrusion Systems" to indicate that the
transaction could be generated by more than one intrusion system.
Device Type
Choose the type of device that is to receive the command.
Location
Choose the device that is to receive the command. Only those devices assigned to the currently selected
company are available in the pull-down menu.
Command
Choose the command. When acknowledging an alarm, you can choose the Command button to send the
command to the selected Location.
Meaning of each command
Previous
Use this button to move alphabetically backwards through the items listed in the Selection screen.
If you do not select OK before selecting Previous, any changes you have made are lost.
Next
Use this button to move alphabetically forwards through the items listed in the Selection screen.
If you do not select OK before selecting Next, any changes you have made are lost.

100
Symmetry Software Reference Manual

Alarm Routing ("Operation/Alarms/Routing")

Introduction to this Screen


Overview of this screen
Purpose of the Screen
Use this screen specify where to send each company's alarms, and the times to send the alarms. For
example, you may choose to send alarms to one Symmetry client during normal office hours, and to
another at other times.
You can send alarms to:
 A Symmetry client.
 Email address (configured in the "Operation/Alarms/Definitions" screen or
"Operation/Alarms/Reporting" screen).
 The head office of a Symmetry Global Edition system.
 A communications receiver.
Holidays
If, for example, May 1st has been specified as a holiday in the "Operation/Times/Holiday" screen and it has
been assigned to holiday type "Public Holidays", then on May 1st, only those start/end times defined for
"Public Holidays" will apply.
Routing Alarms to more than One Destination
You can route the company's alarms to multiple destinations by creating two or more Alarm Routing
definitions. Each destination can receive the company's alarms at the same or at different times, as
required.
The system ensures that only one user can acknowledge or clear an alarm if it is displayed at more than
one Symmetry client at the same time (the system grays out the relevant options in the Acknowledge
Alarm screen if the alarm is currently being acknowledged or cleared at another Symmetry client).
Unacknowledged alarms
The Unacknowledged After feature in the dialog enables an alarm to be routed to another destination if it
remains unacknowledged for a specified period of time.
Prerequisites
The Symmetry clients that the alarms are to be routed to must have been set up using the
"Install/System/Clients" screen.
Each company must have been set up using the "Install/System/Companies" screen.
If the routing of alarms is to vary according to holidays, holiday types must have been set up using the
"Operation/Times/Holiday" screen.
Using the screen
The screen has two sections: one for each day of the week, and another for holiday type.
There is one row for each day of the week and for each holiday type. You can set up one or more start/stop
intervals in each row.
To add an interval graphically
Click on any part of the bar, then drag the mouse to define the interval. The interval's start and end times
are shown on the right-hand side of the bar. The start and end times snap to the nearest hour or half hour.
To move an interval graphically
Click on the interval, then drag it to its new position. Overlapping intervals are merged automatically.

101
Alarm Routing ("Operation/Alarms/Routing")

To change an interval's times graphically


Click on the interval, then click on and drag the left-hand or right-hand edge to its new position.
To add or change times textually
Double-click anywhere in the bar (or click the right-hand mouse button in the bar and select Times) then
enter or change the times in the dialog box. You can use a resolution of one minute. The end time must be
greater than the start time. If you want a start time of midnight, use 00:00. If you want an end time of
midnight, use 24:00.
To delete an interval
Click on the interval, then press the Delete key, or press the right-hand mouse button on the interval and
select Delete.
To paste one or more intervals to another row
Left-click on the interval to cut or copy. Right-click, select Cut or Copy, then right-click on the other row
and select Paste. If required, you can paste the same interval to other rows. You can also use the Ctrl+X,
Ctrl+C and Ctrl+V keys to cut, copy or paste in the normal way.

Note: You can select more than one interval to delete, cut or copy by holding down the Ctrl key and left-clicking
on each interval.

About the Options


Description
This is the unique name of the alarm-routing definition.
Alarms for Company
Select the company whose alarms you wish to route.
To Client
Select one of the following:
 The name of the Symmetry client that is to receive the selected company's alarms.
 Communications Receiver - To specify the periods to send alarms to a communications receiver.
The Symmetry software can send alarms to only one communications receiver, as specified in the
"Maintenance/User & Preferences/System Preferences" screen.
 E-Mail Alarms - To specify the periods that email alarms (configured in the
"Operation/Alarms/Definitions" screen and "Operation/Alarms/Reporting" screen) are allowed to be
passed to the email system. You may, for example, want email alarms to be sent only at specified
periods of each day.
 Global Server - To specify the periods to send alarms from the region to the head office of a
Symmetry Global Edition system. Please refer to the Global Edition Installation and User Guide for
further information.
 SymmetryWEB - To send alarms to browsers that are accessing the SymmetryWEB software.
Include System and Node Alarms
Selecting this option will cause all system and node alarms to be routed to the nominated destination for the
period specified, in addition to the company's device alarms. Note that system and node alarms are not
associated with a particular company.
Unacknowledged After
This option enables you to direct alarms for the specified company to an additional destination if they are not
acknowledged within a specified period of time and have a priority that is greater than the specified value.
Selecting Not Used in the Mins menu disables the feature.

102
Symmetry Software Reference Manual

Note: Priority 1 is the highest priority, and priority 999 the lowest. Therefore if, for example, you enter 15 in the
Priority field, alarms with a priority of 14 or below will be routed to the nominated destination.

Once an alarm has been sent to a nominated Symmetry client, it can be acknowledged at that client, or at any
other client that the alarm was previously sent to.
An alarm comment alarm is attached to any alarm routed by this feature. The comment reads as follows:
Client: <Client Name> failed to acknowledge alarm within <X> minutes
Alarm Escalated to Client: <Client Name><Time and Date>
The time and date show when the alarm was routed to the nominated destination.
Setup Tab
Use the Setup tab to specify the times to send alarms to the specified client.
Alarm Types Tab
You can use the Alarm Types tab to specify the types of alarms to send to the client. Each alarm has an alarm
type, as set in the "Operation/Alarms/Definitions" screen.

Alarm Definitions Screen ("Operation/Alarms/Definitions")

General
Overview of this screen
This screen enables you to configure settings for a device and alarm/event combination chosen in the Selection
screen. The settings include, for example, the reporting type (alarm/event/ignore) and alarm instructions.
You can configure settings differently for each device and alarm/event combination. For example, "Reader 1"
and "Reader 2" could have different settings for the same "At Wrong Door" alarm.

Overview of Settings
This screen enables you to specify the following for the device and alarm/event combination you have chosen
in the Selection screen:
 Attributes such as the priority, color, sound and reporting type (alarm/event/ignore). The priority of an
alarm affects its order in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screen. You can configure default attributes in the "Operation/Alarms/Reporting" screen.

Note: Once you have chosen a device and alarm/event combination in the Selection screen, and
selected OK in the Definition screen, any changes you make to the default settings in the
"Operation/Alarms/Reporting" screen will have no effect on the settings for that device and alarm/event
combination. You can remove this override using the Reset button (see below).

 The instructions to display when acknowledging an alarm from the "Home/Monitoring/Alarms" or


"Home/Video & Audio/Virtual Matrix" screen. The text in the instructions must have already been
created by using the "Operation/Alarms/Instructions" screen.
 Whether to send details of the alarm/event by email to a selected email recipient.
Using the Selection screen
The Selection screen is displayed when you select Definitions from "Operation/Alarms". You can use the
Selection screen to select an alarm\event message for a specific item.
To use the Selection screen, make the required selections from the pull-down menus, click Find, then select
one of the items listed.
Selecting more than one item (by using Ctrl-click, Shift-click or by dragging the cursor in the normal way)
enables you to specify the settings for several items in one operation. If you do this, settings in the Definition

103
Alarm Definitions Screen ("Operation/Alarms/Definitions")

screen are shown blank, since each setting may already have a different value for each item. If you enter a new
setting, it will be used for all of the items you have selected when you save changes.
This Selection screen lists those items that belong to the currently selected company and those that belong to
no company. The installer defines the items that are assigned to each company.
The following options are specific to this Selection screen. For details of general Selection options, click here.
Alarm Category
Choose the source of the alarm you want to set up.
The content of this menu depends on the licenses installed.
Alarm Type
Select the type of alarm to set up.
If Alarm Category is <Standard Alarms>, selecting Monitor Point Alarms or Reader Alarms enables
you to set up an alarm definition for a monitor point or reader alarm.
If you have the dial-out/dial-in alarms reporting license, the pull-down list includes Monitor Point Alarms
Dial Out and Reader Alarms Dial Out options. These enable you to set up an alarm definition for an
alarm displayed at an alarms-receiving (dial-in) site. If, for example, a reader generates an alarm, the
alarm definition created using the Reader Alarms option is used when displaying the alarm in your own
security management. The alarm definition created using the Reader Alarms Dial Out option is used
when displaying the alarm at an alarms-receiving site.
Alarm Condition Message
After using Alarm Type, use this pull-down list to select the alarm message, then select Find.
Click here for details of each message.

Definition Screen Options


Category Selected
This shows the alarm category selected in the Selection screen.
Note: Communications Receiver transactions are for messages received from an intrusion communications
receiver. A communications receiver can relay messages to the Symmetry software for centralized alarm/event
reporting. Please refer to the Intrusion Management Installation and User Guide for further information.
Type Selected
This shows the type of alarm you selected in the Selection screen.
Alarm Condition
This displays the alarm message you selected in the Selection screen.
Click here for details of each message.
Alarm Attributes Tab
Default Priority
This is the priority of the alarm. When using the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen, alarms of the same color (status) are ordered according to their priority (1 is the highest,
999 is the lowest).
Color
This pull-down list enables you to choose the color of new alarms originating from the selected device, as
displayed in the "Home/Monitoring/Alarms", "Home/Monitoring/Activity", "Home/Video & Audio/Virtual
Matrix" and Acknowledge Alarm screens.
Selecting Automatic causes the default colors to be used, which are as follows:
 Red = New alarm.
 Blue = Acknowledged, but the device or condition has not been reset.

104
Symmetry Software Reference Manual

 Green = Acknowledged, reset, but not cleared.


Changing the color does not affect the color of existing alarms displayed in the Symmetry screens, or the
color of the color block displayed to the left of alarm messages.
The default colors of dial-out alarms cannot be changed.
Alarm Sound
Clicking on the Browse button enables you to select a sound (media wave file) for the alarm. The sound is
made when an alarm occurs at the specified device.
The Alarm Sound box displays the filename of a media wave file if a sound has been selected in this
screen or has been inherited from the default specified in the "Operation/Alarms/Reporting" screen. Note
that once you have clicked OK in this screen, any changes in the "Operation/Alarms/Reporting" screen are
not used.
If the Alarm Sound box displays no media wave file, each client uses a client-specific default sound, if
defined in the "Maintenance/User & Preferences/Client Preferences" screen.
This option is not available for dial-out alarm definitions (a default sound will be used at the dial-in alarms
site).
There are some useful "wav" files in the Program Data\Security Management System\Sounds folder.
The sound is stored in the database, but the Symmetry software also maintains a local copy in the
Program Data\Security Management System\Sounds folder, which it uses for performance benefits.
System to Report As
This specifies whether the message is to be reported as an alarm, event or not at all.
The "Install/Access Control/Reader", "Install/Access Control/Node" and "Install/Access Control/Monitor
Point" screens define whether each message is to be reported as an alarm, event or not at all at the
appropriate node. However, in this screen, you may define that the message is to be reported differently by
the server. For example, if it is important for a message to be sent immediately from a remote node to the
server, you would set up the message as an alarm at the node level (only alarms are sent immediately).
However, at the server level, you may want to report the message as an event only.
Note that the "Operation/Alarms/Routing" screen specifies the name of the client that alarms are sent to
and at what times.
Alarm Type
This option is available only if System To Report As is Alarm. You can use the menu to enter or select an
alarm type.
You can use alarm types to:
 Filter the alarms routed to a selected client. You can do this using the
"Operation/Alarms/Routing" screen.
 To specify that a selected role can only acknowledge (and not clear) alarms belonging to
specified alarm types. You can do this using Alarm Processing in the "Maintenance/User &
Preferences/Roles" screen.
You can create a new alarm type by typing a new name in the field. The General Alarm alarm type is the
default.
With the exception of General Alarm, any alarm type that is not assigned to an alarm and not selected in
the "Operation/Alarms/Routing" screen is automatically deleted.
Display Graphic on Alarm
This option is applicable if the device is included on a graphic in the "Setup/Graphics/Setup" screen. Select
the option if you want the graphic to be automatically displayed when the device has an alarm condition.
A graphic is displayed only if the "Home/Monitoring/Alarms" screen is not open (if the
"Home/Monitoring/Alarms" screen is open, the software assumes that the user would prefer to continue to
use this screen).

105
Alarm Reporting ("Operation/Alarms/Reporting")

If a graphic hierarchy has been defined, Display Lowest Graphic Level in the "Maintenance/User &
Preferences/Client Preferences" screen determines whether the highest-level or lowest-level graphic
containing the device is displayed.
Note: Selecting Show Graphic on any Alarm in the "Maintenance/User & Preferences/Client
Preferences" screen provides an alternative method of displaying the graphic when the device goes into
alarm. The Show Graphic on any Alarm option applies to all devices and overrides Display Graphic on
Alarm.
Send to communications receiver
This field is relevant only if a communications receiver is set up in the "Maintenance/User &
Preferences/System Preferences" screen.
For each message you want to send to the communications receiver, select Send to communications
receiver.
Instructions Tab
You can specify up to five lines of instructions for the alarm. Select the required instructions from the pull-down
lists. The instructions that appear in these pull-down lists are defined by the "Operation/Alarms/Instructions"
screen.
Email Tab
Use this tab if you want details of the alarm to be sent by email to a selected email recipient. The tab is also
available from the "Operation/Alarms/Reporting" screen. Click here for further information.
Reset
This button is displayed only if you have previously opened the selected device and alarm/event combination
and clicked OK (even if you made no changes). The presence of this button indicates that the settings in this
screen override the default settings configured in the "Operation/Alarms/Reporting" screen. Any changes you
make in the "Operation/Alarms/Reporting" screen will have no effect.
Clicking the Reset button removes the override and makes the settings the same as in the
"Operation/Alarms/Reporting" screen.

Alarm Reporting ("Operation/Alarms/Reporting")

Introduction to this Screen


Purpose of the Screen
Use this screen to:
 Set up defaults to be used within the "Operation/Alarms/Definitions" screen.

Note: Once you have selected a device and alarm combination in the "Operation/Alarms/Definitions"
screen, then selected OK in the Definition screen, any changes you make to the alarm type in the
"Operation/Alarms/Reporting" screen will have no effect on the settings for the device and alarm
combination in the "Operation/Alarms/Definitions" screen. You can remove this override by selecting the
device and alarm combination in the "Operation/Alarms/Definitions" screen and clicking the Reset option
near the bottom of the screen.

 Specify whether messages are to be reported by the server as alarms, events or not at all and
whether they are to be printed in real time.
 Alter the standard alarm/event messages displayed to the guard.
 Specify guard instructions for node and system alarms.

106
Symmetry Software Reference Manual

Prerequisites
The Default Alarm Instructions must have already been created by using the "Operation/Alarms/Instructions"
screen.
Using the Screen
1. Using the Select Alarm Type pull-down list in the Selection screen, choose the type of message.
2. Select Find. A list of all alarm/event messages is displayed.
3. Select the message that you want to edit.
4. If required, use Previous and Next to move through the list of messages.
5. Make changes, as required.
6. Select OK to save any changes that you have made; otherwise, Cancel. If you do not select OK before
selecting Previous or Next, any changes you have made are lost.
What do the messages mean?
Click here for details of each message.

General Options
Type Selected
This is a display-only field, which shows the message type selected in the Selection screen.
Note: Communications Receiver transactions are for messages received from an intrusion communications
receiver. A communications receiver can relay messages to the Symmetry software for centralized alarm/event
reporting. Please refer to the Intrusion Management Installation and User Guide for further information.
Alarm Definition Selected
This is a display-only field, which shows the message selected in the Selection screen. You can press
Previous or Next to choose a different message, but any changes you have made are thrown away (select OK
to save the changes).
Current Alarm Condition Message
This is the text that appears to a guard instead of the text shown in Alarm Definition Selected. By default, the
two are the same.
Do not change the messages unless it is absolutely necessary, otherwise they will not match the messages
used in the online help.
You cannot change the message text for alarms/events relating to intrusion transactions (this can be carried out
from the "Install/Intrusion/Intrusion/Device Configuration" screen instead).

Tabs
Alarm Attributes Tab
Default Priority
This is the priority of an alarm. When using the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual
Matrix" screen, alarms of the same color (that is, status) are ordered according to their priority (1 is the
highest, 999 is the lowest). The value specified is a default for the priority set in the
"Operation/Alarms/Definitions" screen, and is appropriate only if the selected message is reported as an
alarm.
Note that in the "Operation/Alarms/Definitions" screen, you have the added flexibility of setting the alarm
priority of each individual monitor point used on this system.
Output to Printer
Select this option if you wish the alarm/event message to be printed in real time.
The alarms/events printed at a client depend on alarm routing, as set up in the "Operation/Alarms/Routing"
screen. If real-time printing is required at a client, Output Alarms/Events to printer must also be selected

107
Alarm Reporting ("Operation/Alarms/Reporting")

in the "Install/System/Clients" screen, and Enable Printing of Alarms/Events option must also be
enabled in the "Maintenance/User & Preferences/System Preferences" screen. Each client uses its default
Windows printer. Only those alarms/events set up for printing in the "Operation/Alarms/Reporting" screen
are printed in real time.
The printer used for real-time printing should be the dot-matrix type. Laser printers are unsuitable due to
their inability to use continuous stationery.
The account used by the "SymmetryServices" service must have permission to print. This can be tested by
logging in as the account, adding the printer in the Control Panel, and checking that you can print a
document from this account.
Color
This pull-down list enables you to choose the color of new alarms originating from the selected device, as
displayed in the "Home/Monitoring/Alarms", "Home/Monitoring/Activity", "Home/Video & Audio/Virtual
Matrix" and Acknowledge Alarm screens.
Selecting Automatic causes the default colors to be used, which are as follows:
 Red = New alarm.
 Blue = Acknowledged, but the device or condition has not been reset.
 Green = Acknowledged, reset, but not cleared.
Changing the color does not affect the color of existing alarms displayed in the Symmetry screens.
Note that selecting a color will not affect the displayed time and date of an alarm displayed in the
"Home/Monitoring/Alarms", "Home/Video & Audio/Virtual Matrix" or Acknowledge Alarm screen. The time
and date are always displayed in the default color to enable the status of the alarms to be easily
determined.
The default colors of dial-out alarms cannot be changed.
Alarm Sound
Clicking on the Browse button enables you to select a sound (media wave file) for the alarm. The sound is
made when an alarm occurs at the specified device. If a media wave file has already been selected for the
alarm, its filename is displayed in the Alarm Sound box.
The sound you specify in this field is a default, which can be overridden for specific devices (such as
readers) in the "Operation/Alarms/Definitions" screen. If you do not select a media wave file, a client
default sound is used, if selected in the "Maintenance/User & Preferences/Client Preferences" screen.
Sounds for node and system alarms cannot be defined in the "Operation/Alarms/Definitions" screen.
Therefore, define sounds for node and system alarms here.
There are some useful "wav" files in the Program Data\Security Management System\Sounds folder.
The sound is stored in the database, but the Symmetry software also maintains a local copy in the
Program Data\Security Management System\Sounds folder, which it uses for performance benefits.
System to Report As
This specifies whether the message is to be reported as an alarm, event or not at all.
The "Install/Access Control/Reader", "Install/Access Control/Node" and "Install/Access Control/Monitor
Point" screens define whether each message is to be reported as an alarm, event or not at all at the
appropriate node. However, in this screen, you may define that the message is to be reported differently by
the server. For example, if it is important for a message to be sent immediately from a remote node to the
server, you would set up the message as an alarm at the node level (only alarms are sent immediately).
However, at the server level, you may want to report the message as an event only.
Note that the "Operation/Alarms/Routing" screen specifies the name of the client that alarms are sent to
and at what times.
Alarm Type
This option is available only if System To Report As is Alarm. You can use the menu to enter or select an
alarm type.

108
Symmetry Software Reference Manual

You can use alarm types to:


 Filter the alarms routed to a selected client. You can do this using the
"Operation/Alarms/Routing" screen.
 To specify that a selected role can only acknowledge (and not clear) alarms belonging to
specified alarm types. You can do this using Alarm Processing in the "Maintenance/User &
Preferences/Roles" screen.
You can create a new alarm type by typing a new name in the field. The General Alarm alarm type is the
default.
With the exception of General Alarm, any alarm type that is not assigned to an alarm and not selected in
the "Operation/Alarms/Routing" screen is automatically deleted.
Display Graphic on Alarm
This option is applicable if the device is included on a graphic in the "Setup/Graphics/Setup" screen. Select
the option if you want the graphic to be automatically displayed when the device has an alarm condition.
A graphic is displayed only if the "Home/Monitoring/Alarms" screen is not open (if the
"Home/Monitoring/Alarms" screen is open, the software assumes that the user would prefer to continue to
use this screen).
If a graphic hierarchy has been defined, Display Lowest Graphic Level in the "Maintenance/User &
Preferences/Client Preferences" screen determines whether the highest-level or lowest-level graphic
containing the device is displayed.
Note: Selecting Show Graphic on any Alarm in the "Maintenance/User & Preferences/Client
Preferences" screen provides an alternative method of displaying the graphic when the device goes into
alarm. The Show Graphic on any Alarm option applies to all devices and overrides Display Graphic on
Alarm.
Send to communications receiver
This field is relevant only if a communications receiver is set up in the "Maintenance/User &
Preferences/System Preferences" screen.
For each message you want to send to the communications receiver, select Send to communications
receiver.
Default Alarm Instruction 1
This option is relevant only if the selected message is reported as an alarm.
This option provides a default for the first instruction in the "Operation/Alarms/Definitions" screen; for
example, "Call Police". The instructions that appear in the pull-down list are from the
"Operation/Alarms/Instructions" screens of all companies defined on the system. If you select an
instruction, it will appear in a company's "Operation/Alarms/Definitions" screen only if the company has the
selected instruction defined in its "Operation/Alarms/Instructions" screen.
The instructions for node and system alarms cannot be defined in the "Operation/Alarms/Definitions"
screen. Therefore, define the instructions for node and system alarms here.
Email Tab
Use this tab if you want details of the alarm to be sent by email to a selected email recipient. The tab is also
available from the "Operation/Alarms/Definitions" screen. Click here for further information.

109
Custom Alarm Emails Screen ("Operation/Alarms/Custom Alarm Emails")

Custom Alarm Emails Screen ("Operation/Alarms/Custom Alarm


Emails")

General
Overview of this screen

Note: This screen is available only if the CustomAlarmEmailsEnabled setting is set to 1 in multimax.ini (as
described in the Symmetry Software Installation Manual) and only if your role ("Maintenance/User &
Preferences/Roles" screen) allows access to this screen.

Use this screen if you want alarms that are imported into Symmetry to be automatically emailed to selected
recipients.
Alarms can be imported into Symmetry using the TxnImportTable, as described in the Data Connect Manual.
The Custom Alarm Emails screen acts only on records imported into TxnImportTable that have the "Alarm" field
set to 1 (to indicate an alarm).
If the details you set up in the screen (What, Where, First Name and Last Name) match the details in the
imported alarm, an email is sent to the recipient defined in the selected Email Profile. You can use the *
wildcard in the What and Where fields. Leaving a field empty means "match all" (the same as the * wildcard).
The fields are not case-sensitive.

Note: Symmetry can send emails only if you set up the "Operation/Alarms/Routing" screen to route email
alarms (that is, To Client is set to E-Mail Alarms). You can also configure the screen so that emails are sent
only on specified days or between specified times.

Creating Multiple Definitions


You can create more than one custom alarm emails definition. This allows you, for example, to choose to send
alarms to different recipients depending on the alarm details. However, if an alarm matches more than one
definition, only the most precise match is used. For example, if an alarm matches a definition that includes
wildcards, and another that has no wildcards, then an email is sent only to the profile of the definition that has
no wildcards. For example:
 Custom Alarm Emails Definition 1 - Specifies a Where value of Reader*.
 Custom Alarm Emails Definition 2 - Specifies a Where value of Reader10.
 For an Imported alarm that is from Reader10, an email is sent only to the profile associated with
Custom Alarm Emails Definition 2.
 For an Imported alarm that is from Reader20, an email is sent only to the profile associated with
Custom Alarm Emails Definition 1.
In cases where you are using characters in a field in addition to *, it is important to make sure that an alarm
cannot match more than one definition, otherwise the definition used is not predictable. For example:
 Custom Alarm Emails Definition 1 - Specifies a Where value of Reader*.
 Custom Alarm Emails Definition 2 - Specifies a Where value of Read*.
 For an Imported alarm that is from Reader10, the alarm matches both definitions, and therefore the
definition used is not predictable.
Using the Selection screen
The Selection screen is displayed when you select Custom Alarm Emails from "Operation/Alarms". You can
use the Selection screen to create a new custom alarm emails definition, or to find an existing one to edit. Click
here for an overview of Selection screens and how to use them.

110
Symmetry Software Reference Manual

Definition Screen Options


Description
Specify a unique name for this definition.
What
This corresponds to "WhatField" (the alarm type) in the imported record.
Where
This corresponds to "WhereField" (the alarm location) in the imported record.
First Name
This corresponds to "LastName" (the first name of the person who caused the alarm, if known) in the imported
record.
Last Name
This corresponds to "LastName" (the last name of the person who caused the alarm, if known) in the imported
record.
Email Profile
This determines the email recipient and communication settings. Email profiles are defined in the
"Setup/Configuration/Email Profiles" screen.
Copy/Delete/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

Data Import Screen ("Operation/Data/Data Import")

General
Note: This help topic is for the standard Data Import screen, which may not be available at all clients. If you are
importing Lucent\Avaya data, select the Help button in the Import screen to obtain help.

Purpose of this Screen


This screen is available if you have purchased the Data Connect license. You can use the screen to add or
modify details of card holders or visitors by importing data from a text file or SQL import database, the format of
which is fully detailed in the Data Connect Manual.

Note: This screen is not used to import alarm transactions from the import database. Alarm transactions are
automatically imported into the Symmetry transaction database.

SQL/Text Data
The import data can be provided in a text file or in a Microsoft SQL Server database, depending on the setting
of DataImportEnabled in the multimax.ini file. If you are using a Microsoft SQL database, Current Import File
and Current Visitor File will be grayed out, and Import Database Scan Period will be ungrayed. The reverse
is true if you are using a text file.
If a text file is being used, the data may have been generated from a third-party system or from the
"Operation/Data/Data Export" screen of another installation of Symmetry. In the latter case, both systems must
be running the same version of Symmetry. Different files are used for card holder and visitors (by default,
named Import.txt and VisitorImport.txt).

111
Data Import Screen ("Operation/Data/Data Import")

Note: The default location of a text file is in the Import subdirectory of the database components folder (by
default Program Data\Security Management System) on the server. You may notice other files in this folder,
such as Reader.txt and AccessCd.txt. These are automatically generated by the Symmetry software when you
add new readers or other data, and are read by the external system in order to populate Import.txt and
VisitorImport.txt with the correct information. These files are not read when you import data.

Starting a Data Import


You can carry out the data import immediately using the Immediate option. Alternatively, if you are using a
Microsoft SQL Server database, you can also carry out the data import automatically at regular intervals by
setting up Import Database Scan Period.
Import Now
If you are using an SQL import database, it is possible for records added to the database to be automatically
and immediately imported into the database, without the need to use the Immediate option or to set up a scan
period. This is achieved by setting the ImportNow field of a record in the import database to "1" (see the Data
Connect Manual). When SQL Server sees this value in the field, it automatically triggers an import of all data in
the import database.
To maintain system performance, it is recommended that you do not set the ImportNow field to "1" for every
record added to the database.
Imported Records
When a record in a text import file has been read by the data import, it is moved from import.txt (or
VisitorImport.txt) to export.txt (or VisitorExport.txt), with a status code. Records in the SQL Server database
remain in the same database, with an updated status code.

Screen Options
Immediate
Choose this option if you want to import the contents of the database immediately. The next automatic import (if
applicable) takes place after the period specified in Import Database Scan Period.
When you choose OK, a Status screen is displayed that shows the progress of the import process. If this is not
displayed, check Number of records to process.
Number of records to process
This shows the number of records in the SQL Server database or text file.
Current Import File
This is applicable only if the import data is in a text file. If you want to import card holders, use Browse to select
the file that contains the card holder details to import (for example, Import.txt).
Current Visitor File
This is applicable only if the import data is in a text file. If you want to import visitors, use Browse to select the
file that contains the visitor details to import (for example, VisitorImport.txt).
Import Database Scan Period
This is applicable only if the import data is a Microsoft SQL Server database. The option allows the data import
to be carried out automatically at regular intervals.
The time you specify is the time to the next automatic import and the time period between subsequent imports.
If you restart the Symmetry services running at the server (for example, by restarting the server itself), or start
an immediate import, the next automatic import takes place after the time period specified here.
A value of zero disables automatic imports.

112
Symmetry Software Reference Manual

Import Database Password


This is optional. If you enter a password, the system checks this password during the import process against
the encrypted password in the SQL Server database or text file. If the match is not successful, the record is not
imported.
The purpose of entering a password is to prevent unauthorized records in the database from being imported.
This password is saved when you select OK; there is no need to re-enter the password each time you enter the
screen.
Delete Import Records
You can use this option to delete records from the import database or text file. The deletions take place when
you select OK.
None - No records are deleted from the database.
All Imported Records - All records that have been successfully imported are deleted when you select OK.
This option is applicable only if you are using an SQL Server Database.
All Records - All records are deleted when you select OK.
In the case of a text import file, the records are deleted from the export.txt file (see the overview of this screen).

Data Export Screen ("Operation/Data/Data Export")

General
About this Screen
This screen is available if you have purchased the Data Connect license. The screen enables you to export
details of card holders (excluding visitors) to an SQL Server database or text file, depending on the setting of
DataExportEnabled in the multimax.ini file.
Typically, SQL format is used to transfer card details to a third-party system. The text format is typically used to
transfer card details from one Symmetry system to another, provided Symmetry software is the same version
on both systems. Exported data in text format can be imported using the "Operation/Data/Data Import" screen.
The format of the exported data is fully detailed in the Data Connect Manual.
If the Data Connect option is installed, a new record is automatically added to the SQL database or text file
whenever a card holder is added, modified (in any way) or deleted. For a text file, Enable Export to Another
System must also be selected. Existing records in the SQL database or text file are not affected when exports
take place automatically.
You can export the details of all card holders manually by selecting Export All Records, then OK. This
overwrites the existing contents of the export database or text file.
All card holders are exported, irrespective of card status (active, inactive, expired or not yet valid), as specified
in the "Home/Identity/Card Holders" screen.
File created by text data export
If you export data using this method without specifying your own export filename, CreateImport.txt is
populated. If you specify the name of the export file in the "Operation/Data/Data Export" screen, both
CreateImport.txt and the specified file are populated.

Screen Options
Data To Export
Choose the details to export. The export data will contain a null field for any data item that has No selected.
Selecting No does not prevent a card-holder's details from being automatically exported if that information is
changed in the "Home/Identity/Card Holders" screen.

113
Archive Screen ("Operation/Data/Archive")

Note: A new record is exported automatically whenever a card-holder's details are modified in any way. For
example, setting Command Card Holder in a card holder's details will cause that card holders details to be
exported, even though the Command Card Holder setting is not included in the exported data and is not one
of the Data To Export options.

The Exempt checkboxes relate to are the executive card exemption options, as selected in the
"Home/Identity/Card Holders" screen.
Export All Records
Choose this option if you want to export the details of all card holders now. The existing contents of the SQL
database or text file are overwritten. The format of the export data is specified in the Data Connect Manual.
Delete All Export Records
Select this option, then OK if you wish to delete ALL records in the SQL database or text file now.
If you have selected Export All Records and Delete All Export Records , the deletion takes place first.
Extended Support
This option is available only if Multiple Cards is set in the "Maintenance/User & Preferences/System
Preferences" screen.
Choose this option if you want the RecordRequest field in the exported data to be set to 72 for any card holder
addition or modification. This allows card data to be imported more easily into a different system when card
holders can have multiple cards.
If the option is not set, values 0 and 1 are used for RecordRequest, as documented in the Data Connect
manual, and only the primary card is exported (the card shown first in the "Home/Identity/Card Holders"
screen).
Enable Export to Another System
If you want to enable automatic exports to a text file, select Enable Export To Another System. Deselecting
this option has no effect on being able to export details manually using Export All Records.
The specified file name is used for both automatic and manual exports to a text file. You can change the name
and location of the file by clicking on the button to the right of the text box and using the standard Windows
Save As dialog that is displayed.
Face and signature files used by a card holder's record are copied to the "Faces" and "Sigs" folders, which are
located in the same folder as the ASCII file created.
The option is available only if text exports have been selected during software installation.

Note: Data export is carried out by a background process. The file you specify may take a few minutes to
appear in the specified folder.

Archive Screen ("Operation/Data/Archive")

General
Introduction
An archive is a copy of the historical transaction data from the Symmetry database; that is, card transactions,
alarms, events, tasks and user activity. The archive is stored in bak file stored in a specified location.
Producing archives may be necessary to save important data, since data that is older than a specified number
of days is deleted automatically, as specified by Purge Daily Logs After in the "Maintenance/User &
Preferences/System Preferences" screen.
When producing a report, such as in the "Reports/History/Activity" screen, you can choose an archive as the
reporting source.

114
Symmetry Software Reference Manual

Depending on your requirements, archiving may not be required at all; old data may not be of any interest.
Using the Archive Screen

Note: Shut down Symmetry clients before running an archive.


Note: All files in the Archive Location folder are deleted prior to the archive. This is to ensure that the disk
does not become full. If required, save the previous archive file to another drive before starting the archive.

The Windows account used for the Symmetry services must have read and write permissions to the folder in
which the archive file is to be stored, and to the SQL Server backup folder, such as "Program Files
(x86)\Microsoft SQL Server\<instance name>\MSSQL\Backup". If you do not have access to the SQL Server
backup folder, the archive will not be saved to Archive Location.
The file copied to the archive location has the current date and time appended to its filename.

Screen Options
Archive Location
Choose the folder in which to store the archive. This must be a network drive. If you want to use a folder on the
current PC, select the folder under Network.
Period to Archive
This specifies the amount of the log that is to be archived. All information in the log that is dated between
Earliest Un-Archived Log and Archive Log End Date (inclusive) will be archived. Earliest Un-Archived Log
displays the earliest date in the log that has not been archived.
Normally, the interval between archives should be slightly less than the Purge Daily Logs After value set in
the "Maintenance/User & Preferences/System Preferences" screen. For example, if Purge Daily Logs is set to
90 days, archives should be taken every 89 days.

Backup Screen ("Operation/Data/Backup")

General
Introduction
The Backup screen allows you to take a backup of the data stored in the Symmetry Multimax, MultimaxTxn and
MultimaxTxnOps databases. The backup takes the form of a series of SQL "bak" files that include all
configuration settings, card details, card transactions, alarms, events, tasks and user activity stored in the
Symmetry database. The backup also takes a copy of multimax.ini in the ProgramData\Security Management
System folder.
The bak and ini files can be backed up to an external device using any appropriate third-party backup software.
In the unlikely event of a disk failure or other major problem, the bak files enable the Symmetry databases to be
restored, as described in the Symmetry Software Upgrade Guide.
Backups are also used when upgrading the Symmetry software.

Note: If you are using a Symmetry NVR, you must back up the NVR configuration folder separately and, if
required, the video repositories. There is a separate configuration folder for each NVR, the location of which
was specified during the installation of the NVR software. By default, the folder is located in
"ProgramData\Symmetry\NVR", but you can find out the path by opening the properties of one of the
"Symmetry NVR" services – the path to the configuration folder is shown as a parameter in the command line..

Using the Backup Screen

Note: Shut down Symmetry clients before running a backup.

115
Directory Link Screen ("Operation/Data/Directory Link")

Note: All files in the Backup Location folder are deleted prior to the backup. This is to ensure that the disk
does not become full. If required, save the previous backup files to another drive before starting the backup.

Use the Immediate option to start the backup process immediately, or use the options in the Timed Backup
area to set up the backup to occur at a specified time on selected days.
The files copied to the backup location have the current date and time appended to their filenames.
If you are having difficulties with getting backups to run, it is likely that your permissions or system is not set up
correctly. Please refer to the Symmetry Software installation Manual for details.
Backup Recommendations
It is absolutely essential that backups are taken regularly. The recommendation is that the Timed Backup
option is selected, with the backup time set to 04:00. This will give enough time for processes that occur at
midnight to be completed, and for any remote sites (if applicable) to dial-in with the previous day's data. The
backup will then have a complete record of the activity up to the previous day. It is best to avoid a backup time
of 02:00, otherwise confusion may arise when the time is advanced or retarded according to the daylight-saving
dates.

Screen Options
Backup Location
Choose the folder in which to store the backup. This must be a network drive. If you want to use a folder on the
current PC, select the folder under Network.
Immediate
Select Immediate to start a backup when you select OK.
Timed Backup
Select Enabled if you want automatic backups to take place daily at a specified time on selected days.

Directory Link Screen ("Operation/Data/Directory Link")

General
Introduction
This screen is available only if a license for the "Directory/LDAP Authentication Module" is installed. The screen
allows you to:
 Enable the module.
 Specify details of a directory server and authentication.
 Specify the method to be used to log on to the Symmetry software.

Screen Options
Enable
You can use this option to enable or disable the Directory/LDAP Authentication Module.
Enabling the module allows a user to log on to the Symmetry software using a Windows username and
password authenticated by a directory server. If Auto logon using Directory Single Sign On is selected, a
logon can occur automatically.
Active Directory Connection

116
Symmetry Software Reference Manual

Use Global Catalog


This option is relevant if there are multiple domains in a forest. Select the checkbox to use the global
catalog of the domain Symmetry is installed in. If you do not select this option, the system uses the global
catalog of the logged-in user's domain.
Server Name
The Symmetry software always attempts to connect automatically to the directory server. If this fails (such
as when a backup domain controller is active), the server name specified in this field is used. If
appropriate, enter a DNS name.
Port Number
Specify the port number to use for the connection to the directory server. The port is used, irrespective of
whether the connection to the server was made automatically or using the Server Name field.
The default port number when SSL encryption is used is 636. The default when SSL is not used is 389.
SSL Encryption
Select this option if the connection to the directory server uses SSL encryption. For Authentication, select
Digest or Negotiate.
Authentication
This is enabled if you select SSL Encryption. Choose Digest or Negotiate. Contact your IT department to
confirm the Active Directory authentication method required.
Directory Logon
Domain\User Name and Password
This is enabled if you select SSL Encryption. Specify the user name (in the format "Domain\Username")
and password of an account that has permissions to browse the Active Directory.
Logon
Auto logon using Directory Single Sign On
Select this option if you want the Symmetry software to attempt an automatic logon using the username of
the person currently logged onto Windows.
You should deselect Auto logon using Directory Single Sign On if you want to disable automatic logons.
For further details, please see "About the Directory/LDAP Authentication Module".
Allow Local Symmetry User Authentication
Initially, this checkbox is selected and grayed out. You can deselect the checkbox only after the system is
operational and there is at least one Symmetry user account that has been created automatically for a
directory user.
Deselecting the checkbox prevents users from logging on using the username and password of a user
defined locally in the Symmetry software.
If Allow Local Symmetry User Authentication is unset and Auto logon using Directory Single Sign
On is set, the Logoff option behaves as Exit to Windows. In all other cases, Logoff behaves normally.

Control Centers Screen ("Operation/Controls/Control Centers")

General
Overview of this screen
This screen is available only if you have the Control Centers and Commend Control licenses. The enables you
to set up control centers for a multi-user Commend control system. A control center is a collection of one or
more control groups.

117
Control Group Screen ("Operation/Controls/Control Groups")

When you open the "Home/Monitoring/Controls" screen, you select the control center to monitor. This
determines the control groups that are being monitored, and hence the control (access) points.
Click here for an overview of setting up a Commend Control System.
Click here for an overview of multi-user Commend Control Systems.
Using the Selection screen
The Selection screen is displayed when you select Control Centers from "Operation/Controls". You can use
the Selection screen to create a new control center or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.

Definition Screen Options


Control Center Description
This is the unique name of the control center.
Available Groups
This box lists the control groups that are not yet in the control center. A control group can be in more than one
control center.
Only those control groups that have been assigned to the currently selected company are available.
Assigned Groups
This box lists the control groups that are in the control center.
>>/<</Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Control Group Screen ("Operation/Controls/Control Groups")

General
Overview of this screen
A control group specifies a group of control points. Often, the control points in a control group have some
common purpose. For example, a control group may contain the following control points:
 One named "South Entrance Gate" to open/close the main barrier/gate at the south entrance to the
site. Depending on company policy, this may be left permanently open during the day, and closed
only at night.
 One named "Entry Barrier South Gate" to open/close an entry barrier at the south entrance to the
site. Depending on company policy, guard may decide to open or close this barrier for each
vehicle, following identity verification via an intercom and CCTV camera.
 One named "Exit Barrier South Gate" to open/close an exit barrier at the south entrance to the site.
This may also be opened or closed for each vehicle.
 One named "South Gate Lights" to switch lights on or off at the south entrance to the site.
When a guard selects a control point in the "Home/Monitoring/Controls" screen, the screen automatically
displays a control panel not only for the selected control point, but also for every other control point in the same
group. This gives the guard an immediate view of the status of every control point in the same group.
Each control point must belong to a control group. There can be up to four control points in the same control
group. A control point cannot belong to more than one control group. A control group belongs to the company
selected when the group is defined.
Click here for an overview of setting up a Commend Control System.

118
Symmetry Software Reference Manual

Using the Selection screen


The Selection screen is displayed when you select Control Groups from "Operation/Controls". You can use
the Selection screen to create a new control group or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.

Definition Screen Options


Control Group Name
This is the unique name of the control group.
Flag as Default Group
You can select this option for only one control group; once you have selected one control group to be the
default, the option is unavailable for all other control groups.
Selecting Flag as Default Group specifies that the control group is to be the default control group. The default
control group is the one that is displayed when you open the "Home/Monitoring/Controls" screen or when you
select Clear in the "Home/Monitoring/Controls" screen.
Access Point, Output Point, Select Point
Select up to four control points (access points and/or output points) to include in the control group. The group
can include up to three access points.
Default Monitor
Select the default monitor to use to display the image from the camera defined in the access point definition.
You can use only the monitors connected to the CCTV switcher's monitor 1, monitor 2 and monitor 3 video
outputs. The monitor 1 output must be connected to the client's video input card to enable the image to be
displayed in the "Home/Monitoring/Controls" screen.
The default monitor selection also determines the default position of the control-point panel along the bottom of
the "Home/Monitoring/Controls" screen. The control point that has CCTV monitor 1 as the default will be
displayed, by default, in the bottom-left corner of the "Home/Monitoring/Controls" screen. The control point that
has CCTV monitor 2 as the default will be displayed, by default, in the second panel from the left. The control
point that has CCTV monitor 3 as the default will be displayed, by default, in the third panel from the left.

Note: You can use Default Monitor to specify the default positions of the control points in the
"Home/Monitoring/Controls" screen, even if the control point does not have a CCTV camera.

Call Request Sound


This is relevant only for an access point that has an intercom. If you select a sound (wave file), the sound is
made at the client used for the Controls software when the intercom button is pressed at the access point.
The "Home/Monitoring/Controls" screen does not need to be displayed for the sound to be made; the sound is
made providing Symmetry is running with at least the Login screen displayed.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

119
Control Point Definition Screen ("Operation/Controls/Control Points")

Control Point Definition Screen ("Operation/Controls/Control


Points")

Introduction
Overview of this screen
This screen is available only with the Controls license. The screen enables you to set up the control points to
display in the "Home/Monitoring/Controls" screen.
A control point can be either an access point or an output point, as selected by Select Control Point Typein
the Selection screen.
An access point definition specifies the buttons to control, where applicable, a barrier (or other device), traffic
light, intercom and CCTV camera at the control point.
An output point definition specifies buttons to switch a device, such as a light, on and off at the control point.
The control points you set up in this screen can be used only for the currently selected company.
Click here for an overview of setting up a Commend Control System.
Using the Selection screen
The Selection screen is displayed when you select Control Points from "Operation/Controls". You can use the
Selection screen to create a new control point or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.
The following option is specific to this Selection screen:
Select Control Point Type - Select whether you want to find/create an Access Point or Output Point.

General Definition Screen Options


Selected
This shows whether the control point is an access point or an output point.
Control Point Description
Specify a unique name for the control point.
Output Type
Specify the hardware that is to provide the necessary output relays for the equipment at the control point. The
option you select determines which output names appear in the pull-down lists in the dialog. Select:
 Audio Control Outputs - If the output relays are provided by the control output relays on an I/O
card of the Commend Intercom System.
 Access Control Outputs - If the output relays are provided by auxiliary output relays of an access-
control node.
 Access Control Reader (access points only) - If you want the Open button to open a door at a
specified reader (a Grant Access command will be sent to the reader when a guard selects the
Open button in the "Home/Monitoring/Controls" screen). Any other output relays required for the
other devices selected in this screen must be provided by auxiliary output relays of an access-
control node.
If you select this option, choose the reader from the Open Output pull-down list.
 CCTV Ancillary Outputs - If outputs are provided by ancillary output relays on a CCTV switcher.
The switcher does not provide inputs.
Input Type
Specify the hardware that is to provide the necessary inputs for the equipment at the control point. The option
you select determines which input names appear in the pull-down lists in the dialog. Select:

120
Symmetry Software Reference Manual

 Audio Control Inputs - If the inputs are provided by the control inputs on an I/O card of the
Commend Intercom System.
 Access Control Inputs - If the inputs are provided by monitor points of an access-control node.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Defining Output Points


Setting up an output point

Defining Access Points


Setting up the barrier controls (Open, Close, Stop)
Setting up a traffic-light control
Call Priority
When in Select Call mode, the "Home/Monitoring/Controls" screen orders outstanding calls by call priority. Calls
that have the same priority are listed in order received.
The call priority is also used to order the control groups listed when using Select Any mode in the
"Home/Monitoring/Controls" screen. At the top of the list are those that have an access point with call request
(same as those listed in Select Call mode). These are highlighted with an asterisk (*). The groups without a call
request are listed next. Within each of these two categories, the group containing the access point with the
highest call priority is listed first. Groups that have the same priority are listed in alphabetical order.
For the benefit of ordering when in Select Any mode, a Call Priority can be assigned, even if an intercom is not
used at the access point.
The Call Priority can be any number between 1 and 99 (where 1 is the highest priority and 99 is the lowest
priority). You can also use the default of 0 if you do not want to assign a priority (effectively, 0 is treated as
being one higher than 99).
Intercom
Select the intercom that is at the control point. If you do not select an intercom, an intercom button will not be
displayed for the control point in the "Home/Monitoring/Controls" screen.
When the guard selects the intercom button in the "Home/Monitoring/Controls" screen he/she will be able to
communicate with the person at the intercom.
Camera
Select the CCTV camera at the control point (if appropriate). This will cause a camera button to be displayed for
the control point in the "Home/Monitoring/Controls" screen. If you do not select a camera, a camera button will
not be displayed.
Selecting the camera button in the "Home/Monitoring/Controls" screen will cause the image from the camera to
be displayed in the "Home/Monitoring/Controls" screen (CCTV switcher monitor 1).

121
Reports Menu

History Activity Screen ("Reports/History/Activity")

General
Overview of this screen
Use this screen to produce an activity report. An activity report contains details of previous events and alarms
stored in the log. Click Run when you are ready to produce the report.
Report Contents
 If you choose to send the report to the screen (Destination is Screen), you can click an item listed
in the report to display further details about it in the lower area of the screen.
 The report will display a Replay button if you select an alarm/event that has a tagged video clip
created using a Record Video command. You can select the button to replay the video clip. The
playback starts and ends a specified period of time before and after the time of the alarm/event.
 In printed reports, the font size can be changed using the ActivityReportTxnFontSize setting in
multimax.ini.
 The default maximum number of transactions displayed is 200,000. This can be reduced using the
ActivityHistoryMaxTransactions setting in multimax.ini (do not increase above 200,000).
 When running the report to the screen, the report shows the last comment entered for each
alarm/event. Clicking the button displays all comments.
 Associated Live and Associated Playback buttons are available if the alarm\event is from a device
that has associated cameras. You can use these options to display live or recorded video from the
cameras. For further information, please refer to "About Camera Views and Camera Device
Associations".

About the Options


Company
Date and Time
Filter Each Day to Include
Include Regions
This is available only at the head office of a Symmetry Global Edition system. You can choose whether to
display all activity, or only activity from selected sources, such as from all regions or a selected region.
For further information about Global Edition, please refer to the Global Edition Installation and User Guide.
Include:
Readers and Reader Groups
Cameras and Camera Groups
Monitor Points and Monitor Point Groups
Intercom Stations and Intercom Groups
Intrusion Systems Tx, Intrusion Panel, etc.
Comms Receiver
Floors and Floor Groups

122
Symmetry Software Reference Manual

Dial-In Alarm Sites


Maintenance Zone
Filter By
Activity checkboxes
Options:
Source
Destination
Clear
Run
Close

History User Audit Screen ("Reports/History/User Audit")

General
Overview of this screen
Use this screen to specify the information to include in the User Audit report. The report will contain details of
user actions within the screens of Symmetry. Select Run when you are ready to produce the report.

Note: If you are using a Central Card Handler client, the report contains details of user actions made from
Central Card Handler clients only. If you are using another type of client, the report excludes actions from
Central Card Handler clients, since the Card Handler database is separate from the normal regional database.

About the Options


By Company Group or By Company
Date and Time
Filter Each Day to Include
Include:
All Users and Or By User
All Entries and Or Select Below
Options:
Source
Destination
Clear
Run

History Onsite Times Screen ("Reports/History/Onsite Times")

General
Overview of this screen
The report will contain details of the amount of time that card holders have spent on site. Use this screen to
specify the information to include in the Onsite Times report. Select Run when you are ready to produce the
report.

123
History Card Holders On Site Screen ("Reports/History/Cardholders Onsite")

About the Options


Company Name
Date and Time
Filter Each Day to Include
Include:
Personal Data Title and Personal Data
Entrance and Exit Reader Group
Options:
Source
Destination
Clear
Run
Cancel

History Card Holders On Site Screen


("Reports/History/Cardholders Onsite")

General
Overview of this screen
You can use this screen to produce a report that will contain details of card holders or visitors whose last
successfully-used reader is in the selected reader group. Click OK when you are ready to produce the report.

About the Options


Company Name
Include:
Personal Data Title and Personal Data
Visitor Data Title and Visitor Data
Entrance Reader Group
Include Inactive Cards
Options:
Source
Destination
Clear
Run
Cancel

History Patrols Screen ("Reports/History/Patrols")

General
Overview of this screen
Use this screen to specify the information to include in the patrol tours report. The report will contain details of
when patrol tours were started and completed and any infringements of the rules. Select Run when you are
ready to produce the report.

124
Symmetry Software Reference Manual

This screen is available only if the Guard Patrol Manager software is installed.

About the Options


By Company Group or By Company
Date and Time
Filter Each Day to Include
All Patrols or This Patrol Tour
Options:
Source
Destination
Clear
Run
Close

History System Screen ("Reports/History/System")

General
Overview of this screen
This report is for engineer use only, and enables the content of the system log to be examined. Select Run
when you are ready to produce the report.

Screen Options
Date and Time
Filter Each Day to Include
Include
Source
Destination
Clear
Run
Cancel

History Video Archive Audit Screen ("Reports/History/Video


Archive Audit")

General
Overview of this screen
This report displays the date and time of each recording made by a Symmetry NVR.

Screen Options
By Company Group or By Company
Include
Destination
Clear
Run
Close

125
Global Status Report

Global Status Report

General
Overview of this screen
This report is available only if a Symmetry Global Edition Head Office or Region license has been installed at
the Symmetry system you are using.
The report allows you to determine whether data set up locally has been synchronized successfully with the
head office/regions. You can use the report to determine what has been uploaded/downloaded and what is still
outstanding.
When generated at the head office, you can use the report to show details of any failed, outstanding and
successful card holder downloads to regions.
When generated at a region, you can use the report to show details of any failed, outstanding and successful
access code uploads to the head office.
Please refer to the Global Edition Installation and User Guide for an introduction to Global Edition.

Screen Options
Region (available only at the head office)
Select the region you want to report on, or select <All> to report on all regions.
Filter By (available only at the head office)
Card Number
Select this option if you want to choose the cards to include in the report by card number.
Leave the card number empty to report on all cards, or type a card number in the box. You can use
wildcards to report on a range of cards.
Card Name
Select this option if you want to choose the cards to include in the report by name.
Leave Last Name and First Name empty to report on all cards. If you want to be selective about the card
holders to include, type the last name and/or first name in the box. For example, if you want to find all card
holders who have a last name of Clarke, type Clarke in the Last Name box.
You can use wildcards if required.
Employee Reference
Select this option if you want to choose the cards to include in the report by employee reference.
Leave Employee Reference empty to report on all cards, or type an employee reference in the box. For
example, if you want to include all card holders who have an employee reference of Emp25, type Emp25
in the box.
You can use wildcards if required.
(Other options are displayed below Filter By, depending on the option you choose.)
Failed/Outstanding/Synchronized Items
Failed Items - Select to include items that Symmetry has failed to synchronize with the appropriate
regions/head office. A failed item may occur if, for example:
 A card holder set up at the head office has personal data fields configured, but the personal data
titles have not been configured at the region.
 A card holder is given multiple cards at the head office, but Multiple Cards is not selected in the
"Maintenance/User & Preferences/System Preferences" screen at the region.
Outstanding Items - Select to include items that Symmetry is yet to synchronize with the appropriate
regions/head office. This may be caused by a temporary loss of communications.

126
Symmetry Software Reference Manual

Synchronized Items - Select to include items that Symmetry has successfully synchronized with the
appropriate regions/head office.
Show Cards on Report (available only at the head office)
Select this option if you want to include the card number (as well as name) in the report.

Predefined Reports ("Reports/History/Predefined Reports")

General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.

Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.

Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.

Using advanced reports


Note the following when using advanced reports:
 Only advanced reports that do not include a user interface are available. Reports such as
the standard Card Holder Access Rights report, which prompts for the card holder's first and
last name, are not available.
 Only advanced reports that are linked to one or more of the three standard data sources
(Symmetry, Symmetry Transactions and Symmetry Audit) are available. In the case of the
Symmetry Audit data source, Symmetry Auditing must be installed on the Symmetry server.
The report can be linked to more than one standard data source.
 If you modify a report using Symmetry Advanced Reporting, the report will no longer run if it
breaks the above rules.
 All advanced reports must have been exported to the Symmetry Advanced Reporting
Repository.

127
Predefined Reports ("Reports/History/Predefined Reports")

 There is no requirement for the PC that runs the report to have Symmetry Advanced
Reporting installed.

Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..

Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.

Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:

128
Symmetry Software Reference Manual

 If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able
to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
 If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.

Definition Screen Options


For Report Titled
This read-only field reflects the name of the report that you selected in the Selection screen.
Immediate Reporting Period
Choose Select and specify the reporting period if you want to produce the report immediately when you click
OK.
For all but advanced reports:
The report definition in "Reports/Configuration/Predefined Reports" determines the period within each day
that is reported (From Time and To Time).
On the Start Date, all data from the Start Time to the To Time will be included. On the End Date, all data
from the From Time to the End Time will be included. For all other dates in between, all data from the
From Time to the To Time will be included.
Example:
Start Date/Time = 22nd March 2020, 09:00
End Date/Time = 24th March 2020, 17:00
From Time = 07:00, To Time = 18:00
In this example, the report will include:
22nd March 2020- activity from 09:00 to 18:00
23rd March 2020- activity from 07:00 to 18:00
24th March 2020- activity from 07:00 to 17:00
For advanced reports:
The Start Date/Time and End Date/Time fields are grayed out. For advanced reports, you can use the
built-in "Today" system variable in the report designer (or calculations based on it) to define a report that
could be run daily, which could include a day's worth of data each time it is run.
You must have permissions to the views used by advanced reporting to run an advanced report
immediately.
Advanced reports are displayed in a different report window from other predefined reports.
Scheduled:
Enable and Disable
If you want to produce a scheduled report automatically at a specified time and date, select Enable.
Choose Disable to prevent a scheduled report from being generated.
First Report Date
Use this to specify the date on which to run the scheduled report for the first time.
Report Run/End Time
Use this to specify the time of the latest entry you want to include in the report for the day on which the
report is generated. This assumes that the report definition ("Reports/Configuration/Predefined Reports")
specifies a daily To Time that is later than 18:00. If the report definition specifies an earlier time, entries in
the report will finish at the report definition To Time.

129
Predefined Reports ("Reports/History/Predefined Reports")

The Report Run/End Time has no effect on other dates included in the report. The report will include
entries up to the report definition To Time for all other dates.
Example
Repeat Reporting Days
This specifies the reporting interval. If, for example, it is set to 7, the second report is generated 7 days
after the first, the third report is generated after another 7 days, etc. Specify a value of zero if you only
want the report to be generated once.
Deleting the report in the appropriate "Reports/Configuration/Predefined Reports" screen removes the
report from the system, which means that it can no longer be generated.
Include Previous Days
This determines the number of days that are included in the report. If, for example, it is set to 10, the report
will include the date that the report is generated and the previous 10 days. A value of 0 causes only the
date on which the report is generated to be included.
Start Time
Use this to specify the time of the earliest entry to include in the report for the earliest date in the report.
Example
Options:
Reporting Client
TheReporting Client pull-down list is available if you are setting up a scheduled report (that is, the
Scheduled Report Enable option is selected, and the Immediate Reporting Period Select option is not
selected). Select the client PC at which to run the scheduled report.
If you are producing an immediate report, it is sent to the screen that you are using, assuming that the
report destination is to the screen.
The Symmetry Client service must be running at the specified client for a scheduled report to be produced.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
Destination
Choose where to send the report. If you choose to send a scheduled report to the screen, it will be
displayed only on the specified client's screen.
If you send the report to a file, the Browse button becomes available, which enables you to choose the
report destination and file name.
A printer used for scheduled reports must be available to your Windows user account and to the account
running the client services. Log into Windows using the client services account and use the Control Panel
to add the printer, then do the same for your user account.
Email
If you have chosen to send the report by email, select the email profile that defines the destination email
addresses, as configured in the "Setup/Configuration/Email Profiles" screen. Only profiles that have a
default recipient are listed.
A single email profile can include a number of separate email addresses.
When you choose an email profile, the Format menu becomes available. For advanced reports, the report
format can be Adobe PDF, Microsoft XPS, HTML, Microsoft Word or Microsoft Excel. For activity and user-
audit reports, the report format can be TXT or CSV. For other reports, the format can be TXT only.

130
Symmetry Software Reference Manual

Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.

Predefined Reports ("Reports/History/Predefined Reports")

General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.

Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.

Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.

Using advanced reports


Note the following when using advanced reports:
 Only advanced reports that do not include a user interface are available. Reports such as
the standard Card Holder Access Rights report, which prompts for the card holder's first and
last name, are not available.
 Only advanced reports that are linked to one or more of the three standard data sources
(Symmetry, Symmetry Transactions and Symmetry Audit) are available. In the case of the
Symmetry Audit data source, Symmetry Auditing must be installed on the Symmetry server.
The report can be linked to more than one standard data source.
 If you modify a report using Symmetry Advanced Reporting, the report will no longer run if it
breaks the above rules.
 All advanced reports must have been exported to the Symmetry Advanced Reporting
Repository.
 There is no requirement for the PC that runs the report to have Symmetry Advanced
Reporting installed.

131
Predefined Reports ("Reports/History/Predefined Reports")

Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..

Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.

Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
 If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able

132
Symmetry Software Reference Manual

to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
 If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.

Definition Screen Options


For Report Titled
This read-only field reflects the name of the report that you selected in the Selection screen.
Immediate Reporting Period
Choose Select and specify the reporting period if you want to produce the report immediately when you click
OK.
For all but advanced reports:
The report definition in "Reports/Configuration/Predefined Reports" determines the period within each day
that is reported (From Time and To Time).
On the Start Date, all data from the Start Time to the To Time will be included. On the End Date, all data
from the From Time to the End Time will be included. For all other dates in between, all data from the
From Time to the To Time will be included.
Example:
Start Date/Time = 22nd March 2020, 09:00
End Date/Time = 24th March 2020, 17:00
From Time = 07:00, To Time = 18:00
In this example, the report will include:
22nd March 2020- activity from 09:00 to 18:00
23rd March 2020- activity from 07:00 to 18:00
24th March 2020- activity from 07:00 to 17:00
For advanced reports:
The Start Date/Time and End Date/Time fields are grayed out. For advanced reports, you can use the
built-in "Today" system variable in the report designer (or calculations based on it) to define a report that
could be run daily, which could include a day's worth of data each time it is run.
You must have permissions to the views used by advanced reporting to run an advanced report
immediately.
Advanced reports are displayed in a different report window from other predefined reports.
Scheduled:
Enable and Disable
If you want to produce a scheduled report automatically at a specified time and date, select Enable.
Choose Disable to prevent a scheduled report from being generated.
First Report Date
Use this to specify the date on which to run the scheduled report for the first time.
Report Run/End Time
Use this to specify the time of the latest entry you want to include in the report for the day on which the
report is generated. This assumes that the report definition ("Reports/Configuration/Predefined Reports")
specifies a daily To Time that is later than 18:00. If the report definition specifies an earlier time, entries in
the report will finish at the report definition To Time.
The Report Run/End Time has no effect on other dates included in the report. The report will include
entries up to the report definition To Time for all other dates.
Example

133
Predefined Reports ("Reports/History/Predefined Reports")

Repeat Reporting Days


This specifies the reporting interval. If, for example, it is set to 7, the second report is generated 7 days
after the first, the third report is generated after another 7 days, etc. Specify a value of zero if you only
want the report to be generated once.
Deleting the report in the appropriate "Reports/Configuration/Predefined Reports" screen removes the
report from the system, which means that it can no longer be generated.
Include Previous Days
This determines the number of days that are included in the report. If, for example, it is set to 10, the report
will include the date that the report is generated and the previous 10 days. A value of 0 causes only the
date on which the report is generated to be included.
Start Time
Use this to specify the time of the earliest entry to include in the report for the earliest date in the report.
Example
Options:
Reporting Client
TheReporting Client pull-down list is available if you are setting up a scheduled report (that is, the
Scheduled Report Enable option is selected, and the Immediate Reporting Period Select option is not
selected). Select the client PC at which to run the scheduled report.
If you are producing an immediate report, it is sent to the screen that you are using, assuming that the
report destination is to the screen.
The Symmetry Client service must be running at the specified client for a scheduled report to be produced.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
Destination
Choose where to send the report. If you choose to send a scheduled report to the screen, it will be
displayed only on the specified client's screen.
If you send the report to a file, the Browse button becomes available, which enables you to choose the
report destination and file name.
A printer used for scheduled reports must be available to your Windows user account and to the account
running the client services. Log into Windows using the client services account and use the Control Panel
to add the printer, then do the same for your user account.
Email
If you have chosen to send the report by email, select the email profile that defines the destination email
addresses, as configured in the "Setup/Configuration/Email Profiles" screen. Only profiles that have a
default recipient are listed.
A single email profile can include a number of separate email addresses.
When you choose an email profile, the Format menu becomes available. For advanced reports, the report
format can be Adobe PDF, Microsoft XPS, HTML, Microsoft Word or Microsoft Excel. For activity and user-
audit reports, the report format can be TXT or CSV. For other reports, the format can be TXT only.

Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.

134
Symmetry Software Reference Manual

Predefined Reports ("Reports/History/Predefined Reports")

General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.

Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.

Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.

Using advanced reports


Note the following when using advanced reports:
 Only advanced reports that do not include a user interface are available. Reports such as
the standard Card Holder Access Rights report, which prompts for the card holder's first and
last name, are not available.
 Only advanced reports that are linked to one or more of the three standard data sources
(Symmetry, Symmetry Transactions and Symmetry Audit) are available. In the case of the
Symmetry Audit data source, Symmetry Auditing must be installed on the Symmetry server.
The report can be linked to more than one standard data source.
 If you modify a report using Symmetry Advanced Reporting, the report will no longer run if it
breaks the above rules.
 All advanced reports must have been exported to the Symmetry Advanced Reporting
Repository.
 There is no requirement for the PC that runs the report to have Symmetry Advanced
Reporting installed.

135
Predefined Reports ("Reports/History/Predefined Reports")

Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..

Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.

Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
 If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able

136
Symmetry Software Reference Manual

to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
 If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.

Definition Screen Options


For Report Titled
This read-only field reflects the name of the report that you selected in the Selection screen.
Immediate Reporting Period
Choose Select and specify the reporting period if you want to produce the report immediately when you click
OK.
For all but advanced reports:
The report definition in "Reports/Configuration/Predefined Reports" determines the period within each day
that is reported (From Time and To Time).
On the Start Date, all data from the Start Time to the To Time will be included. On the End Date, all data
from the From Time to the End Time will be included. For all other dates in between, all data from the
From Time to the To Time will be included.
Example:
Start Date/Time = 22nd March 2020, 09:00
End Date/Time = 24th March 2020, 17:00
From Time = 07:00, To Time = 18:00
In this example, the report will include:
22nd March 2020- activity from 09:00 to 18:00
23rd March 2020- activity from 07:00 to 18:00
24th March 2020- activity from 07:00 to 17:00
For advanced reports:
The Start Date/Time and End Date/Time fields are grayed out. For advanced reports, you can use the
built-in "Today" system variable in the report designer (or calculations based on it) to define a report that
could be run daily, which could include a day's worth of data each time it is run.
You must have permissions to the views used by advanced reporting to run an advanced report
immediately.
Advanced reports are displayed in a different report window from other predefined reports.
Scheduled:
Enable and Disable
If you want to produce a scheduled report automatically at a specified time and date, select Enable.
Choose Disable to prevent a scheduled report from being generated.
First Report Date
Use this to specify the date on which to run the scheduled report for the first time.
Report Run/End Time
Use this to specify the time of the latest entry you want to include in the report for the day on which the
report is generated. This assumes that the report definition ("Reports/Configuration/Predefined Reports")
specifies a daily To Time that is later than 18:00. If the report definition specifies an earlier time, entries in
the report will finish at the report definition To Time.
The Report Run/End Time has no effect on other dates included in the report. The report will include
entries up to the report definition To Time for all other dates.
Example

137
Predefined Reports ("Reports/History/Predefined Reports")

Repeat Reporting Days


This specifies the reporting interval. If, for example, it is set to 7, the second report is generated 7 days
after the first, the third report is generated after another 7 days, etc. Specify a value of zero if you only
want the report to be generated once.
Deleting the report in the appropriate "Reports/Configuration/Predefined Reports" screen removes the
report from the system, which means that it can no longer be generated.
Include Previous Days
This determines the number of days that are included in the report. If, for example, it is set to 10, the report
will include the date that the report is generated and the previous 10 days. A value of 0 causes only the
date on which the report is generated to be included.
Start Time
Use this to specify the time of the earliest entry to include in the report for the earliest date in the report.
Example
Options:
Reporting Client
TheReporting Client pull-down list is available if you are setting up a scheduled report (that is, the
Scheduled Report Enable option is selected, and the Immediate Reporting Period Select option is not
selected). Select the client PC at which to run the scheduled report.
If you are producing an immediate report, it is sent to the screen that you are using, assuming that the
report destination is to the screen.
The Symmetry Client service must be running at the specified client for a scheduled report to be produced.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
Destination
Choose where to send the report. If you choose to send a scheduled report to the screen, it will be
displayed only on the specified client's screen.
If you send the report to a file, the Browse button becomes available, which enables you to choose the
report destination and file name.
A printer used for scheduled reports must be available to your Windows user account and to the account
running the client services. Log into Windows using the client services account and use the Control Panel
to add the printer, then do the same for your user account.
Email
If you have chosen to send the report by email, select the email profile that defines the destination email
addresses, as configured in the "Setup/Configuration/Email Profiles" screen. Only profiles that have a
default recipient are listed.
A single email profile can include a number of separate email addresses.
When you choose an email profile, the Format menu becomes available. For advanced reports, the report
format can be Adobe PDF, Microsoft XPS, HTML, Microsoft Word or Microsoft Excel. For activity and user-
audit reports, the report format can be TXT or CSV. For other reports, the format can be TXT only.

Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.

138
Symmetry Software Reference Manual

Predefined Reports ("Reports/History/Predefined Reports")

General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.

Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.

Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.

Using advanced reports


Note the following when using advanced reports:
 Only advanced reports that do not include a user interface are available. Reports such as
the standard Card Holder Access Rights report, which prompts for the card holder's first and
last name, are not available.
 Only advanced reports that are linked to one or more of the three standard data sources
(Symmetry, Symmetry Transactions and Symmetry Audit) are available. In the case of the
Symmetry Audit data source, Symmetry Auditing must be installed on the Symmetry server.
The report can be linked to more than one standard data source.
 If you modify a report using Symmetry Advanced Reporting, the report will no longer run if it
breaks the above rules.
 All advanced reports must have been exported to the Symmetry Advanced Reporting
Repository.
 There is no requirement for the PC that runs the report to have Symmetry Advanced
Reporting installed.

139
Predefined Reports ("Reports/History/Predefined Reports")

Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..

Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.

Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
 If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able

140
Symmetry Software Reference Manual

to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
 If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.

Definition Screen Options


For Report Titled
This read-only field reflects the name of the report that you selected in the Selection screen.
Immediate Reporting Period
Choose Select and specify the reporting period if you want to produce the report immediately when you click
OK.
For all but advanced reports:
The report definition in "Reports/Configuration/Predefined Reports" determines the period within each day
that is reported (From Time and To Time).
On the Start Date, all data from the Start Time to the To Time will be included. On the End Date, all data
from the From Time to the End Time will be included. For all other dates in between, all data from the
From Time to the To Time will be included.
Example:
Start Date/Time = 22nd March 2020, 09:00
End Date/Time = 24th March 2020, 17:00
From Time = 07:00, To Time = 18:00
In this example, the report will include:
22nd March 2020- activity from 09:00 to 18:00
23rd March 2020- activity from 07:00 to 18:00
24th March 2020- activity from 07:00 to 17:00
For advanced reports:
The Start Date/Time and End Date/Time fields are grayed out. For advanced reports, you can use the
built-in "Today" system variable in the report designer (or calculations based on it) to define a report that
could be run daily, which could include a day's worth of data each time it is run.
You must have permissions to the views used by advanced reporting to run an advanced report
immediately.
Advanced reports are displayed in a different report window from other predefined reports.
Scheduled:
Enable and Disable
If you want to produce a scheduled report automatically at a specified time and date, select Enable.
Choose Disable to prevent a scheduled report from being generated.
First Report Date
Use this to specify the date on which to run the scheduled report for the first time.
Report Run/End Time
Use this to specify the time of the latest entry you want to include in the report for the day on which the
report is generated. This assumes that the report definition ("Reports/Configuration/Predefined Reports")
specifies a daily To Time that is later than 18:00. If the report definition specifies an earlier time, entries in
the report will finish at the report definition To Time.
The Report Run/End Time has no effect on other dates included in the report. The report will include
entries up to the report definition To Time for all other dates.
Example

141
Predefined Reports ("Reports/History/Predefined Reports")

Repeat Reporting Days


This specifies the reporting interval. If, for example, it is set to 7, the second report is generated 7 days
after the first, the third report is generated after another 7 days, etc. Specify a value of zero if you only
want the report to be generated once.
Deleting the report in the appropriate "Reports/Configuration/Predefined Reports" screen removes the
report from the system, which means that it can no longer be generated.
Include Previous Days
This determines the number of days that are included in the report. If, for example, it is set to 10, the report
will include the date that the report is generated and the previous 10 days. A value of 0 causes only the
date on which the report is generated to be included.
Start Time
Use this to specify the time of the earliest entry to include in the report for the earliest date in the report.
Example
Options:
Reporting Client
TheReporting Client pull-down list is available if you are setting up a scheduled report (that is, the
Scheduled Report Enable option is selected, and the Immediate Reporting Period Select option is not
selected). Select the client PC at which to run the scheduled report.
If you are producing an immediate report, it is sent to the screen that you are using, assuming that the
report destination is to the screen.
The Symmetry Client service must be running at the specified client for a scheduled report to be produced.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
Destination
Choose where to send the report. If you choose to send a scheduled report to the screen, it will be
displayed only on the specified client's screen.
If you send the report to a file, the Browse button becomes available, which enables you to choose the
report destination and file name.
A printer used for scheduled reports must be available to your Windows user account and to the account
running the client services. Log into Windows using the client services account and use the Control Panel
to add the printer, then do the same for your user account.
Email
If you have chosen to send the report by email, select the email profile that defines the destination email
addresses, as configured in the "Setup/Configuration/Email Profiles" screen. Only profiles that have a
default recipient are listed.
A single email profile can include a number of separate email addresses.
When you choose an email profile, the Format menu becomes available. For advanced reports, the report
format can be Adobe PDF, Microsoft XPS, HTML, Microsoft Word or Microsoft Excel. For activity and user-
audit reports, the report format can be TXT or CSV. For other reports, the format can be TXT only.

Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.

142
Symmetry Software Reference Manual

Predefined Reports ("Reports/History/Predefined Reports")

General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.

Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.

Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.

Using advanced reports


Note the following when using advanced reports:
 Only advanced reports that do not include a user interface are available. Reports such as
the standard Card Holder Access Rights report, which prompts for the card holder's first and
last name, are not available.
 Only advanced reports that are linked to one or more of the three standard data sources
(Symmetry, Symmetry Transactions and Symmetry Audit) are available. In the case of the
Symmetry Audit data source, Symmetry Auditing must be installed on the Symmetry server.
The report can be linked to more than one standard data source.
 If you modify a report using Symmetry Advanced Reporting, the report will no longer run if it
breaks the above rules.
 All advanced reports must have been exported to the Symmetry Advanced Reporting
Repository.
 There is no requirement for the PC that runs the report to have Symmetry Advanced
Reporting installed.

143
Predefined Reports ("Reports/History/Predefined Reports")

Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..

Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.

Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
 If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able

144
Symmetry Software Reference Manual

to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
 If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.

Definition Screen Options


For Report Titled
This read-only field reflects the name of the report that you selected in the Selection screen.
Immediate Reporting Period
Choose Select and specify the reporting period if you want to produce the report immediately when you click
OK.
For all but advanced reports:
The report definition in "Reports/Configuration/Predefined Reports" determines the period within each day
that is reported (From Time and To Time).
On the Start Date, all data from the Start Time to the To Time will be included. On the End Date, all data
from the From Time to the End Time will be included. For all other dates in between, all data from the
From Time to the To Time will be included.
Example:
Start Date/Time = 22nd March 2020, 09:00
End Date/Time = 24th March 2020, 17:00
From Time = 07:00, To Time = 18:00
In this example, the report will include:
22nd March 2020- activity from 09:00 to 18:00
23rd March 2020- activity from 07:00 to 18:00
24th March 2020- activity from 07:00 to 17:00
For advanced reports:
The Start Date/Time and End Date/Time fields are grayed out. For advanced reports, you can use the
built-in "Today" system variable in the report designer (or calculations based on it) to define a report that
could be run daily, which could include a day's worth of data each time it is run.
You must have permissions to the views used by advanced reporting to run an advanced report
immediately.
Advanced reports are displayed in a different report window from other predefined reports.
Scheduled:
Enable and Disable
If you want to produce a scheduled report automatically at a specified time and date, select Enable.
Choose Disable to prevent a scheduled report from being generated.
First Report Date
Use this to specify the date on which to run the scheduled report for the first time.
Report Run/End Time
Use this to specify the time of the latest entry you want to include in the report for the day on which the
report is generated. This assumes that the report definition ("Reports/Configuration/Predefined Reports")
specifies a daily To Time that is later than 18:00. If the report definition specifies an earlier time, entries in
the report will finish at the report definition To Time.
The Report Run/End Time has no effect on other dates included in the report. The report will include
entries up to the report definition To Time for all other dates.
Example

145
Predefined Reports ("Reports/History/Predefined Reports")

Repeat Reporting Days


This specifies the reporting interval. If, for example, it is set to 7, the second report is generated 7 days
after the first, the third report is generated after another 7 days, etc. Specify a value of zero if you only
want the report to be generated once.
Deleting the report in the appropriate "Reports/Configuration/Predefined Reports" screen removes the
report from the system, which means that it can no longer be generated.
Include Previous Days
This determines the number of days that are included in the report. If, for example, it is set to 10, the report
will include the date that the report is generated and the previous 10 days. A value of 0 causes only the
date on which the report is generated to be included.
Start Time
Use this to specify the time of the earliest entry to include in the report for the earliest date in the report.
Example
Options:
Reporting Client
TheReporting Client pull-down list is available if you are setting up a scheduled report (that is, the
Scheduled Report Enable option is selected, and the Immediate Reporting Period Select option is not
selected). Select the client PC at which to run the scheduled report.
If you are producing an immediate report, it is sent to the screen that you are using, assuming that the
report destination is to the screen.
The Symmetry Client service must be running at the specified client for a scheduled report to be produced.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
Destination
Choose where to send the report. If you choose to send a scheduled report to the screen, it will be
displayed only on the specified client's screen.
If you send the report to a file, the Browse button becomes available, which enables you to choose the
report destination and file name.
A printer used for scheduled reports must be available to your Windows user account and to the account
running the client services. Log into Windows using the client services account and use the Control Panel
to add the printer, then do the same for your user account.
Email
If you have chosen to send the report by email, select the email profile that defines the destination email
addresses, as configured in the "Setup/Configuration/Email Profiles" screen. Only profiles that have a
default recipient are listed.
A single email profile can include a number of separate email addresses.
When you choose an email profile, the Format menu becomes available. For advanced reports, the report
format can be Adobe PDF, Microsoft XPS, HTML, Microsoft Word or Microsoft Excel. For activity and user-
audit reports, the report format can be TXT or CSV. For other reports, the format can be TXT only.

Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.

146
Symmetry Software Reference Manual

Predefined Reports ("Reports/History/Predefined Reports")

General
Overview of this screen
This screen enables you to define when and how to run predefined reports, the date range they should cover,
and where to send the reports. You can, for example, use the screen to set up a predefined report to run
automatically at scheduled intervals.
Predefined reports are reports that have been configured using the "Reports/Configuration/Predefined Reports"
screen, or those that have been configured in the Symmetry Advanced Reporting tool and exported to the
Symmetry Advanced Reporting Repository (or configured in a third-party reporting tool and exported to the
Repository).
Permissions
Each report has individual permissions set in the "Maintenance/User & Preferences/Roles" screen.
When you open "Reports, History, Predefined Reports" in the "Maintenance/User & Preferences/Roles"
screen, you will see a separate checkbox for each report.
If you cannot see an expected report, check that you have permissions to use it. By default, no user has
permissions to use any advanced report.

Running a report
If you want to run a report immediately, choose Select under Immediate Reporting Period, configure the
required settings and click OK. The settings are saved and the report is generated immediately.
If you want to run a report automatically at scheduled intervals, select Enable under Scheduled, configure
the required settings and click OK. A scheduled report cannot be sent to a screen.

Note: Scheduled reports are produced only at the client PC selected in the Reporting Client option. The
Symmetry Client service must be running at the specified client for a scheduled report to be produced. If
you produce a report immediately, it is sent to the screen that you are using, assuming that the report
destination is to the screen.

Using advanced reports


Note the following when using advanced reports:
 Only advanced reports that do not include a user interface are available. Reports such as
the standard Card Holder Access Rights report, which prompts for the card holder's first and
last name, are not available.
 Only advanced reports that are linked to one or more of the three standard data sources
(Symmetry, Symmetry Transactions and Symmetry Audit) are available. In the case of the
Symmetry Audit data source, Symmetry Auditing must be installed on the Symmetry server.
The report can be linked to more than one standard data source.
 If you modify a report using Symmetry Advanced Reporting, the report will no longer run if it
breaks the above rules.
 All advanced reports must have been exported to the Symmetry Advanced Reporting
Repository.
 There is no requirement for the PC that runs the report to have Symmetry Advanced
Reporting installed.

147
Predefined Reports ("Reports/History/Predefined Reports")

Selection Screen
Using the Selection screen
When you first use the Selection screen and click Find, all predefined reports of the selected Report Type are
listed on the left side of the screen. Selecting a report and clicking > moves the report to the right side of the
screen. You can then select a report listed on the right side of the screen and click Open (or double-click) to
open the Definition screen, which allows you to define when and how to generate the report.
When you return to the Selection screen and click Find, all predefined reports of the selected Report Type are
listed, except those already listed on the right side.
If you have selected Enable under Scheduled in the Definition screen, the Selection screen shows a green
checkmark next to the report name.
Selecting a report listed on the right side and clicking < moves the report to the left side. The report will no
longer run at scheduled intervals, if set up to do so.
You can move an entire group of reports (such as Advanced) from one side to another by selecting the group
name and clicking < or >.
The following options are specific to this Selection screen:
Report Title
This option determines the number of existing reports listed when you select Find. If the option is
blank, all reports of the specified type are listed. If you want to narrow the search, type the report
name in the box. You can find a range of reports by using wildcards.
Report Type
Choose the type of predefined report to list.
The list includes all predefined reports that can be configured in the
"Reports/Configuration/Predefined Reports" screen.
An Advanced option is also displayed if at least one report has been exported to the Symmetry
Advanced Reporting Repository.
You can choose All to list all report types.
Group By
You can choose Report Type to group the listed reports by report type..

Note: The Selection screen may not list reports depending on the setting ofFilter by Company in the
"Maintenance/User & Preferences/Client Preferences" screen, your company group and how By Company
Group or By Company was configured in the "Reports/Configuration/Predefined Reports" screen. If Filter by
Company is not set and By Company Group was selected in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group is the same as the company group of the user
who configured the report. If By Company was configured in the "Reports/Configuration/Predefined Reports"
screen, you are able to see a report only if your company group includes the specified company. If Filter by
Company is selected, only reports set up to include the currently selected company are available.

Click here for further details of Selection screens and how to use them.
About Companies
For advanced reports, the report will include all companies.
For predefined reports configured using "Reports/Configuration/Predefined Reports", the Selection screen may
not list reports depending on the setting of Filter by Company in the "Maintenance/User & Preferences/Client
Preferences" screen, your company group and how By Company Group or By Company was configured in
the "Reports/Configuration/Predefined Reports" screen:
 If Filter by Company is not set (the default) and By Company Group was selected in the
"Reports/Configuration/Predefined Reports" screen, you are able to see a report only if your
company group is the same as the company group of the user who configured the report. If By
Company was configured in the "Reports/Configuration/Predefined Reports" screen, you are able

148
Symmetry Software Reference Manual

to see a report only if your company group includes the specified company. The report will contain
only companies in your company group or the specified company, as applicable.
 If Filter by Company is selected, only reports set up to include the currently selected company are
available. The report will contain only the specified company.

Definition Screen Options


For Report Titled
This read-only field reflects the name of the report that you selected in the Selection screen.
Immediate Reporting Period
Choose Select and specify the reporting period if you want to produce the report immediately when you click
OK.
For all but advanced reports:
The report definition in "Reports/Configuration/Predefined Reports" determines the period within each day
that is reported (From Time and To Time).
On the Start Date, all data from the Start Time to the To Time will be included. On the End Date, all data
from the From Time to the End Time will be included. For all other dates in between, all data from the
From Time to the To Time will be included.
Example:
Start Date/Time = 22nd March 2020, 09:00
End Date/Time = 24th March 2020, 17:00
From Time = 07:00, To Time = 18:00
In this example, the report will include:
22nd March 2020- activity from 09:00 to 18:00
23rd March 2020- activity from 07:00 to 18:00
24th March 2020- activity from 07:00 to 17:00
For advanced reports:
The Start Date/Time and End Date/Time fields are grayed out. For advanced reports, you can use the
built-in "Today" system variable in the report designer (or calculations based on it) to define a report that
could be run daily, which could include a day's worth of data each time it is run.
You must have permissions to the views used by advanced reporting to run an advanced report
immediately.
Advanced reports are displayed in a different report window from other predefined reports.
Scheduled:
Enable and Disable
If you want to produce a scheduled report automatically at a specified time and date, select Enable.
Choose Disable to prevent a scheduled report from being generated.
First Report Date
Use this to specify the date on which to run the scheduled report for the first time.
Report Run/End Time
Use this to specify the time of the latest entry you want to include in the report for the day on which the
report is generated. This assumes that the report definition ("Reports/Configuration/Predefined Reports")
specifies a daily To Time that is later than 18:00. If the report definition specifies an earlier time, entries in
the report will finish at the report definition To Time.
The Report Run/End Time has no effect on other dates included in the report. The report will include
entries up to the report definition To Time for all other dates.
Example

149
Predefined Reports ("Reports/History/Predefined Reports")

Repeat Reporting Days


This specifies the reporting interval. If, for example, it is set to 7, the second report is generated 7 days
after the first, the third report is generated after another 7 days, etc. Specify a value of zero if you only
want the report to be generated once.
Deleting the report in the appropriate "Reports/Configuration/Predefined Reports" screen removes the
report from the system, which means that it can no longer be generated.
Include Previous Days
This determines the number of days that are included in the report. If, for example, it is set to 10, the report
will include the date that the report is generated and the previous 10 days. A value of 0 causes only the
date on which the report is generated to be included.
Start Time
Use this to specify the time of the earliest entry to include in the report for the earliest date in the report.
Example
Options:
Reporting Client
TheReporting Client pull-down list is available if you are setting up a scheduled report (that is, the
Scheduled Report Enable option is selected, and the Immediate Reporting Period Select option is not
selected). Select the client PC at which to run the scheduled report.
If you are producing an immediate report, it is sent to the screen that you are using, assuming that the
report destination is to the screen.
The Symmetry Client service must be running at the specified client for a scheduled report to be produced.
Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.
Destination
Choose where to send the report. If you choose to send a scheduled report to the screen, it will be
displayed only on the specified client's screen.
If you send the report to a file, the Browse button becomes available, which enables you to choose the
report destination and file name.
A printer used for scheduled reports must be available to your Windows user account and to the account
running the client services. Log into Windows using the client services account and use the Control Panel
to add the printer, then do the same for your user account.
Email
If you have chosen to send the report by email, select the email profile that defines the destination email
addresses, as configured in the "Setup/Configuration/Email Profiles" screen. Only profiles that have a
default recipient are listed.
A single email profile can include a number of separate email addresses.
When you choose an email profile, the Format menu becomes available. For advanced reports, the report
format can be Adobe PDF, Microsoft XPS, HTML, Microsoft Word or Microsoft Excel. For activity and user-
audit reports, the report format can be TXT or CSV. For other reports, the format can be TXT only.

Note: Symmetry blocks any emailed report that exceeds the Block attachments over setting in the
"Setup\Configuration/Email Profiles" screen. Please refer to the help for this option for further information.

150
Symmetry Software Reference Manual

Card Listing Selection Screen ("Reports/Identity Reports/Cards")

General
Overview of this screen
Use this screen to list the details of one or more cards.
You can choose to list all cards, or only those that satisfy a chosen filter (Filter By) and status (Select By
Status). The options in the scrollable areas in lower half of the screen enable you to specify the amount of
information to include in the listing.
You are able to produce listings only for the cards assigned to the currently selected company.

About the Options


Filter By
The Filter By option in the Card Listing Selection screen enables you to reduce the number of people listed
when you select Run.
Once you have selected an option from the Filter By pull-down list, other fields are displayed that enable you to
be even more selective about the people to list.
The following Filter By options are available:
Badges Flagged for Future Printing
Card Data Title
Card Format
Card Name
Card Number
Cards Deactivated at this Threat Level
Cards not Used From
Employee Reference
Visitor Card Name
Visitor Card Number
Visitor Data Title
Visitor Representing
Visitor Visiting
Select By Status
Options available when a card holder (not visitor) Filter By option is selected:
All
Active
Inactive
Lost
Expired
Advanced
Not Yet Valid
Options available when a visitor Filter By option is selected:
All
Pending
Active
Closed

151
Access Listing Selection Screen ("Reports/Identity Reports/Access")

Card Active
Card Inactive
Card Lost
Card Expired
Advanced
Not Yet Valid
Options
Select each item that you want to include in the listing. Selecting/deselecting Include All selects/deselects all
items.
The PIN Code and IDS Code options are displayed only if Card Holder Show PIN Code is selected in your
user permissions, as set up in the "Maintenance/User & Preferences/Roles" screen.
Output to
Using the pull-down list, choose whether to send the report to:
 The screen.
 A file. A dialog is displayed when you run the report, which enables you to specify the report file
name and format. You can save the file as a text file or as a CSV file for use in applications such
as Microsoft Excel.
 A printer.
 One or more email addresses. The report is sent as a CSV file, which can be opened in applications
such as Microsoft Excel. A dialog is displayed when you run the report, which enables you to
specify the destination addresses, email subject and text. The email server settings can configured
using the "Setup/Configuration/Email Profiles" screen.

Access Listing Selection Screen ("Reports/Identity


Reports/Access")

General
Overview of this screen
Use this screen to produce different types of access-rights listings.
If Card Holders by Company is selected in the "Maintenance/User & Preferences/System Preferences"
screen, you are able to produce listings of only those card holders, visitors, readers and groups that are
assigned to the currently selected company. If Card Holders by Company is not selected, the reports that list
card holders associated with a device or group will include card holders from all companies.

About the Options


Output to
Using the pull-down list, choose whether to send the report to:
 The screen.
 A file. A dialog is displayed when you run the report, which enables you to specify the report file
name and format. You can save the file as a text file or as a CSV file for use in applications such
as Microsoft Excel.
 A printer.
 One or more email addresses. The report is sent as a CSV file, which can be opened in applications
such as Microsoft Excel. A dialog is displayed when you run the report, which enables you to

152
Symmetry Software Reference Manual

specify the destination addresses, email subject and text. The email server settings can configured
using the "Setup/Configuration/Email Profiles" screen.
Filter By
The Filter By menu enables you to select the range of people listed when you select Run. The following Filter
By options are available (other options are displayed below Filter By, depending on the option you choose):
Card Holders Who Can Access This Door
Cards Holders Associated with a Floor/Output Group
Cards Holders Associated with a Reader Group
Cards Holders Associated with a Timecode
Cards Holders Associated with an Access Code
Card Holders Associated with an Area
Cards Expiring Between Badge Date
Cards Expiring Between Inactive Date
Cards Unused For This Number of Days Prior to Today
Doors Which Can Be Accessed By This Card
Inc Advanced Rights
Set this option if you want the report to consider or include any advanced access rights.
Include Inactive Cards
Set this option if you want to list all cards, whether or not they are active (as defined in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen).
Visitor Cards
Select this option if you want to include visitor cards in the listing, as set up in the "Home/Identity/Visitors"
screen.

Visitors Listing Selection Screen ("Reports/Identity


Reports/Visitors")

General
Overview of this screen
Use this screen to produce a report of current, previous or future visitors. You may, for example, want to run a
report that shows all the visitors expected today.
Visitors are set up in the "Home/Identity/Visitors" screen.

About the Options


Output to
Using the pull-down list, choose whether to send the report to:
 The screen.
 A file. A dialog is displayed when you run the report, which enables you to specify the report file
name and format. You can save the file as a text file or as a CSV file for use in applications such
as Microsoft Excel.
 A printer.
 One or more email addresses. The report is sent as a CSV file, which can be opened in applications
such as Microsoft Excel. A dialog is displayed when you run the report, which enables you to

153
Global Access Report Screen ("Reports/Identity Reports/Global Access")

specify the destination addresses, email subject and text. The email server settings can configured
using the "Setup/Configuration/Email Profiles" screen.
Visitor Status
Today's Visitors
Pending Visitors
Active Visitors
Closed Visitors
All Visitors
Arriving and Departing
Use these options to list visitors whose possible dates on site (as specified by the arrival and departure dates in
the "Home/Identity/Visitors" Definition screen) include a date within the period defined by Arriving and
Departing.
If Arriving is blank, it means "any date up to the Departing date". If Departing is blank, it means "any date
after the Arriving date".
Sign In Date
Choose a date to list only those visitors who signed in on the specified date.
Sign Out Date
Choose a date to list only those visitors who signed out on the specified date.
Last Name and First Name
You can use these fields to be selective about the visitors to list. For example, if you want to find all visitors who
have a last name of Smith, enter Smith in the box before clicking Run.
You can use wildcards if required.

Global Access Report Screen ("Reports/Identity Reports/Global


Access")
This is available only at the head office of a Symmetry Global Edition system. The report lists all card holders who
are using a selected Global Access Code in their access rights.
The report lists each card holder's last name, first name, card number and card status (active or inactive).
For further information about Global Edition, please refer to the Global Edition Installation and User Guide.

View System Configuration Screen


("Reports/Configuration/System Configuration")

General
This screen allows you to find out information about Symmetry and how it has been set up. You can find out
information such as:
 The operating system you are using, and the installed service pack level.
 Supported Configuration - The number of clients, companies and readers your system supports.
 Current Configuration - The number of readers, auxiliary outputs and other devices defined, the
date of the last backup and other useful information.
 Clients - The devices attached to or controlled by each client.
 Server - Database and other information relating to the server.

154
Symmetry Software Reference Manual

Screen Options
Expand
This button fully expands all contents of the currently-selected item in the tree view.
Collapse
This button fully collapses the currently-selected item in the tree view.
Info
When this button is pressed in, additional information about items is displayed in the tree. These items are
marked using the icon. For example, with the button pressed in, expanding a client in the tree displays the
client type and network name.
When the button is not pressed in, the additional information is not displayed in the tree.
Save
Click this button to save the information displayed in a text file. You are prompted to specify the filename and
folder in which to store the data.
Print
Select this button to print the currently displayed tree view.

Configuration Reports Selection Screen


("Reports/Configuration/Reports")

General
Use this screen to produce a report of how a particular part of the system has been set up.

About the Options


Output To
Using the pull-down list, choose whether to send the listing to the screen, printer or to a file (you will be
prompted to specify where to save the file).
The Muster report is not able to use output to file.
Listing Type
Choose the type of information to include in the report.
Many reports display information only for the currently selected company. Look at the top of the report to
determine if this has occurred.
Most report types are self-explanatory. The Serial Operations on Server report lists trigger/scheduled
commands that have affected a serial device connected to an RS232/NIC port of a node (as set up in the
"Install/System/Serial Devices/Port Settings" screen). To be listed, the trigger/scheduled command must have
been actioned from the Symmetry server, as defined in the scheduled/trigger command definition screen.
Please refer to "Disabling or Enabling Door Alarms" for details of the Bypassed Door Alarms report.

155
Predefined Activity Report ("Reports/Configuration/Predefined Reports/Predefined Activity")

Predefined Activity Report ("Reports/Configuration/Predefined


Reports/Predefined Activity")

General
Overview of this screen
(Click here to display the Selection screen help topic.)

About the Options


Report Title
Filter Each Day to Include
By Company Group or By Company
Include:
Readers and Reader Groups
Cameras and Camera Groups
Monitor Points and Monitor Point Groups
Intercom Stations and Intercom Groups
Intrusion Systems Tx, Intrusion Panel, etc
Comms Receiver and Comms Receiver Acct No
Dial-In Alarm Sites
Filter By
Activity checkboxes
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Predefined User Audit Report ("Reports/Configuration/Predefined


Reports/Predefined User Audit")

General
Overview of this screen
(Click here to display the Selection screen help topic.)

About the Options


User Report Title
Filter Each Day to Include
By Company Group or By Company
All Users or By User
All Entries or Select Below
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

156
Symmetry Software Reference Manual

Predefined Onsite Times Report


("Reports/Configuration/Predefined Reports/Predefined Onsite
Times")

General
Overview of this screen
(Click here to display the Selection screen help topic.)

About the Options


On Site Times Report Title
Filter Each Day to Include
Company Name
Personal Data Title and Personal Data
Entrance and Exit Reader Group
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Predefined Card Holders On Site Report


("Reports/Configuration/Predefined Reports/Predefined
Cardholders Onsite")

General
Overview of this screen
(Click here to display the Selection screen help topic.)

About the Options


Cards On Site Report Title
Company Name
Personal Data Title and Personal Data
Visitor Data Title and Visitor Data
Entrance Reader Group
Include Inactive Cards
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Predefined Patrol Report ("Reports/Configuration/Predefined


Reports/Predefined Patrols")

General
Overview of this screen
(Click here to display the Selection screen help topic.)

157
Predefined Video Archive Audit Report ("Reports/Configuration/Predefined Reports/Video Archive Audit")

About the Options


Patrol Report Title
Filter Each Day to Include
By Company Group or By Company
All Patrols or This Patrol Tour
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Predefined Video Archive Audit Report


("Reports/Configuration/Predefined Reports/Video Archive Audit")

General
Overview of this screen
You can use this screen to define Video Archive Audit reports, which can be run from the
"Reports/History/Predefined Reports" menu. You can run the reports on an ad-hoc basis or automatically at
scheduled times and dates.
(Click here to display the Selection screen help topic.)

About the Options


Video Archive Audit Report Title
By Company Group or By Company
Cameras/Camera Group
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Onsite Beyond Limit Screen ("Reports/Configuration/Predefined


Reports/Onsite Beyond Limit")

General
Overview of this screen
You can use this screen to produce a report of card holders who are or have been on site longer than a
specified period of time. You can configure the report to print automatically at a regular interval, such as every
hour.
The report lists all card holders who have been granted access by one of the readers in the Entrance Reader
Group and have not had a corresponding transaction within the specified time at one of the readers in the Exit
Reader Group.

Note: A report is not produced immediately you click OK. The earliest you can obtain a report is by setting
Report Interval to 0:30 - in this case, a report is generated at the next half past the hour, or on the next full
hour, whichever is the earliest.

The report is designed to be printed on a physical printer; it cannot be printed to Microsoft XPS Document
Writer.
By default, the report excludes card holders who have not been granted access for more than 30 days. This
period can be changed using the OnSiteBeyondLimitMaxDays setting in multimax.ini.

158
Symmetry Software Reference Manual

Note: The Symmetry services must run in a named account that has access to the printer. This can be tested
by logging into Windows as the account, adding the printer and checking that a document can be printed from
this account.

About the Options


Company Name
This menu is available if you have more than one company in your company group.
Select the company for which you want to produce the report.
Entrance Reader Group
Choose the reader group used for the entrance readers.
Exit Reader Group
Choose the reader group used for the exit readers.
Time on Site Threshold
Specify the maximum length of time card holders are authorized to be on site.
Report Interval
The first report is printed on the next Report Interval. For example, if you set Report Interval to 0:30, a report
is generated at the next half past the hour, or on the next full hour, whichever is the earliest. If you also select
the Schedule checkbox, the report is then printed automatically at the specified interval.
Report Destination
Choose the printer to use for the report.

159
Setup Menu

Digital Video Camera Group Screen ("Setup/Device


Groups/Cameras")

General
Overview of this screen
A camera group is a group of one or more digital video cameras. Setting up camera groups is useful if, for
example, you want to be able to set up or send a command to several cameras in one operation, such as to
start recording at 06:00 and finish at 18:00.
Camera groups can be used in various screens where a single digital video camera can be selected. For
example:
 "Home/Monitoring/Command Center"
 "Operation/Commands/Scheduled"
 "Operation/Commands/Trigger"
 "Operation/Commands/Predefined"
 "Setup/Graphics/Setup"
 "Home/Monitoring/Graphics"
 "Setup/Configuration/Threat Levels"
You can access only those camera groups that belong to the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Cameras from "Setup/Device Groups". You can use the
Selection screen to create a new camera group or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

Definition Screen Options


Digital Video Camera Group Name
This is the unique name of the camera group.
Filter
The Filter field affects the cameras listed in the Available Cameras and Assigned Cameras boxes.
You can use the field to list only those cameras whose name includes the text you enter. For example, the
camera named "ABC123" is listed if you enter "C1", or "AB", etc. Enter the text and click to action the filter.
Leave the Filter field empty if you do not want to use a filter.
You may want to use Filter if, for example, the number of cameras exceeds the maximum number that can be
listed, as set using Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences"
screen (default 500).

Available Cameras
This box lists all of the digital video cameras that are owned by the currently selected company.

160
Symmetry Software Reference Manual

The same camera can be in more than one camera group.


Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message at a bottom of the list indicates when
this limit has been reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter field.
Assigned Cameras
This box lists the digital video cameras that are in the camera group.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Reader Groups Screen ("Setup/Device Groups/Readers")

General
Overview of this screen
A reader group is a group of one or more card readers. They are used when defining access rights (such as in
the "Home/Identity/Card Holders" screen), and can be useful if you want to be able send a single command to
several readers at the same time.
The groups you set up in this screen can be used only for the currently selected company.

Note: The Permissions button in the "Install/Access Control/Reader" screen may have been used to prevent
you from accessing a reader. Similarly, the Permissions button may have been used when defining a reader
group to prevent you from accessing it.

Downloading the data


When you modify a reader group or shared reader group, you are prompted to specify when to update the
associated card data at the nodes. While a node is being updated, cards may not be recognized at readers
connected to that node. Therefore, you may wish to defer the updating of nodes to times when most people are
off site.
Options:
 Download Cards On Exit - The nodes will be updated when you select Close in the Selection
screen.
 Do Not Download Cards - The nodes will not be updated automatically. You will need to use the
"Maintenance/Download/Cards" screen to update the nodes.
 Download Cards At Specified Time - This allows the download to be deferred to any time in the
next 24 hours. The nodes will be updated at the time specified by Download Cards At, although if
you modify other entries, this time is redisplayed and can be altered.
Using the Selection screen
The Selection screen is displayed when you select Readers from "Setup/Device Group". You can use the
Selection screen to create a new reader group or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

161
Auxiliary Output Groups Screen ("Setup/Device Groups/Auxiliary Outputs")

Definition Screen Options


Reader Group Name
This is the unique name of the reader group. The name cannot be the same as another reader group that
belongs to the currently-selected company, or the same as the name of a shared reader group that has been
shared with the currently-selected company.
Filter
The Filter field affects the readers listed in the Available Readers and Assigned Readers boxes.
You can use the field to list only those readers whose name includes the text you enter. For example, the
reader named "ABC123" is listed if you enter "C1", or "AB", etc. Enter the text and click to action the filter.
Leave the Filter field empty if you do not want to use a filter.
You may want to use Filter if, for example, the number of readers exceeds the maximum number that can be
listed, as set using Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences"
screen (default 500).
Available Readers
This box lists the readers that are not yet in the group. A reader can be in more than one group.
Only those readers that have been assigned to the currently selected company are available (as defined by the
installer). If the access rights require the use of readers belonging to another company, the company owning
the readers will need to set up a shared reader group ("Setup/Device Groups/Shared/Shared Readers" screen).
Readers that are designated as elevator readers by the installer do not appear in this list; they are selected via
the "Setup/Device Groups/Floors" screen.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message at a bottom of the list indicates when
this limit has been reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter field.
Assigned Readers
This box lists the readers that are in the group.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Auxiliary Output Groups Screen ("Setup/Device Groups/Auxiliary


Outputs")

General
Overview of this screen
An auxiliary group is a group of one or more auxiliary outputs. Such a group is useful if you want to be able
send a single command to several auxiliary outputs at the same time.
The groups you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Auxiliary Outputs from "Setup/Device Groups". You can
use the Selection screen to create a new auxiliary output group or to find an existing one to edit. Click here for
an overview of Selection screens and how to use them.

162
Symmetry Software Reference Manual

Definition Screen Options


Auxiliary Group Name
This is the unique name of the auxiliary output group.
Filter
The Filter field affects the auxiliary outputs listed in the Available Auxiliary Outputs and Assigned Auxiliary
Outputs boxes.
You can use the field to list only those auxiliary outputs whose name includes the text you enter. For example,
the auxiliary output named "ABC123" is listed if you enter "C1", or "AB", etc. Enter the text and click to
action the filter.
Leave the Filter field empty if you do not want to use a filter.
You may want to use Filter if, for example, the number of auxiliary outputs exceeds the maximum number that
can be listed, as set using Selection List Rows Limit in the "Maintenance/User & Preferences/Client
Preferences" screen (default 500).
Available Auxiliary Outputs
This box lists the auxiliary outputs that are not yet in the group. An auxiliary output can be in more than one
group.
Only those auxiliary outputs that have been assigned to the currently selected company are available (as
defined by the installer).
Auxiliary outputs that are used to control access to floor-selection buttons on an elevator panel are not
displayed in this box.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message at a bottom of the list indicates when
this limit has been reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter field.
Assigned Auxiliary Outputs
This box lists the auxiliary outputs that are in the group.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Monitor Point Groups Screen ("Setup/Device Groups/Monitor


Points")

General
Overview of this screen
A monitor group is a group of one or more monitor points. A monitor group is useful if you want to be able send
a single command to several monitor points at the same time.
The groups you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Monitor Points from "Setup/Device Groups". You can use
the Selection screen to create a new monitor group or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.

163
Intrusion Areas Screen ("Setup/Device Groups/Intrusion Areas")

Definition Screen Options


Monitor Group Name
This is the unique name of the monitor group.
Filter
The Filter field affects the monitor points listed in the Available Monitor Points and Assigned Monitor
Points boxes.
You can use the field to list only those monitor points whose name includes the text you enter. For example, the
monitor point named "ABC123" is listed if you enter "C1", or "AB", etc. Enter the text and click to action the
filter.
Leave the Filter field empty if you do not want to use a filter.
You may want to use Filter if, for example, the number of monitor points exceeds the maximum number that
can be listed, as set using Selection List Rows Limit in the "Maintenance/User & Preferences/Client
Preferences" screen (default 500).
Available Monitor Points
This box lists the monitor points that are not yet in the group. A monitor point can be in more than one group.
Only those monitor points that have been assigned to the currently selected company are available (as defined
by the installer).
Monitor points that are used to monitor the floor-selection buttons on an elevator panel are not displayed in this
box.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message at a bottom of the list indicates when
this limit has been reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter field.
Assigned Monitor Points
This box lists the monitor points that are in the group.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Intrusion Areas Screen ("Setup/Device Groups/Intrusion Areas")

General
Overview of this screen
This screen is used to set up intrusion areas for M2150 intrusion systems.
Note: You can use the Permissions button to allow only selected user roles to arm and/or disarm the area
from the Symmetry software. You can assign separate arm and disarm privileges for each user role.
Note: A card holder with valid area and reader access rights can disarm the area that the reader belongs to
and gain access simply by presenting the card to the reader.
Using the Selection screen
The Selection screen is displayed when you select "Setup/Device Groups/Intrusion Areas". You can use the
Selection screen to create a new intrusion area or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

164
Symmetry Software Reference Manual

Definition Screen Options


Intrusion Area Name
This is the unique name of the intrusion area.
Intrusion Panel
Select the M2150 intrusion node that is connected to the zones and readers you want to include in the intrusion
area. Only nodes that have Supports Intrusion Functionality selected in the "Install/Access Control/Node"
screen are listed.
Area Number
Each area is automatically assigned an area number, which is unique to the area account number.
Account Number
You can use this field to specify a communications receiver account number for the area. The default value is
set up in the "Maintenance/User & Preferences/System Preferences" screen.
Details of any area alarm sent to the communications receiver include the account number, which identifies the
source of the alarm to any operator of the communications receiver. The account number does not need to be
unique to an area, but the combination of account number and area number is unique.
To send alarms to a communications receiver, you need to:
 Route alarms to the receiver using the "Operation/Alarms/Routing" screen.
 Specify the IP address and other settings of the communications receiver in the "Maintenance/User
& Preferences/System Preferences" screen.
Tabs:
Setup Tab
Filter
The Filter field affects the zones listed in the Available Intrusion Zones and Assigned Intrusion
Zones boxes.
You can use the field to list only those zones whose name includes the text you enter. For example,
the zone named "ABC123" is listed if you enter "C1", or "AB", etc. Enter the text and click to
action the filter.
Leave the Filter field empty if you do not want to use a filter.
You may want to use Filter if, for example, the number of zones exceeds the maximum number that
can be listed, as set using Selection List Rows Limit in the "Maintenance/User &
Preferences/Client Preferences" screen (default 500).
Available Intrusion Zones
This box lists the intrusion zones and readers that are not yet in the area. A zone cannot be in more
than one area.
Only those zones and reader that have been assigned to the currently selected company are
available (as defined by the installer).
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences"
screen determines the maximum number of items listed (default 500). A message at a bottom of the
list indicates when this limit has been reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter field.
Assigned Intrusion Zones
This box lists the intrusion zones and readers that are in the area.

165
Intrusion Areas Screen ("Setup/Device Groups/Intrusion Areas")

Options Tab
Entry/Exit Timer Running
The selected auxiliary output is on when:
 The entry timer is running.
 The exit timer is running.
Area Armed
The selected auxiliary output is:
 On when the area is armed and all zones are in their normal state.
 Flashing when the area is armed and at least one zone has been disabled or
bypassed.
 Off when the area is not armed.
Area in Alarm
The selected auxiliary output operates when the area has an "Area in Alarm" alarm. The auxiliary
output returns to its normal state when you send a "Reset Area To Normal" command from the
"Home/Monitoring/Command Center" screen or when you disarm the area.
Note: A zone tamper causes an alarm when the area is armed.
Area Pre-arm
When enabled, all arming/disarming readers in the area emit a sound during the pre-arm period of a
scheduled auto-arm of the area.
Optionally, you can also choose an auxiliary output to switch on during the pre-arm period.
The Warning Time field specifies the duration of the selected area's pre-arm period.
Sub Graphic to Display
You can associate a graphic with the area.
Associating a graphic with the area causes the Symmetry software to display the graphic when you
double-click the area icon one level higher in the graphic hierarchy.
Arm/Disarm Warnings Tab
You can use this tab to specify the periods when the intrusion system is expected to have a disarmed
state. The start time of the selected time code determines the time when the area should be disarmed. The
end time determines the time when the area should be armed.
The purpose of the tab is to enable the alarm/event messages selected in the lower area of the tab to be
generated automatically if the system is not in the expected armed/disarmed state.
The area below the menu gives a graphical representation of the time intervals defined by the time code.
You can use Edit/View to view or modify the selected time code, or New to create a new time code.
Late to Disarm
Generates the Area Late to Disarm alarm/event message if the area is disarmed too late. A period of
grace is allowed, in which the area can be disarmed after the specified time. This period is given
under the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in the
"Maintenance/User & Preferences/System Preferences" screen.
Late to Arm
Generates the Area Late to Arm alarm/event message if the area is armed too late. A period of
grace is allowed, in which the area can be armed after the specified time. This period is given under
the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in the "Maintenance/User &
Preferences/System Preferences" screen.

166
Symmetry Software Reference Manual

Armed Early
Generates the Area Armed Early alarm/event message if the area is armed too early. A period of
grace is allowed, in which the area can be armed before the next specified time. This period is given
under the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in the
"Maintenance/User & Preferences/System Preferences" screen.
Disarmed outside normal period
Generates the Area Disarmed Outside Schedule alarm/event message if the area is disarmed too
early. A period of grace is allowed, in which the area can be disarmed before the next specified time.
This period is given under the checkboxes and is defined by Intrusion Arm/Disarm Tolerance in
the "Maintenance/User & Preferences/System Preferences" screen.
Common Areas Tab
You can use this tab to define a common area, such as a lobby or other part of the building that people can
use to access several other areas.
By selecting areas in this tab, you are declaring that the area you are defining is a common area serving
the selected areas.
A common area is automatically armed when the last area that is accessed through the common area is
armed.
Reporting Tab
This tab specifies whether each message causes an alarm, event or is not reported at all at the node.
Note: Alarms are reported as events when the intrusion node is in maintenance mode.
This specification is at the node level, not at the server level. Therefore, although you may define a
message as an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the
message is to be reported as an event by the server. Such an approach may be needed if it is important
for a node on a remote site to communicate the message to the server immediately (only alarms are sent
immediately to the server).
In addition, note that the "Operation/Alarms/Routing" screen may block node alarms from being displayed.
See Alarm/Event Messages for details of each message.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Please refer to the overview of this screen for additional information about the Permissions button.
Report
Selecting this button enables you to generate an intrusion areas report. Click here for further information.

Floor Groups Screen ("Setup/Device Groups/Floors")

General
You can use this screen to create floor groups and output groups.

Note: The groups you set up in this screen can be used only for the currently selected company.

Using the Selection screen


The Selection screen is displayed when you select Floor/Output from "Setup/Device Groups". You can use the
Selection screen to create a new floor/output group or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.

167
Intercom Group Screen ("Setup/Device Groups/Intercoms")

Definition Screen Options


Floor Group Name
This is the unique name of the floor or outputgroup.
The name of a floor group cannot be the same as another floor group that belongs to the currently-selected
company, or the same as the name of a shared floor group that has been shared with the currently-selected
company.
Associated Reader(s)
For a floor group, select the reader that is associated with the elevator.

Note: M2100 elevator nodes can be used to control more than one cab, and there is one elevator reader per
cab. If the reader you choose is connected to an M2100 elevator node, the reader is for cab 1. Additional
reader menus are displayed for cabs 2, 3 and 4 (if applicable).

For an output group, select the card-relay reader; that is, the reader from which the auxiliary outputs will be
activated.
Only those readers that have been assigned to the currently selected company are available (as defined by the
installer).
Available Floors
This box lists the available floors or outputsthat are not yet in the group. A floor or outputcan be in more than
one group. Each floor corresponds to an auxiliary output that enables the appropriate floor-selection button at
the elevator control panel.
Only those floors and outputsthat have been assigned to the currently selected company are available (as
defined by the installer).
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500).
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Assigned Floors
This box lists the floors or outputsthat are in the group. Each floor corresponds to an auxiliary output that
enables the appropriate floor-selection button at the elevator control panel.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Intercom Group Screen ("Setup/Device Groups/Intercoms")

General
Overview of this screen
This screen is used when setting up a Zenitel Pulse or Stentofon Alphacom intercom system.
The screen enables you to define groups of intercoms. The groups can be used in:
 The "Home/Video & Audio/Intercom Control" screen (for Stentofon Alphacom) or "Home/Video &
Audio/Intercom" screen (for Zenitel Pulse) to display intercom buttons for only those intercoms in a
selected group, rather than all intercoms.
 The "Reports/History/Activity" and "Reports/Configuration/Predefined Reports/Predefined Activity"
screens to report alarms/events from only those intercoms in a selected group.

168
Symmetry Software Reference Manual

For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Using the Selection screen
The Selection screen is displayed when you select Intercom from "Setup/Device Groups". You can use the
Selection screen to create a new intercom group or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

Definition Screen Options


Description
This is the unique name for the group of intercoms.
Filter
The Filter field affects the intercoms listed in the Available Intercom Stations and Assigned Intercom
Stations boxes.
You can use the field to list only those intercoms whose name includes the text you enter. For example, the
intercom named "ABC123" is listed if you enter "C1", or "AB", etc. Enter the text and click to action the filter.
Leave the Filter field empty if you do not want to use a filter.
You may want to use Filter if, for example, the number of intercoms exceeds the maximum number that can be
listed, as set using Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences"
screen (default 500).
Available Intercom Stations
This lists all intercoms belonging to the currently selected company that are not in the group. To add intercoms
to the group, highlight the intercoms and click the > button.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message at a bottom of the list indicates when
this limit has been reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter field.
Assigned Intercom Stations
This lists all intercoms currently in the group. To remove intercoms from the group, highlight the intercoms and
click the < button.
Copy/Delete/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

Shared Reader Group Screen ("Setup/Device


Groups/Shared/Shared Readers")

General
Overview of this screen
A shared reader group is a group of one or more readers that a company is allowed to use, but does not own.
Shared reader groups are used in the same way as reader groups to define access rights (such as in the
"Home/Identity/Card Holders" screen).
You can access only those shared reader groups that belong to the currently selected company.

169
Shared Reader Group Screen ("Setup/Device Groups/Shared/Shared Readers")

When creating a shared reader group, it can include only those readers that belong to the currently-selected
company.

Note: The Permissions button in the "Install/Access Control/Reader" screen may have been used to prevent
you from accessing a reader. Similarly, the Permissions button may have been used when defining a shared
reader group to prevent you from accessing it.

Using the Selection screen


The Selection screen is displayed when you select Shared Readers from "Setup/Device Groups". You can use
the Selection screen to create a new shared reader group or to find an existing one to edit. Click here for an
overview of Selection screens and how to use them.

Definition Screen Options


Company Name
This pull-down list specifies the company that is to use the shared reader group.
Shared Reader Group Name
This is the unique name of the shared reader group. The name cannot be the same as another shared reader
group that belongs to the currently-selected company, or the same as the name of a reader group that belongs
to the company selected in Company Name.
Filter
The Filter field affects the readers listed in the Available Readers and Assigned Readers boxes.
You can use the field to list only those readers whose name includes the text you enter. For example, the
reader named "ABC123" is listed if you enter "C1", or "AB", etc. Enter the text and click to action the filter.
Leave the Filter field empty if you do not want to use a filter.
You may want to use Filter if, for example, the number of readers exceeds the maximum number that can be
listed, as set using Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences"
screen (default 500).
Available Readers
This box lists all of the readers that are owned by the currently selected company. The same reader can be in
more than one shared reader group.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message at a bottom of the list indicates when
this limit has been reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter field.
Assigned Readers
This box lists the readers that are in the shared reader group.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

170
Symmetry Software Reference Manual

Shared Floor Group Screen ("Setup/Device Groups/Shared/Shared


Floors")

General
Overview of this screen
When setting up access rights (such as in the "Home/Identity/Card Holders" screen), there may be a
requirement to include access to floors belonging to another company. In this case, the company that owns the
floors must create a shared floor group. The shared floor group specifies the floors that the owning company is
allowing another specified company to access. Once the shared floor group has been set up, it can be included
in the access rights of anyone belonging to the nominated company.
Click here for an introduction to floor groups.
You can use this screen to access only those shared floor groups that belong to the currently selected
company.
When creating a shared floor group, it can include only those floors that belong to the currently-selected
company.

Note: The Permissions button may have been used when defining a shared floor group to prevent you from
accessing it.

Using the Selection screen


The Selection screen is displayed when you select Shared Floors from "Setup/Device Groups/Shared". You
can use the Selection screen to create a new shared floor group or to find an existing one to edit. Click here for
an overview of Selection screens and how to use them.

Definition Screen Options


Company Name
This pull-down list specifies a company that is to use the shared floor group.
Shared Floor Group Name
This is the unique name of the shared floor group. The name cannot be the same as another shared floor group
that belongs to the currently-selected company, or the same as the name of a floor group that belongs to the
company selected in Company Name.
Associated Reader(s)
Select the reader that is associated with the elevator.

Note: M2100 elevator nodes can be used to control more than one cab, and there is one elevator reader per
cab. If the reader you choose is connected to an M2100 elevator node, the reader is for cab 1. Additional
reader menus are displayed for cabs 2, 3 and 4 (if applicable).

All elevator readers belonging to the currently selected company are included in the pull-down list.
Available Floors
This box lists all of the floors that are not yet in the shared group.
Initially, the box lists all floors that are attached to the same node as the Associated Reader and belong to the
currently selected company.
The same floor can be in more than one shared group.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.

171
Badge Designer Screen ("Setup/Identity/Badge Designer")

Assigned Floors
This box lists the floors that are in the shared group.
>>/<</Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Badge Designer Screen ("Setup/Identity/Badge Designer")

General
Purpose of Badge Designs
A badge design specifies the type of information to include on a badge and where to position this information.
For example, it could specify where to position the card holder's name, expiry date, company logo and card
holder's picture on badges that may be used for identity or access control purposes. If required, you can create
badge designs for badges that have graphics and/or text on both sides.
A badge design can specify the location of a magstripe or chip. You can encode a badge using a suitable
magstripe encoder or a combined printer and magstripe encoder.
A badge design can also specify default normal access rights. These are automatically assigned to anyone who
is given the badge design in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Badge designs are either for use in the "Home/Identity/Visitors" screen or in the "Home/Identity/Card Holders"
screen, depending on the setting of the Visitor Badge option.
The badge designs you set up in this screen can be used only for the selected company.
Using a Badge Design
The Badge option in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen allows you to specify
the particular badge design to use for the person, then to print the badge on the badge printer. If you are using
magstripe cards and your printer also has a built-in encoder, you can also encode the card number and other
data onto the badge. Alternatively, you can encode the badge separately. You can encode a smart card using
the Encode button in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
You can print (and optionally encode) a series of badges in one operation by using the "Home/Identity/Print
Badges" screen.
When you print the badge, database information such as the person's name and card number, is automatically
inserted into the appropriate locations on the badge as specified by the badge design.
Tools Options
The Tools options of the Badge Designer allow you to draw or place down objects, such as rectangles, text and
pictures, on the badge.
The Card Data tool is the tool you use to define the position of text that varies for each person, such as the
person's name. This variable information is inserted automatically when you print the badge.
Double-Sided Badge Designs
You can toggle between designing the top and bottom sides of the badge by selecting View/Change Side.

Note: Your printer must support double-sided printing if you want to use double-sided badge designs.

When reviewing a badge design in the "Home/Identity/Card Holders", "Home/Identity/Visitors" or


"Home/Identity/Print Badges" screen, only the top side is displayed.
Specifying the Position of a Magstripe or Chip
You can place down a magstripe or chip on the badge using the options in Tools/Card Format. By convention,
if you are using badges that have a magstripe, you should place the magstripe on the bottom side. If you are
using smart cards, it is normal to place the chip on the front side.

172
Symmetry Software Reference Manual

Note: The correct paper size must be set up in the printer settings to ensure that the printer does not apply the
clear overlay over the chip or magstripe. This should have been set up during software installation, but can be
changed by using the Print/Print Setup option (for a temporary change) or from the printer settings in the
Windows Control Panel (for a permanent change). For further details, please refer to the help for the Print
Setup screen.

Moving an Object or Modifying its Shape


To move an object or modify its shape:
1. Select the object by clicking the mouse button when the mouse pointer is on the object. Black dots appear
around the object, which are known as handles.
2. To move the object, select and hold down the left mouse button anywhere on the object except on its
handles.
To modify the shape of the object, select and hold down the left mouse button on one of its handles.
3. Drag and release the mouse at the required position.
Selecting Multiple Objects
You may want to select multiple objects to move them as a group or to align them. You can select more than
one object by pressing the Ctrl button on the keyboard between mouse clicks.

Selection Screen
Using the Selection screen
You can use the Selection screen to create a new badge design or to find an existing badge design to edit.
Click here for an overview of Selection screens and how to use them.

Definition Screen Options


Copy/Delete/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Access
Selecting this button saves the badge design, then displays the Default Badge Access Rights screen, which
enables you to associate default normal access rights with the badge design.
When a card holder or visitor is assigned the badge design, the access rights defined in the badge design are
automatically assigned to the person's normal access rights.
Import
Imports a badge design previously exported using the Export button. The imported badge design overwrites
the currently displayed design.
Export
Enables you to export the badge design to a file.
You may want to use this option to transfer badge designs to other installations of the Symmetry software. You
can use the Import button to import a previously exported design.
Badge Name
Enter the name you wish to give this badge. This is the name that will appear in the Selection screen.
Company
If you have created a new badge design, you can use this menu to choose the company that the design
belongs to.
If you have opened an existing badge design, the Company pull-down menu is ungrayed when you select
Copy. You can use the menu to choose a different company to own the copied badge design.

173
Badge Designer Screen ("Setup/Identity/Badge Designer")

When you copy a badge design to a different company, all personal data associations are mapped according
their order. For example, consider a system that has two companies, where the first field in the
"Setup/Identity/Personal Data/Card Holder Titles" screen is Car Reg for Company1 and First Name for
Company2. If you copy a badge design from Company1 to Company2, any Car Reg fields in the badge will
hold First Name data for Company2.
Badge Expiration
Choose the expiry period. When the badge design is allocated to a card holder or visitor (using the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen), the card will remain valid for the specified
period of time from the card's Active date.
Once expired, a card cannot be used to gain access, irrespective of access rights.
Use the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen to view the date on which a card
expires.
Default Badge
Select this option if you want the badge design to be used as the default badge design.
A different default can be set up for visitors ("Home/Identity/Visitors" screen) and card holders
("Home/Identity/Card Holders" screen). If both Default Badge and Visitor Badge are selected, the badge
design is used as the default for all new visitors. If you select Default Badge and Visitor Badge is not
selected, the badge design is used as the default for all new card holders.
There can be only one default badge design for visitors and one for card holders. Selecting Default Badge
causes the setting to be automatically removed from any other badge design of the same type.
Visitor Badge
If you select this option, the badge design will be for use only in the "Home/Identity/Visitors" screen. If the
option is not selected, the badge design will be for use only in the "Home/Identity/Card Holders" screen.
This option is grayed out if the badge design has already been used in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
Default Printer
Specify the default printer to be used for the badge design. This allows different badge designs to be easily
printed on different printers. All printers set up in Windows for your PC are displayed in the menu.
You can override the default when printing a badge.

Ribbon Bar Options


Clipboard
Cut
Removes the selected object from the drawing and copies it into the paste buffer. You can then use Paste
to paste the object into the drawing.
Copy
Copies the selected object into the paste buffer. You can then use Paste to paste a copy of the object into
the drawing.
Paste
Inserts the contents of the paste buffer into the drawing.
Print
Print
Select this option to print the badge design.
Print Setup
Select this to set up a badge printer. For further details, please refer to the help for the Print Setup screen.

174
Symmetry Software Reference Manual

Tools
Select
This option allows you to select an option (you should not normally need to use this option).
Card Data
Add Field
Use this option to specify the position of textual information that will be inserted automatically when
the badge is printed.
1. Select Tools/Card Data/Add Field.
2. You must first create a rectangular frame to enclose the text. At one of the required corner
points of the frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button.
5. <Undefined> is displayed in the frame. To choose the type of data to include, use the Visitor
Details, Card Details or Personal Details option, which are accessible from the Tools/Card
Data menu or from the frame's right-click menu.
Card Details
Use the Card Details option to specify the type of card information to include in a selected database
field object. The information is added on a per-person basis when you print the badge. The
information is obtained from the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Personal Data/Details
Use this option to specify the type of card-holder personal information to include in a selected
database field object. The information is added on a per-card holder basis when you print the badge
from the "Home/Identity/Card Holders" or "Home/Identity/Print Badges" screen. The personal data
titles shown are defined in the "Setup/Identity/Personal Data/Card Holder Titles" screen.
The option is grayed out if no titles have been specified, or if Visitor Badge is selected.
Visitors (Visitor Details)
Use this option to specify the type of visitor information to include in a selected database field object.
The information is added on a per-visitor basis when you print the badge from the
"Home/Identity/Visitors" or "Home/Identity/Print Badges" screen.
The option is grayed out if Visitor Badge is not selected.
You can select any visitor personal data title defined in the "Setup/Identity/Personal Data/Visitor
Titles" screen, or any of the following from the "Home/Identity/Visitors" screen (not available at
Central Card Handler clients.):
 Representing - The organization the visitor is representing.
 Vehicle - The visitor's vehicle license number.
 Arriving - The visitor's expected arrival date.
 Departing - The visitor's expected departure date.
 Visiting - The name of the card holder the visitor is visiting.
 Contact Number - The contact number of the card holder the visitor is visiting.
Text
Use this option to enter text that does not alter for each person. For example, the text "Name:", which may
precede variable text that you have placed down using the Database Field tool.
1. Select Tools/Text/Add Text.

175
Badge Designer Screen ("Setup/Identity/Badge Designer")

2. You must first create a rectangular frame for the text. At one of the required corner points of the
frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button.
5. To type the text, use the Text option, which is accessible from the Tools/Text menu or from the
frame's right-click menu
Image
Use this option to include a bitmap or JPEG picture on the badge, such as a company logo. The picture
does not alter for each person.
1. Select Tools/Image/Add Image.
2. You must first create a rectangular frame for the picture. At one of the required corner points of the
frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button.
5. To choose the image to include, use the Import File option, which is accessible from the
Tools/Image menu or from the frame's right-click menu. The Tools/Image/Transparent option
allows you to make a selected color of the image transparent, so that objects behind the image
show through.
Face
Use this option to specify the position and shape of the person's picture. The picture is inserted
automatically when you print the badge.
1. Select Tools/Face.
2. You must first create a rectangular frame for the picture. At one of the required corner points of the
frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button. A cross appears in the frame.
The aspect ratio of the frame is fixed; adjusting the width or height causes both dimensions to be changed.
Signature
Use this option to specify the position and shape of the person's signature. The signature is inserted
automatically when you print the badge.
1. Select Tools/Signature.
2. You must first create a rectangular frame for the signature. At one of the required corner points of
the frame, click and hold down the left-hand mouse button.
3. Drag the mouse until the frame is the required shape.
4. Release the mouse button. A cross appears in the frame.
5. The Tools/Image/Transparent option allows you to make the background transparent, so that any
colored objects behind the signature show through.
Line
Select this to draw a straight line.
1. Select Tools/Line.
2. At the required start point, click and hold down the left-hand mouse button.

176
Symmetry Software Reference Manual

3. Drag the mouse to the end point.


4. Release the mouse button.
Ellipse
Select this to draw an ellipse.
1. Select Tools/Ellipse.
2. At the required start point, click and hold down the left-hand mouse button.
3. Drag the mouse until the ellipse is the required shape.
4. Release the mouse button.
Rectangle
Select this to draw a rectangle.
1. Select Tools/Rectangle.
2. At one of the required corner points, click and hold down the left-hand mouse button.
3. Drag the mouse until the rectangle is the required shape.
4. Release the mouse button.
Card Format
Use the Card Layout option to specify properties of the badge, such as its size and the grid to use. See
Card Layout Screen.
The remaining options enable you to specify the position of a magstripe or chip on the current side of the
badge. Choose Plain Side if there is no magstripe or chip.

Note: You can perform the same action by clicking the right-hand mouse button in white space.

By convention, if you are using badges that have a magstripe, you should place the magstripe on the rear
side. If you are using smart cards, it is normal to place the chip on the front side.

Note: The correct paper size must be set up in the printer settings to ensure that the printer does not
apply the clear overlay over the chip or magstripe. This should have been set up during software
installation, but can be changed by using the Print/Print Setup option (for a temporary change) or from
the printer settings in the Windows Control Panel (for a permanent change). For further details, please
refer to the help for the Print Setup screen.

Format
Alignment
You can use the options to align the selected items.
Border
Use this option to change the thickness or color of the border of a selected object.
Fill
Select Transparent to make the object transparent (except its border). Select Fill Color to change the
selected object's fill color.
Order
Each time you add a new drawing object, it is placed above the last object added. You can rearrange the
order of the objects by using the following options:
 Bring to Front - This brings the selected object to the top, on top of all other objects.
 Bring Forward - This brings the selected object up one position.

177
Badge Designer Screen ("Setup/Identity/Badge Designer")

 Send to Back - This sends the selected down to the bottom, below all other objects.
 Send Backward - This sends the selected object down one position.
Rotatation
Use this option to rotate an item. Choose the appropriate angle of rotation, or choose the currently-
selected angle to return the item to its normal orientation. The rotation angle is always clockwise from the
normal orientation.
You cannot rotate lines, rectangles or ellipses.
Font
Font
Use this option to specify the font to use for the text inside the selected frame.
Alignment
Use this option to specify where to position the text in the selected box.
Choose Left, Center or Right to determine the position of the text in the horizontal direction.
Choose Top, Middle or Bottom to determine the position of the text in the vertical direction.
Choosing Word Wrap causes the text to wrap around onto the next line (at the next word break) if the box
is too narrow. If Word Wrap is not selected, all the text will not be visible if it is too long to fit on a single
line. Word Wrap is not available if the text has been rotated.
Size To Fit
If you choose Size to Fit, the font size is adjusted automatically to allow the text to fit neatly inside the
frame. In the case of database field text, the font size is adjusted at the time of badge printing to allow for
the actual text inserted.
View
Zoom
Select this option to zoom in or zoom out of the badge design you are designing.
Change Side
For double-sided badge designs, you can toggle between designing the front or back of the badge by
selecting View/Change Side.
For further details, please refer to Double Sided Badge Designs near the top of this help topic.
Item
Labels
Select this option if you want to display the names of objects, such as rectangles, database fields,
etc.
Frames
Some objects, such as text, can have a border, and this can be set to zero. If Frames is selected,
the border of any object set to zero is highlighted by a thin gray line, although it will not be printed.
This allows you to determine the limits of each object.
Grid
Grid
Select this option to switch on or off the displaying of the grid lines.
Snap to Grid
Select this option if you want the ends or corners of the objects you draw or move to snap to the grid
points. The grid is set up using the Tools/Card Format/Card Layout option.

178
Symmetry Software Reference Manual

Right-Click Options
Note: The right-click options operate on only one object. To keep the interface easy to understand, do not select
multiple objects before right-clicking. If you right-click in an area that contains overlapping objects, a menu prompts
you to choose the item to operate on.

Most of the options in the right-click menus are available from the ribbon bar. The following options are not available
from the ribbon bar:
Rename
Enables you to rename the object.
Delete
Deletes the selected object.
Rule
Selecting this option displays a screen that enables you to set up a rule for hiding or showing the object based
on the values assigned to one or more personal data titles.
Any object that has a rule, is marked with a red dot in its bottom-right corner.

Muster Definition Screen ("Home/Identity/Muster")

Introduction
Purpose of this screen
This screen enables you to define, run, monitor and reset musters. You can define a new muster using the New
button or open an existing muster by selecting it in the Selection screen and clicking Open.
About Musters
Musters are used to determine the total number of card holders and visitors in defined areas of your site, and to
find out the names and details of the people in those areas. Musters may be of use during a fire or other
emergencies to assist the emergency services, or simply to determine the people located in specific areas.
You can set up multiple musters for different areas of your site. An area can overlap other areas, be entirely
contained within another or be completely separate.
When you start a muster, it generates a Card Holders in Area muster report, which lists the names of all card
holders who are in the area. You can set the muster report to repeat automatically at specified intervals until
there is no-one left in the area. The Selection screen lists the status of each muster and the number of card
holders who are in the muster's area.
When defining a muster, you specify an Area Reader Group. This determines the area covered by the muster.
Any card holder or visitor who last used a reader in the Area Reader Group and was granted access is
regarded as being in that area. As soon as a person uses a reader that is not in the reader group, he or she is
removed from the area.

Note: Musters can report accurate information only if there is proper controlled entry to areas, such as using
turnstyles and antipassback rules.

Starting a Muster
You can start a muster manually using the Start button. Alternatively, you can set up a muster to start
automatically when a monitor point is triggered. You can start one or more musters at the same time.

179
Muster Definition Screen ("Home/Identity/Muster")

About the Muster Report


The Card Holders in Area muster report is generated a specified period of time after starting a muster and,
optionally, at regular intervals thereafter until the number of card holders in the area is zero. When setting up a
muster, you can specify:
 The delay to the first report (such as 5 minutes). You should set this time to give the majority of
people enough time to leave the area within a safe period of time.
 The interval between subsequent reports. Reports stop being generated automatically when there is
no-one to include on the report and restart if someone re-enters the area.
 The first report to be produced only when there are fewer than a specified number of people in the
area.
 Whether to send the report to nominated printers or to the screen.
 The name of the Symmetry client that is to run the report.
The report lists the name of each person in the area, the card number, last reader used and the date and time
of the transaction. You can choose to add an additional column to the report, which lists personal data, such as
each person's gender.
If necessary, the report can be subdivided according to a personal data title, such as department name.

Note: If you wish to send muster reports to a printer, the Symmetry services must run in a named account that
has access to the printer.

People Included in an Area


A person is included in an area if the last reader at which they were granted access is in the AreaReader
Group, as specified in the muster. As soon as a person uses any reader that is not in the AreaReader Group,
they are removed from the area.
Cards can move between areas, including after musters have started. This means that the total number of
people in an area may increase as the total number in another area decreases. In addition, since areas can
overlap, it is possible for the same card to be in more than one area.
Note:
 A transaction by a card with a status of inactive, expired or not yet valid is not added to the area.
 If Multiple Cards is selected in the "Maintenance/User & Preferences/System Preferences" screen,
the "Home/Identity/Card Holders" screen can be used to assign more than one card to a card
holder. In this case, each card is listed in the area if any of the cards has been used at a reader in
the AreaReader Group. As soon as the card holder uses any of his/her cards at a reader that is
not in the area reader group, all cards are removed from the area.
 The system ignores a transaction at a reader if it generates a Door Not Opened alarm/event.
Muster Readers
You may be using readers specifically for mustering at muster points. If a person performs a valid transaction at
a muster reader, he or she is removed from the area in which they were previously recorded.
You can choose the muster readers using the Muster Reader/Group menu when defining the muster. The
muster readers are automatically enabled at the start of a muster and are set to card-only mode.
Everyone who needs to use a muster reader must be given access rights to it in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.

Note: For the purposes of the mustering, there is no difference between performing a transaction at muster
reader and at any reader outside the Area Reader Group. However, since muster readers are not normally
included in an Area Reader Group, performing a transaction at a muster reader will not normally cause the
card holder to be added to a different area.

180
Symmetry Software Reference Manual

Monitoring Progress
You can monitor the progress of each muster by using the Selection screen. This screen gives an immediate
view of the number of people left in each area.
Resetting the Muster
When a muster is over, it must be reset. There are several ways to reset a muster:
 It can be reset automatically when the number of people in the area reaches zero.
 It can be reset automatically when a specified monitor point is active. Depending on the reset rule
selected, the number of people in the area may need to be zero.
 You can reset the muster manually using the Reset button in the Selection screen. If there are still
people in the area and the Allow selected Cards from Muster Area during Muster Reset
checkbox is selected (see below), a dialog is displayed that lists the people who are still in the
area. The dialog allows you to select people to remove from the muster before you reset it. If you
re-run the muster immediately, any person you have chosen to remove will not be included in the
new muster report (unless they have re-entered the area using a card transaction). If the checkbox
is not selected, the Reset button resets the muster and no one is removed from the muster.
The Reset Options in the muster definition allow you to choose the location of cards after the reset, and
whether to set cards to neutral for antipassback.
Multi-Company Installations
Muster reports are company based. If your company group contains more than one company, you need to
select the company before setting up or running a muster report.

Selection Screen
About the Selection Screen
The Selection screen is displayed when you select Muster from "Home/Identity". You can use the Selection
screen to create a new muster or to find an existing one to edit. Click here for an overview of Selection screens
and how to use them.

Note: You cannot make changes to an existing muster report that is running or requires a reset.

Screen Options and Buttons


The following options are specific to this Selection screen:
Group By
Selecting an option other than <None> displays a tree view of the musters, with each branch being a
different status or client name. Selecting <None> displays a normal flat list of the musters.
Start
Clicking this button starts the selected musters.
Reset
Clicking this button resets the selected musters. See "Resetting the Muster" (above) for further information.
Report
Clicking this button produces a muster report for the selected musters.
Screen Columns
The screen contains the following columns:
Description
This is the name of the muster, and should reflect the area the muster reports.

181
Muster Definition Screen ("Home/Identity/Muster")

Run at Client
This is the name of the Symmetry client that is to monitor the muster and produce the muster report.
Last Run Time
This shows the date and time of when the muster was last started.
Status
The status can be:
Never Run - The muster has not been previously started.
Monitoring - The muster has been started and is not yet finished.
Completed - The muster was started and was reset.
Awaiting Reset - The muster was started and the number of people in the area is zero. The muster is
awaiting a reset. If a card holder or visitor re-enters the area, the status returns to Monitoring and a report
is generated.
Initial Card Count
This shows the number of cards in the area when the muster was started.
Cards in Area
This shows the current number of cards in the muster's area. This may be greater than Initial Card Count
if new cards have entered the area.

Definition Screen
Description
Enter an appropriate name that reflects the area that is to be reported by the muster report. For example,
"Building 1".
Area Reader Group
The selected reader group determines the people who will be listed in the muster report.
A person is included in the report if the last reader the person used is in the Area Reader Group. As soon as a
person uses any reader that is not in the selected reader group, that person is removed from the next report.
For further information, please refer to "People Included in an Area" (above).
Muster Reader/Group
Use this menu if you have readers installed at muster points specifically for the purposes of mustering.
The menu lists all reader groups that belong to the currently-selected company, with the exception of the reader
group selected in Area Reader Group. The menu also lists all readers that belong to the company if Include
Readers is selected.
Selecting a reader or reader group from the menu nominates the reader or all of the readers in the group to be
muster readers.
Please refer to "Muster Readers" (above) for further information.
If you are not using muster readers, use the default <None> option.
Include Readers
Selecting this option causes the Muster Reader/Group menu to include readers as well as reader groups.
Auto Start when Alarm Received from Input
This option is available only if you have selected a named Symmetry client computer in Run at Client.
You can use the option to select a monitor point, which if triggered, causes the muster to start automatically at
the selected client. The monitor point may, for example, be triggered by a fire alarm.
You can choose any monitor point, irrespective of the company it belongs to.

182
Symmetry Software Reference Manual

If you select this option, it remains possible to start a muster report manually from the "Home/Identity/Muster"
screen at the nominated client or at a different client.
Report Options
Group by Personal Data
Selecting a personal data title causes the muster report to be subdivided according to the title chosen. For
example, if you select a personal data title of Department, the report will be presented by department, with
head-count totals for each department.
Visitors are grouped together near the top of the report, irrespective of the Group by Personal Data
setting.
New Page per Item
Selecting this option causes each personal data title to start on a new page. For example, if Group by
Personal Data is Department, each department in the report will start on a new page.
Sort Report by
If you select Card Holder Name, people included in the muster report are listed in name order.
If you select Card Holder Number, people are listed in order of ascending card number.
Include
You can use this menu to select a personal data title to include as an additional column in the muster
report. For example, if you choose a personal data title named "Gender", the report will contain a column
titled "Gender". In this case, the report will display the gender of each card holder, as specified in the
"Home/Identity/Card Holders" screen.
This menu contains a list of all personal data titles defined for the currently-selected company. These are
set up in the "Setup/Identity/Personal Data/Card Holder Titles" and "Setup/Identity/Personal Data/Visitor
Titles" screens.
Exclude Card Holders in the area longer than
You can use this option to exclude card holders who have been in the area defined by Area Reader
Group longer than a specified number of hours. This is to allow for card holders who have left the area
without presenting a card to a reader outside of the area.
Note: If an area is contained within another, the muster definitions for both areas should use the same
Hours value. This is to avoid a potential discrepancy between the number of card holders reported in each
area.
Output Options
Run at Client
Use this option to choose the Symmetry client that is to monitor the muster and produce the muster report.
If you select <Initiating Client>, the software runs at the Symmetry client where it is started.
Primary Destination
Specify whether to send muster reports to the screen or printer. Do not print to any destination other than
screen or printer, as there may be undesirable consequences.
The printers listed in the menu are those that have been installed at the client you are using. If you have
opened an existing muster definition and the client you are using does not have the selected printer
installed, the printer name includes the suffix "(Not Installed on this Client)".
If the selected printer does not exist on the specified client, the client attempts to use the default printer.
If a muster is configured to appear on the screen and the user logged into the Symmetry software has no
privileges to view the muster (such as using the Permissions button), the report is not displayed.
The report is displayed or printed by the client specified by Run at Client.

183
Muster Definition Screen ("Home/Identity/Muster")

Secondary Destination
If you choose a printer in Secondary Destination, the muster report will be sent to this printer as well as
to the screen/printer selected in Primary Destination.
Please refer to Primary Destination above for further information.
First Report after
Use this menu to specify a delay between the muster being started (either automatically or manually) and
the first report being printed or displayed.
The Repeat Every menu allows you to specify the time interval between each report. If, for example, you
choose 1 Minute, a report is generated approximately every minute.
The report stops being repeated when there are no more cards to include on the report.
Repeat Every
This specifies the time interval between each muster report sent to the printer or screen. If, for example,
you specify 5 minutes, a report is generated approximately every 5 minutes after the first report.
The report stops being repeated when there are no more cards to include on the report and re-starts if
someone re-enters the area.
Report when less than
Entering a value causes the Card Holders in Area muster report to be generated automatically only when
the number of card holders is less than the specified value.
This option provides a way of preventing a long report from being produced, which may be of little value. In
addition, a long report may take some time to print on slow printers.
The setting does not prevent you from generating a report manually using the Report button in the
"Home/Identity/Muster" screen.
Reset Options
Auto Reset When Complete
Selecting this option causes the muster to reset automatically when the number of cards in the area
defined by Area Reader Group is zero.
A muster shows a status of "Completed" in the Muster Selection screen once it is reset.
Auto Reset Input
Selecting a monitor point from the menu causes the muster to reset automatically when the monitor point
is active. The Auto Set Rule determines when the muster can be reset and the effects of the reset.
This option is available only if Auto Reset when Complete is not selected.
Auto Reset Rule
This is available if you have selected a monitor point in Auto Reset Input. The option determines when a
muster can be reset using a monitor point and the effect of the reset. The options are:
 Only perform reset if no cards in the area - When the monitor point becomes active, the
muster resets only if there are no cards in the area.
 Allow reset if area occupied but leave remaining cards in the area - When the monitor
point becomes active, the muster resets regardless of whether or not there are still cards in
the area. If there are cards in the area, they remain in the area, so that if you restart the
same muster, you will see those cards in the new muster report.
 Allow reset if area occupied and remove all remaining cards from the area - When the
monitor point becomes active, the muster resets regardless of whether or not there are still
cards in the area. If there are cards in the area, they are removed from the area, so that if
you restart the same muster, you will not see those cards in the new muster report. This
option may be useful if, for example, the operator who triggers the monitor point is sure that
all remaining cards belong to visitors who are not on site.

184
Symmetry Software Reference Manual

Auto Reset Card Holder Location to


This option affects only those cards that were last used at a muster reader.
If you select a non-muster reader, the system performs an automatic transaction at that reader for each
card whose last transaction was at a muster reader. This means that people who used a muster reader do
not have to perform a manual transaction at an in-area reader to be included in the next muster report.
You can choose any reader that belongs to the currently-selected company and is in only one area.
This option is available only if a muster reader or group is selected in Muster Reader/Group.
Reset Passback Location to Neutral
This option is relevant if you are using zonal antipassback. The option determines the cards that are
placed in the neutral antipassback zone when the muster is reset.
Placing cards in the neutral antipassback zone prevents them from being blocked by antipassback rules
the next time they are used to gain access.
The following options are available:
Never
No cards are placed in the neutral antipassback zone.
All Cards Remaining in Area Only
All cards that remain in the area defined by Area Reader Group are placed in the neutral zone.
All Cards using <Muster Reader Group / Reader>
All cards that last used the muster reader or reader group are be placed in the neutral zone. This
option refers to the reader or reader group selected in Muster Reader/Group.
All Cards Remaining in Area and All Cards using <Muster Reader Group / Reader>
This performs the actions of the previous two options.
Complete System
All cards are placed in the neutral zone.
Allow removal of selected Cards from Muster Area during Manual Reset
This checkbox affects the behavior of a manual muster reset using the Reset button in the Selection
screen.
If the checkbox is selected, and there are still people in the area when you click Reset, a dialog is
displayed that lists the people and their card numbers. The dialog allows you to select people to remove
from the muster before you reset it. If you re-run the muster immediately, any person you have chosen to
remove will not be included in the new muster report (unless they have re-entered the area using a card
transaction).
If Allow selected Cards from Muster Area during Manual Reset is not selected, the Reset button resets
the muster and no one is removed from the muster. You are prompted whether to continue with the reset.
Buttons
Copy/Delete/Permissions/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

185
Area Occupancy Screen("Setup/Identity/Area Occupancy")

Area Occupancy Screen("Setup/Identity/Area Occupancy")

General
Overview of this screen
This screen enables you to set up commands that are executed automatically when an area has too few or too
many people. A typical application is an access-controlled parking lot, where a "Full" sign (controlled by an
auxiliary output) can be switched on when the car park is full.
Commands can also be executed automatically when the area occupancy returns to acceptable levels. For
example, a car park "Full" sign could be switched off when the car park is no longer full.
The controlled area must have separate entry and exit readers. The area occupancy increases by one for each
successful transaction at an entry reader and decreases by one for each successful transaction at an exit
reader.
To affect the occupancy count, a card holder or visitor must have the Area Occupancy Card option set in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
The system executes the commands from the server, not directly from the nodes. This means that the
Symmetry services at the server must be running (this should be the case if Symmetry has been installed
correctly).
A card's access rights determine which entry and exit readers, if any, the person is able to use.

Screen Options
For This Company
Choose the company that owns the area's entry and exit readers. This determines the reader groups displayed
in the Entry Reader Group and Exit Reader Group pull-down menus.
Entry Reader Group
Choose the reader group that contains all the readers used to gain entry to the controlled area. A reader cannot
be in both an entry and exit reader group.
Exit Reader Group
Choose the reader group that contains all the readers used to gain exit from the controlled area. A reader
cannot be in both an entry and exit reader group.
Minimum
If applicable, enter the minimum number of card owners who must be in the area at any one time.
Maximum
If applicable, enter the maximum number of card owners who are allowed to be in the area at any one time.
Set Count To
You can set the recorded count to the value you enter in this field. You may want to do this when first setting up
the system or if the recorded count is not the same as the actual count (for example, because card holders
have been tailgating).
The new count is set to the value you have specified when you select OK.
IF Minimum Commands
If required, you can define up to two commands to be generated automatically when the area occupancy falls to
the specified minimum value, then two more for when the count increases above the minimum value.
Type - Choose the type of device to send the command to.
Location - Select the specific device or group of devices to send the command to. If you require any further
details about the meaning of this option, refer to the description of the appropriate command.

186
Symmetry Software Reference Manual

=Min - Select the command to execute when the occupancy count falls to the value specified in the Minimum
field.
> Min - Select the command to execute when the occupancy count becomes greater than the value specified in
the Minimum value. The command is executed only if the occupancy count has risen from the Minimum value.
Click here for details of each command.
IF Maximum Commands
If required, you can define up to two commands to be generated automatically when the area occupancy
increases above the specified maximum value, then two more for when the count decreases below the
maximum value.
Type - Choose the type of device to send the command to.
Location - Select the specific device or group of devices to send the command to. If you require any further
details about the meaning of this option, refer to the description of the appropriate command.
= Max - Select the command to execute when the occupancy count increases to the value specified in the
Maximum field.
< Max - Select the command to execute when the occupancy count becomes less than the value specified in
the Maximum value. The command is executed only if the occupancy count has fallen from the Maximum
value.
Click here for details of each command.
Options
Determines whether the 'Trigger Operation' message generated when the command is executed should be
reported as an alarm, event or not at all by the node that controls the Location device.
An event simply records the message in the log file. You can use the "Home/Monitoring/Activity" screen to view
the contents of the log file.
An alarm displays the message in the "Home/Monitoring/Alarms" and "Home/Video & Audio/Virtual Matrix"
screens and also adds the message to the log file.
Status
Select Enabled to allow the command to execute at the allotted times. Selecting Disabled causes the
command not to be actioned.
Clear
This clears the selections in the screen.
Count
This displays the system's currently recorded occupancy count for the area.

Approving Official Screen ("Setup/Identity/Approving Official")

General
Overview of this screen
The Approving Official screen enables you to specify the details of people who are able to authorize the issuing
of a badge to a card holder or visitor.
When setting up a person's details in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen, you
can select the name of the approving official. This then specifies the person who has authorized a badge to be
issued to that person.
If Approving Official is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences"
screen, it is mandatory for an approving official to be selected in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.

187
Card Blocks Screen("Setup/Identity/Card Blocks")

You can use the screen to capture the approving official's signature. Doing so enables you to display the
signature when you select the approving official's name in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
The approving officials you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Approving Official from "Setup/Identity". You can use the
Selection screen to create a new approving official or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.

Definition Screen Options


Job title, etc.
Specify the details of the approving official.
Additional 1/2
These allow you to specify additional information about the approving official.
Date Authority Begins/Ends
These determine the period within which the approving official is allowed to authorized the issuing of a badges.
If you select an approving official in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen, the
current date must be between or on these dates. You will not be able to save the person's details if the current
date is outside this range.
Signature:
Live
Import
Import Pad
Export
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Card Blocks Screen("Setup/Identity/Card Blocks")

General
Overview of this screen
This screen must be used if the cards being used (such as the G4Tec 37-bit HID Prox Card Format) do not
have an encoded customer code.
In these cases, you need to use the screen to define the ranges of cards being used. Often, the card numbers
on these cards are encoded at time of manufacture and cannot be reprogrammed.
For each block of cards purchased:
1. In First Card Encoded Data, enter the encoded card number of the first card in the block.
2. In Card Qty, enter the number of cards purchased.
3. Card Serial Numbers shows the card numbers that will be used for these cards in Symmetry (for example,
in the Card Holders screen).

Note: If default card blocks were set up automatically during software installation, you should remove any that
are not used. Otherwise, for readers that are in Customer Code Only mode, access may be granted to any card
that is within a card block, even though it may not have been allocated to a person (for example, in the
"Home/Identity/Card Holders" screen).

188
Symmetry Software Reference Manual

Note: Card blocks are a feature unique to multiNODE-2 or later nodes and therefore should only be used when
these types of nodes are installed.

Screen Options
Use Setblock Data
Selecting this option causes the card-block data to be extracted from a supplied encrypted file on the server.
Other card-block data that may have been set up in this screen is not used.
First Card Encoded Data
In this box, type the encoded number of the first card in the block supplied.
Card Qty
Type the number of cards in the block.
Card Serial Numbers
After you have entered the card quantity and clicked the mouse in another field, the Start and End boxes
display the first and last card numbers as used within the system.

Anti-Passback Screen ("Setup/Identity/Anti-Passback")


You can use this screen to disable or re-enable antipassback checking at all nodes on a selected chain.
Choose the chain from the Chain Name pull-down list, then click Enable or Disable, as appropriate.
Re-enabling antipassback after it has been disabled has the following effects:
 All nodes on the chain return to zonal or timed antipassback mode, depending on how the installer
has set up each node definition.
 Zonal antipassback nodes on the chain place their cards into the neutral zone.
 Timed antipassback nodes on the chain set the delay period for reuse for their cards to zero.
Click here for an introduction to antipassback.

Card/Visitor Personal Data Titles Screen ("Setup/Identity/Personal


Data/Card Holder (or Visitor) Titles")

General
"Setup/Identity/Personal Data/Card Holder Titles" - Use this screen to set up the titles that appear in the
Personal tab when setting up a card holder in the "Home/Identity/Card Holders" screen or "Home/Identity/Bulk Card
Amendments" screen.
"Setup/Identity/Personal Data/Visitor Titles" - Use this screen to set up the titles that appear in the Personal tab
when setting up visitors in the "Home/Identity/Visitors" or "Home/Identity/Bulk Card Amendments" screen.
You may, for example, want to have titles such as "Car Registration", "Height", "Hair Color", etc.
You can define the data items for each title using the "Setup/Identity/Personal Data/Card Holder Data" or
"Setup/Identity/Personal Data/Visitor Data" screen. For example, for the title "Hair Color", you may choose to create
a list consisting of black, brown, blonde, etc.
When you have finished making any changes, select OK to save the changes; otherwise, Cancel.
The titles apply to all card holders in the currently selected company.

Screen Options
Personal Data Titles
Enter a title for the personal data title (such as "Hair Color"). Up to 40 characters can be used.

189
Card/Visitor Personal Data Titles Screen ("Setup/Identity/Personal Data/Card Holder (or Visitor) Titles")

Mandatory
If you select Mandatory for a title, information for that title will have to be specified when adding or editing a
card holder/visitor.
Field Type
If you choose Edit List, the user will be able to type data for that field, and the typed data will be automatically
added to the list of predefined data items.
Choosing Expiry Date enables a date to be entered for the personal data title in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen. At the beginning of the specified day, the status of the card is
automatically set to "Inactive". This feature is useful if you want the card to be made inactive when, for
example, an insurance policy or qualification expires. You can specify the required date format in the Mask
field. Selecting Expiry Date causes Category to be automatically set to Date.
If you choose List Only, a user of the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen will be
restricted to selecting one of the predefined data items for that title. For example, for "Hair Color", "black",
"brown", "blonde", etc.
If you choose String, the field will be a normal data-entry field.
Category and Mask
These determine the required format of the information entered for this personal data title. Choose one of the
following:
 Custom - Use # to indicate an alphanumeric character, and 0 for a numeric character. For example,
if you specify #0000, the personal data specified for this title must consist of one alphanumeric
character, followed by four numeric characters (such as E1500). If you include any other character,
the personal data must include the character at the specified position. For example, if you specify
00.00, the personal data must include four numeric characters, with a period (decimal point) after
the first two (for example, 10.99).
 Date - A date value will be required, in the format specified by Mask, which must be all of the
following in any order separated by forward slashes:
dd
mm or mmm
yy or yyyy
For example, dd/mm/yy or mmm/dd/yyyy.

Note: If you use yy rather than yyyy, Symmetry assumes the current century within the range 00 to 35. If
you want to enter a year in a different century, you may need to use yyyy.

 Email - This category is displayed only when setting up card holder data titles (not available for
visitor data titles). Selecting this category specifies that the personal data title is an email address.
If a visitor is signed in using the "Home/Identity/Visitors" screen, a "Visitor arrived" email is sent to
each email address specified in the Personal Data tab of the card holder being visited.
Click here for further information.
 General - No required format. Mask is not used for this option.
 Time - A time value will be required, in the format specified by Mask, which can be hh:mm (24-hour
clock) or h:mm $ (12-hour clock). In the latter case, the $ indicates that either am or pm would be
accepted (in lowercase) when specifying the personal data; for example, 11:15 am.

190
Symmetry Software Reference Manual

Card/Visitor Personal Data Titles Screen ("Setup/Identity/Personal


Data/Card Holder (or Visitor) Titles")

General
"Setup/Identity/Personal Data/Card Holder Titles" - Use this screen to set up the titles that appear in the
Personal tab when setting up a card holder in the "Home/Identity/Card Holders" screen or "Home/Identity/Bulk Card
Amendments" screen.
"Setup/Identity/Personal Data/Visitor Titles" - Use this screen to set up the titles that appear in the Personal tab
when setting up visitors in the "Home/Identity/Visitors" or "Home/Identity/Bulk Card Amendments" screen.
You may, for example, want to have titles such as "Car Registration", "Height", "Hair Color", etc.
You can define the data items for each title using the "Setup/Identity/Personal Data/Card Holder Data" or
"Setup/Identity/Personal Data/Visitor Data" screen. For example, for the title "Hair Color", you may choose to create
a list consisting of black, brown, blonde, etc.
When you have finished making any changes, select OK to save the changes; otherwise, Cancel.
The titles apply to all card holders in the currently selected company.

Screen Options
Personal Data Titles
Enter a title for the personal data title (such as "Hair Color"). Up to 40 characters can be used.
Mandatory
If you select Mandatory for a title, information for that title will have to be specified when adding or editing a
card holder/visitor.
Field Type
If you choose Edit List, the user will be able to type data for that field, and the typed data will be automatically
added to the list of predefined data items.
Choosing Expiry Date enables a date to be entered for the personal data title in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen. At the beginning of the specified day, the status of the card is
automatically set to "Inactive". This feature is useful if you want the card to be made inactive when, for
example, an insurance policy or qualification expires. You can specify the required date format in the Mask
field. Selecting Expiry Date causes Category to be automatically set to Date.
If you choose List Only, a user of the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen will be
restricted to selecting one of the predefined data items for that title. For example, for "Hair Color", "black",
"brown", "blonde", etc.
If you choose String, the field will be a normal data-entry field.
Category and Mask
These determine the required format of the information entered for this personal data title. Choose one of the
following:
 Custom - Use # to indicate an alphanumeric character, and 0 for a numeric character. For example,
if you specify #0000, the personal data specified for this title must consist of one alphanumeric
character, followed by four numeric characters (such as E1500). If you include any other character,
the personal data must include the character at the specified position. For example, if you specify
00.00, the personal data must include four numeric characters, with a period (decimal point) after
the first two (for example, 10.99).
 Date - A date value will be required, in the format specified by Mask, which must be all of the
following in any order separated by forward slashes:
dd
mm or mmm

191
Card Personal Data Screen("Setup/Identity/Personal Data/Card Holder Data")

yy or yyyy
For example, dd/mm/yy or mmm/dd/yyyy.

Note: If you use yy rather than yyyy, Symmetry assumes the current century within the range 00 to 35. If
you want to enter a year in a different century, you may need to use yyyy.

 Email - This category is displayed only when setting up card holder data titles (not available for
visitor data titles). Selecting this category specifies that the personal data title is an email address.
If a visitor is signed in using the "Home/Identity/Visitors" screen, a "Visitor arrived" email is sent to
each email address specified in the Personal Data tab of the card holder being visited.
Click here for further information.
 General - No required format. Mask is not used for this option.
 Time - A time value will be required, in the format specified by Mask, which can be hh:mm (24-hour
clock) or h:mm $ (12-hour clock). In the latter case, the $ indicates that either am or pm would be
accepted (in lowercase) when specifying the personal data; for example, 11:15 am.

Card Personal Data Screen("Setup/Identity/Personal Data/Card


Holder Data")

General
Overview of this screen
You can use this screen to create a list of personal data items for those personal data titles that have a field
type of Edit List or List Only, as set up in the "Setup/Identity/Personal Data/Card Holder Titles" screen.
For example, for the title "Hair Color", you may choose to create a list consisting of black, brown, blonde, etc.
The lists are then available in the "Home/Identity/Card Holders" screen, which can make the process of setting
up new card holders and specifying personal data much easier.
Note that new personal data items can also be created by typing the information into any of the first ten
personal data fields of the "Home/Identity/Card Holders" screen, providing that the Field Type in the
"Setup/Identity/Personal Data/Card Holder Titles" screen is set to Edit List.
The personal data items you set up in this screen can be used only for the currently selected company.
Using the Selection screen
The Selection screen is displayed when you select Card Holder Data from the "Setup/Identity/Personal Data".
You can use the Selection screen to create a new card-holder personal data item or to find an existing one to
edit. Click here for an overview of Selection screens and how to use them.
The following options are specific to this Selection screen:
Card Personal Data Title
Use this pull-down list before selecting Find or New. It allows you to choose the personal data title for the
data item that you wish to find or create. These personal data titles are defined by using the
"Setup/Identity/Personal Data/Card Holder Titles" screen.

Note: The menu lists only personal data tiles that were defined with a field type of Edit List or List Only
in the "Setup/Identity/Personal Data/Card Holder Titles" screen.

Card Personal Data


This option determines the number of existing entries listed when you select Find. If the option is blank, all
entries are listed. If you want to narrow the search, type the data item in the box.
You can find a range of entries by using wildcards.

192
Symmetry Software Reference Manual

Definition Screen Options


Card Personal Data Title
This read-only box shows the personal data title that you selected from the pull-down list in the Selection
screen.
Current Card Personal Data
This read-only box shows the personal data item that you selected from the Selection screen. The field is blank
if you selected New.
New Card Personal Data
Use this box to enter the new personal data item. If an existing personal data item is displayed in Current Card
Personal Data, it is replaced by this text when you select OK.
Note that if you change a data item, it will affect all card holders who use that data item. For example, if the
data title is Eye Color and you change Green to Bright Green, the eye color for all card holders who have Green
eyes will be automatically changed to Bright Green.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Visitor Personal Data Screen ("Setup/Identity/Personal Data/Visitor


Data")

General
Overview of this screen
You can use this screen to create a list of personal data items for those personal data titles that have a field
type of Edit List or List Only, as set up in the "Setup/Identity/Personal Data/Visitor Titles" screen.
For example, for the title "Hair Color", you may choose to create a list consisting of black, brown, blonde, etc.
The lists are made available in the "Home/Identity/Visitors" screen when defining the personal details of a
visitor. Creating lists of personal data in this screen can make the process of specifying visitor details much
easier.
Note that new visitor personal data items can also be created automatically by typing the information into
personal data fields in the "Home/Identity/Visitors" screen, providing that the Field Type in the
"Setup/Identity/Personal Data/Visitor Titles" screen is set to Edit List.
The personal data items you set up in this screen can be used only for visitors associated with the currently
selected company.
Using the Selection screen
The Selection screen is displayed when you select Visitor Data from "Setup/Identity/Personal Data". You can
use the Selection screen to create a new visitor personal data item or to find an existing one to edit. Click here
for an overview of Selection screens and how to use them.
The following options are specific to this Selection screen:
Visitor Personal Data Title
Use this pull-down list before selecting Find or New. It allows you to choose the personal data title for the
data item that you wish to find or create. These personal data titles are defined in the
"Setup/Identity/Personal Data/Visitor Titles" screen.

Note: The menu lists only personal data tiles that were defined with a field type of Edit List or List Only
in the "Setup/Identity/Personal Data/Visitor Titles" screen.

193
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")

Visitor Personal Data


his option determines the number of existing entries listed when you select Find. If the option is blank, all
entries are listed. If you want to narrow the search, type the data item in the box.
You can find a range of entries by using wildcards.

Definition Screen Options


Visitor Personal Data Title
This read-only box shows the personal data title that you selected from the pull-down list in the Selection
screen.
Current Visitor Personal Data
This read-only box shows the personal data item that you selected from the Selection screen. The field is blank
if you selected New.
New Visitor Personal Data
Use this box to enter the new personal data item. If an existing personal data item is displayed in Current
Visitor Personal Data, it is replaced by this text when you select OK.
Note that if you change a data item, it will affect all visitors who use that data item. For example, if the data title
is Eye Color and you change Green to Bright Green, the eye color for all visitors who have Green eyes will be
automatically changed to Bright Green.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Workflow Designer Screen ("Setup/Workflow/Workflow Designer")

General
Overview of this screen
You can use this screen to create, find, view, modify, copy or delete workflows, depending on your user
privileges, as set up in the "Maintenance/User & Preferences/Roles" screen.
Workflow functionality is available if the Alarm Workflow Designer license is installed.
About workflows
A workflow is a set of actions that are started automatically when you perform a selected operation, such
as opening a new alarm, acknowledging an alarm or opening a task. You can choose the type of trigger
that starts a workflow and the actions that the workflow carries out. You can, for example, create a
workflow that automatically opens the Card Holders screen when you open a new alarm.
A workflow can contain more than one action. For example, a workflow can open a screen, send an email
and create a task when you acknowledge a single alarm. In addition, a workflow can contain different
paths depending on your responses to questions.
Triggers and actions
When you create a workflow, you specify the trigger that starts the workflow. Triggers are either alarm
based, such as "Open New Alarm" and "Open Existing Alarm", or task based, such as "Create Task" and
"Complete Task". A full list of triggers is provided later in this help.
The selected trigger determines the actions you can drag and drop into the Workflow Designer. Actions
include "Open Window", "Close Window", "Send Command", "Question", "Create Task" and others. The
order you place the actions in the workflow determines the order in which they are executed.
Some actions have associated options. For example, the "Open Window" action has an option that allows
you to choose the window to open. The "Create Task" action has a greater set of options, which can be
displayed in a separate window.

194
Symmetry Software Reference Manual

You can delete an action by clicking the action and pressing the Delete button on the keyboard.
Workflows that use the same trigger
It is possible to create different workflows that use the same trigger. For example, two workflows could use
the "Open New Alarm" workflow. In this case, the workflows are executed in the order set using the
Priority button.

Note: If a user cancels a workflow, all other workflows later in the execution order are also cancelled.

Conditions
If you choose an alarm-based trigger, you can specify that any alarm from any device can trigger the
workflow, or only selected alarms from certain devices. The Conditions area in the Workflow Designer
allows you to choose the devices and alarms. By default, workflows are triggered by any alarm from any
device.
Using the Workflow Designer
To use the Workflow Designer:
1. Create a new workflow, or open an existing workflow, from the Selection screen.
If you have opened an existing workflow, you can use arrow buttons near the top-right corner of the
screen to scroll through each workflow.
2. Select the Trigger.
3. For an alarm-based trigger, select the alarm Conditions, if required.
4. Select an Action, and drag and drop it into the workflow. The pointer indicates valid/invalid drop
points. You can drag and drop an action to another location in the workflow, if required.
Invalid actions are shown grayed out.
5. If necessary, select options for the trigger. These are shown in a separate window or in the area
near the bottom-left corner of the screen.
6. Continue to add additional actions, as required.
7. Click Save.
The system ensures that no two enabled triggers can conflict. A message is displayed if the
workflow conflicts with the setup of another enabled workflow.
Starting a workflow
A workflow is started by a user carrying out a defined trigger, such as opening a new alarm. Prompts and
feedback are displayed, depending on the actions in the workflow.
Note: The user requires the appropriate permissions for each action in the workflow. For example, if a
action is to open the Activity screen, the user requires privileges to open the Activity screen. If the user
does not have the appropriate privileges, the action is not carried out.
If the action generates a task or changes the status of an alarm, the Tasks or Alarms screen shows the
new task/status.
Note:
 An alarm-based trigger can respond to a masked alarm.
 The trigger can respond only if one alarm is opened, cleared, etc.

Note: All changes to a workflow are recorded and can be audited using the "Reports/History/User Audit"
screen.

195
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")

Using the Selection screen


The Selection screen is displayed when you select Workflow Designer from "Setup/Workflow". You can use
the Selection screen to list, open or create workflows.
The left column displays an icon that indicates whether the workflow is enabled or disabled (as set in the
Definition screen).
Click here for an overview of Selection screens and how to use them.

About the Options


Description
This is the name of the workflow.
Trigger
This specifies the trigger that starts the workflow. There are two categories of trigger:
Alarm-based triggers
Note:
An alarm-based trigger can respond to a masked alarm.
The trigger can respond only if one alarm is opened, cleared, etc.
Open New Alarm
Triggers when a user opens an unacknowledged alarm.
Open Existing Alarm
Triggers when a user opens an acknowledged alarm.
Acknowledge New Alarm
Triggers when a user acknowledges an unacknowledged alarm.
Acknowledge Existing Alarm
Triggers when a user opens an acknowledged alarm (perhaps to add comments), then clicks OK.
Clear Alarm
Triggers when a user clears an alarm.
Note: An automatic alarm clear cannot trigger a workflow.
Task-based triggers
Create Task
Triggers when a task is created from the "Home/Monitoring/Tasks" screen.
Open Task
Triggers when a task is opened from the "Home/Monitoring/Tasks" screen. The workflow does not
trigger if a task is opened from the "Home/Monitoring/Alarms" screen.
Complete Task
Triggers when a task is completed from the "Home/Monitoring/Tasks" or "Home/Monitoring/Alarms"
screen.
Enabled
You can use this checkbox to enable/disable the workflow.
Conditions
This area is displayed if you have selected an alarm trigger.

196
Symmetry Software Reference Manual

The Select button allows you to choose the types of alarms that will cause the workflow to trigger. For example,
you may want the workflow to trigger only when there is a Door Forced alarm from a specific reader. By default,
the workflow is triggered by any type of alarm.
Actions
Note: The actions available depend on the selected trigger.
Add Comments
This action causes a dialog to be displayed when it is executed in the workflow. The dialog prompts the
user to enter a comment, which can be a predefined comment or a typed comment. The comment is saved
in the comments section of the alarm or task that triggered the workflow.
Predefined comments are set up in the "Operation/Alarms/Comments" screen.
Selecting Comments Mandatory makes entering a comment mandatory.
Note: A comment is mandatory only if Comments Mandatory is selected. The Alarm Comments
Mandatory setting in the "Maintenance/User & Preferences/Client Preferences" screen is not used for
comments entered through an Add Comments workflow action.
Alarm-Escalate
This action causes the alarm that triggered the workflow to be automatically routed to the Alarms screen of
the selected client.
Note: The selected client does not require an alarms routing definition to be set up in the
"Operation/Alarms/Routing" screen.
Alarm-Priority
This action causes the priority of the alarm that triggered the workflow to be automatically set to the
selected value.
Alarm-State
This action causes the alarm that triggered the workflow to be automatically acknowledged or cleared,
depending on the selection in the Set State menu.
For a clear alarm action, the workflow will acknowledge, but not clear, an alarm if the device that caused
the alarm needs to be reset (such as a door being closed). In addition, any requirement to enter a
comment when clearing an alarm (as set using Alarm Comments Mandatory is set in the
"Maintenance/User & Preferences/Client Preferences" screen) is bypassed.
Note: No actions can appear after a Set State action, if it is set to Clear Alarm.
Cancel Operation
This action causes the trigger that started the workflow to be automatically cancelled. For example, if the
trigger is a "Clear Alarm", the Cancel Operation action causes the Clear Alarm to be cancelled. You could,
for example, use this action to prevent an operation from taking place depending on the response to a
question in the workflow.
If you select Silent Cancel, no confirmation is provided when an operation is cancelled. If you do not
select Silent Cancel, the message "The operation you have just requested has been cancelled by a
workflow" is displayed when an operation is cancelled.
Close Window
This action causes the selected window to be automatically closed. For screens that have a Selection and
Definition screen (such as the Card Holders screen), the action closes the Definition screen only.
Selecting Override Confirmation closes the screen without prompting the user to save any changes (if
applicable). If Override Confirmation is not selected, a prompt is displayed to save changes.
Create Task
This action automatically generates the specified task. The task appears in the "Home/Monitoring/Tasks"
screen.

197
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")

When you add this action, a separate window is displayed for you to specify the task details. When you
click Close, you can access the same details in the area near the bottom-left corner of the Workflow
Designer.
Clicking this button (located near the bottom-left corner of the Workflow Designer)
displays the task details in a separate window.
The lower part of the Create Task area/window contains a box, which allows you to enter the task
instructions. You can type text into this box.
The following options are also provided:
Assign
Specify the user name or role the task is assigned to.
For further information, please refer to "Assigned To" in the help for the "Home/Monitoring/Tasks"
screen. Click here to access this help.
Due Date
Specify the date the task is due:
Date Triggered
The task will be due on the date the action is executed.
Days After Date Triggered
The task will be due a specified number of days after the action is executed.
Triggering Event's Date
The task will be due on:
a) the date of the alarm that triggers the workflow, or
b) the due date of the task that triggers the workflow.
Days After Triggering Event
The task will be due a specified number of days after:
a) the date of the alarm that triggers the workflow, or
b) the due date of the task that triggers the workflow.
Due Time
Specify the time the task is due:
Fixed Time
The task will be due at the specified time.
Time Triggered
The task will be due at the time the action is executed.
Triggering Event's Time
The task will be due at:
a) the time of the alarm that triggers the workflow, or
b) the due time of the task that triggers the workflow.
Hours After Trigger
The task will be due a specified amount of time after the action is executed.
Subject
Specify the subject or name of the task.
Alarm
Specify the conditions under which an alarm is generated for this task.

198
Symmetry Software Reference Manual

For information about handling task alarms, please refer to the help for the "Home/Monitoring/Tasks"
screen. Click here to access this help.
Merge Field, Insert
Click here for details about Merge Field and Insert.
Email
This action automatically sends an email to the specified recipients.
Note: To send emails from a workflow, email server and other details must be configured in the
"Setup/Configuration/Email Profiles" screen.
When you add this action, a separate window is displayed for you to specify the email details. When you
click Close, you can access the same details in the area near the bottom-left corner of the Workflow
Designer.
Clicking this button (located near the bottom-left corner of the Workflow Designer)
displays the email details in a separate window.
The lower part of the area/window contains a box, which allows you to enter the text of the email. You can
type text into this box.
The following options are provided:
Email Config
Select an email profile set up in the "Setup/Configuration/Email Profiles" screen.
To
Enter the email address of the recipient.
If you want to enter more than one address, separate each with a semicolon.
CC
If required, enter the email address of a secondary recipient. A copy of the email will be sent to this
address.
If you want to enter more than one address, separate each with a semicolon.
Subject
Specify the subject of the email.
Merge Field, Insert
Click here for details about Merge Field and Insert.
Open Window
This action causes the selected screen to be automatically opened.
Note:
 If you select Card Holder, only alarms that have a known card holder can open the screen.
The action causes the "Home/Identity/Card Holders" Definition screen to be opened. The
screen displays the details of the card holder who caused the alarm.
 If you select Graphics, only alarms that have a device on a graphic can open the screen.
The action causes the "Home/Monitoring/Graphics" screen to be opened. The screen
displays the lowest-level graphic that contains the device.
 If you select Locator, only card-based alarms can open the screen. The action causes the
"Home/Identity/Locator" screen to be opened. The screen displays the last-known location of
the card holder who caused the alarm.
 The Video Playback (Instant Replay) option is relevant only if an alarm that triggered the
workflow has a tagged video clip. The action plays the video clip.

199
Workflow Designer Screen ("Setup/Workflow/Workflow Designer")

Question
This action causes a question to be displayed to the user. The question can have up to 5 predefined
responses. Each response causes a different branch in the workflow to be followed.
In the Workflow Designer, the Question action is contained in a rectangle, and within the rectangle you can
drag and drop additional actions into the relevant branches.
A simple example is a question that prompts the user "Do you want to close the Activity screen?", with Yes
and No responses only. The Yes branch could contain a Close Window action to close the Activity screen.
The No branch could contain no actions, which would prevent the Activity screen from being closed.
You can customize the question and response text displayed to the user using the fields near the bottom-
left corner of the Workflow Designer.
By default, there are only two responses to the question. Typing text into the c, d and e fields automatically
creates additional branches.
Response
This action prompts the user to enter information. The information is stored as a comment in the alarm or
task that triggered the workflow.
You can use the box near the bottom-left corner of the Workflow Designer to specify the question text to
display to the user.
Click here for details about Merge Field and Insert.
Selecting Response Mandatory forces the user to respond to the question.
Send Command
This action sends a predefined command. You can choose any command set up in the
"Operation/Commands/Predefined" screen.
You can set up a new predefined command by clicking New.
Note: The predefined command specifies the user roles that can use the command. The action is
executed only if the user who caused the trigger has one of the roles specified in the predefined command.
Show Instruction
This action causes instructions to be displayed to the user. You can use the box near the bottom-left
corner of the Workflow Designer to specify the instructions to display to the user.
Click here for details about Merge Field and Insert.
Start Intercom
This action is relevant only if the alarm that triggered the workflow is a Call Request alarm. The action
opens an audio link between the intercom at the client and the intercom making the call request.
Priority
You can use the Priority button to specify the order the Symmetry software should execute different workflows
that use the same trigger.
Buttons (bottom right)
The following buttons appear near the bottom-right corner of the screen:
Select this button, followed by Design View to return to normal design-viewing mode if Print
Preview is currently selected.
Select Print Preview to display how the workflow design will appear when printed using the
current Page Setup settings.
Select Page Setup to choose page settings for printing the workflow design.
Select Print to print the workflow design.
You can click this button and choose a magnification factor to reduce or enlarge the view of
the workflow design. Selecting Size To Fit increases or decreases the magnification factor
to display the workflow design comfortably in the screen.

200
Symmetry Software Reference Manual

Select this button, followed by Default, then one of the following buttons to apply the default
magnification factor when in the zoomed-in or zoomed-out state:

Select Zoom In or Zoom Out to zoom in/out with each mouse click.
Select Drag to pan around the workflow when in the zoomed-in state.

Email Profiles Screen ("Setup/Configuration/Email Profiles")

General
Overview of this screen
This screen allows you to set up one or more "email profiles". An email profile is a set of email communication
settings. Email profiles are used for:
 Emailed alarms. You can use the "Operation/Alarms/Definitions" screen to specify the email profile
to use for a particular type of alarm (which also specifies the recipient). To email alarms, alarms
must be routed to E-Mail Alarms in the "Operation/Alarms/Routing" screen.
 Workflow emails, as configured in the "Setup/Workflow/Workflow Designer" screen. The Workflow
Designer specifies the recipients of the email.
 Reports sent by email. Some report screens (such as "Reports/History/Activity") allow you to select
Email as the report destination.
 Visitor sign-in emails. When a visitor is signed in from the "Home/Identity/Visitors" screen, Symmetry
can automatically send a "Visitor arrived" message to each email address specified in the Personal
Data tab of the card holder the person is visiting. For further information about this feature, please
refer to Overview of Visitor Management.
After entering the information, you can test the settings by clicking Test. This sends a message to a specified
email address.
Using the Selection screen
The Selection screen is displayed when you select Email Profiles from "Setup/Configuration". You can use the
Selection screen to create a new email profile or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

Definition Screen Options


Description
Specify any description of your choice for the email profile.
SMTP Mail Server
Specify your Simple Mail Transfer Protocol (SMTP) server address for outgoing messages. You can obtain this
information from your network administrator.
From Email Address
Specify the email address to use as the sender of the email.
Default Recipient
Use this field to specify the email address of the recipient for emailed alarms.
Encrypted Connection Required
Select this option if an encrypted connection is required to the server.

201
Graphics ("Setup/Graphics/Add")

Use SSL
Depending on the configuration required to connect to the chosen email provider, select Use SSL if the server
uses the implicit Secure Sockets Layer (SSL) security protocol. Leave Use SSL unselected if the explicit SSL
security protocol is required.
With explicit SSL, the client first connects to the server using an insecure channel, and requests that a secure
channel is used. If granted, both the client and server switch to using an encrypted SSL connection.
With implicit SSL, the client and server jump immediately into an encrypted SSL connection. Often, this requires
a specific port for secure connections.
Outgoing SMTP Port
Specify the port number to use to connect to your outgoing email SMTP server.
The default port number depends on the settings of Encrypted Connection Required and Use SSL.
Authentication Required, Username, Password
Select this option if the outgoing SMTP email server requires a logon to send emails. Enter the logon User
Name and Password in the fields provided.
Block attachments over
This option is used when sending reports by email. Select the maximum size of the report attachment. Some
email servers have restrictions on the size of attachments that can be sent or received.
If an operator emails a report manually and the limit is exceeded, a message is displayed to indicate that the
email cannot be sent. If the Symmetry client service generates a scheduled report that exceeds the limit, the
message "System blocked emailing of report to {0} as it exceeded the max size permitted" is recorded in the
Windows event log.

Graphics ("Setup/Graphics/Add")

About this Screen


Purpose of the Screen
This screen enables you to install graphics suitable for use in the "Home/Monitoring/Graphics" screen.
Once you have installed the graphics, use the "Setup/Graphics/Setup" screen to add pictures of readers and
other items to the graphic.
Acceptable Formats
Windows Metafile (wmf or emf) with a placeable header included, Windows bitmap (bmp), JPEG and AutoCAD
(dxf) formats are acceptable.
Using the Screen
To install a new graphic
1. Click on the Browse button to select the new graphic file to install.

Note: Two graphics cannot use the same graphic filename. If you select a filename that is
already used by a graphic, the Add button will not be made available. Instead, the graphic that
uses the selected filename will be highlighted.
Note: You cannot use Browse to change the file used by an existing installed graphic.

The Filename box displays the name of the file you have selected.
2. Enter a unique name for the graphic in the Name box. This name will be displayed in the
"Home/Monitoring/Graphics" screen. The name is automatically set to be the same as the graphic
filename if MapNameEqualsFileName is set to 1 in the ini file.

202
Symmetry Software Reference Manual

3. Select Add.
The graphic is stored in the database, but the Symmetry software also maintains a local copy in the
Program Data\Security Management System\Graphics folder, which it uses for performance benefits.
To delete an installed graphic
1. Click on the graphic name in the upper area of the dialog.
2. Select Delete.
To change the name of an installed graphic
1. Click on the graphic name in the upper area of the dialog.
2. Type the new name in the Name box.
3. Select Change.
To update an installed graphic
If there have been changes to a graphic and you want those changes to be reflected in the Symmetry
software:
1. Click on the graphic name in the upper area of the dialog.
2. Select Update.
3. Use the dialog displayed to select the graphic filename.
To save an installed graphic
You can save any graphic installed in the Symmetry software to an external file.
1. Click on the graphic name in the upper area of the dialog.
2. Select Save As.
3. Use the dialog displayed to select the name and location of the file you want to create.

Graphics Screen ("Setup/Graphics/Setup")

General
Overview of this screen
This screen enables you to configure graphics for use in the "Home/Monitoring/Graphics" screen. Graphics are
often plans of the building and provide operators with a quick graphical method of controlling and monitoring
Symmetry.
To configure a graphic, open a graphic previously installed using the "Setup/Graphics/Add" screen, then
position one or more icons on the page. Many of the icons represent physical devices, such as readers, doors,
monitor points and cameras. Operators can use these icons in the "Home/Monitoring/Graphics" screen to view
or change the current status of a device. Others icons, such as the threat level icon, are icons that an operator
can use to control the operation of the system.
A hierarchy of graphics can be defined by creating a link from one graphic to another, which may be useful for
larger sites. For example, a top-level site plan may contain a link for each building shown on the graphic. Each
link could be used to show a more detailed plan of the relevant building. Similarly, further levels could be added
to allow detailed floor or zone plans to be accessed from each building plan.

Note: You can replace the picture used for any icon used in the graphic by right-clicking on the icon and
choosing Picture.

You can add only those devices that belong to the currently selected company.

203
Graphics Screen ("Setup/Graphics/Setup")

About the icons


To add an icon to a graphic
To add an icon to the graphic representing, for example, a reader:
1. Select the graphic from the This Graphic pull-down list.
2. Select the item to add from the Unassigned Devices or Unassigned Groups pull-down list. Some items
can be included on a graphic more than once.
3. Press and hold down the mouse button when the mouse pointer is on the icon to the right of the
Unassigned Devices pull-down list.
4. Move the mouse to position the icon on the graphic, then release the mouse button.
To add a link to another graphic
To add a link to another graphic:
1. Using the This Graphic pull-down list, select the graphic on which you want to place the link.
2. Using the Unassigned Graphics pull-down list, select the graphic that you want to link to. Only graphics
not already used in a graphic are listed.
3. Press and hold down the mouse button when the mouse pointer is on the icon to the right of the
Unassigned Graphics pull-down list.
4. Move the mouse to position the link, then release the mouse button. The rectangle defines the area within
which a user could click to access the linked graphic (this will be possible only when the graphic is being
used in the "Home/Monitoring/Graphics" screen).
5. You may want to change the size of the link, so that its size reflects, for example, the size of the building it
represents. To do this, click on the link, then drag one of the small black squares (handles) around its
outline to the required position.
6. If required, use the link's right-click menu to change the fill color, text and other attributes of the link.
To move an item on a graphic
To move the position of an icon or link:
1. Select the graphic from the This Graphic pull-down list.
2. Make sure that the "Select Object" toolbar button is selected.
3. Press and hold down the mouse button on the item.
4. Move the mouse to position the item, then release the mouse button.
To remove an item from a graphic
To remove an icon or link:
1. Select the graphic from the This Graphic pull-down list.
2. Make sure that the "Select Object" toolbar button is selected.
3. Position the mouse pointer on the item, then press the Delete key on the keyboard, or select the following
toolbar button:

To find out an icon's device name


Position the cursor over the device. The device name (or predefined command name) is displayed next to the
cursor.

About the Options


This Graphic
Select the graphic that you want to modify from the pull-down list.

204
Symmetry Software Reference Manual

Unassigned Devices
This pull-down list shows items such as readers that can be included in the graphic. Some items can appear
more than once on a graphic.
There are three device instances for each reader: one for the door monitor, one for the reader itself and the
other for the door associated with the reader. The three different devices allow a user to monitor and control
each function separately from the "Home/Monitoring/Graphics" screen. For example, door-related alarms cause
the door icon to flash, and card/reader alarms cause the reader icon to flash.
Unassigned Groups
This pull-down list shows groups of devices that are not yet included in the graphic. You may, for example, want
to include a reader group on a graphic to enable all readers in the group to be controlled from a single icon in
the "Home/Monitoring/Graphics" screen.
Unassigned Graphics
This pull-down list shows the graphics that have not yet been included in the currently viewed graphic or in
another graphic.
View Type and PTZ Preset
View Type and PTZ Preset are available for 360-degree cameras that support dewarping, such as
CompleteView cameras. Use the options to select the dewarped camera view and preset position to display.
Each view can have different presets, as configured in the camera definition screen in Symmetry.
About the toolbar buttons
The Graphics screen displays the following toolbar buttons (positioning the pointer over a toolbar button
displays the meaning of the button).

Note: To select more than one object, use the mouse to frame around the items, or select each individually
using Control-Click.

Enables you to select an icon or link in the graphic.


With this selected, each click in the graphic zooms into
the graphic.
With this selected, each click in the graphic zooms out
from the graphic.
Zooms in/out to fit the graphic into the available screen
area.
Aligns the text in the selected links to the left/center/right
of the rectangle. You can also use a link's right-click
menu to align the text, and to align the text with the top,
middle or bottom of the rectangle.
Aligns the top/bottom edges of the selected icons/links.
Horizontally aligns the centers of the selected
icons/links.
Evenly spaces the selected icons/links in the horizontal
direction.
Aligns the left/right edges of the selected icons/links.
Vertically aligns the centers of the selected icons/links.
Evenly spaces the selected icons/links in the vertical
direction.
Changes the size of the selected icons/links to be the
same as the size saved using the Save size option

205
Graphics Screen ("Setup/Graphics/Setup")

(available by right-clicking on an icon/link).


Enables you to change the picture used for the selected
icon (same as the right-click Picture/Import File option).
Deletes the selected icons/links. Pressing the Delete key
on the keyboard has the same effect.

Link/Icon Right-Click Options


Fill
Select Fill Color to add or change the fill color used for the selected link. Otherwise, select Transparent to
make the link rectangle transparent (except its border), so that the picture behind the rectangle shows through.
Font
Select Font to specify the font to use for the selected link. If you choose Size to Fit, the font size is adjusted
automatically to allow the text to fit neatly inside the rectangle.
Text
Use this option to specify the text to include in the rectangle that defines the selected link.
Text Align
Use this option to specify where to position the text in the selected link.
Choose Left, Center or Right to determine the position of the text in the horizontal direction. These have
equivalent buttons in the toolbar.
Choose Top, Middle or Bottom to determine the position of the text in the vertical direction.
Choosing Word Wrap causes the text to wrap around onto the next line (at the next word break) if the box is
too narrow. If Word Wrap is not selected, all the text will not be visible if it is too long to fit on a single line.
Word Wrap is not available if the text has been rotated.
Rotate
Use this option to rotate a link. Choose the appropriate angle of rotation, or choose the currently-selected angle
to return the item to its normal orientation. The rotation angle is clockwise from the normal orientation.
Save Size
Selecting this option causes the system to record the size of the selected icon or link. Having recorded the size,
you can select other icons/links, then choose the Same Size Icons toolbar button to resize the icons/links to be
the same as the recorded size.
Picture
Select this option if you want to change the picture used for the selected icon. Select Picture, followed by
Import File, then choose the Windows bitmap file to use.
You may find the images in the Graphics subfolder of the Program Data\Security Management System) folder
useful. The folder contains:
Custom Icons - A selection of pre-defined Windows bitmap files, which you may find useful.
Standard Icons - The default pictures used in the Graphics screen.
The image is stored in the database.
Show this Device on Alarm
A device icon can be added to more than one graphic, but only one of the icons can have this option selected.
The option determines the graphic the Symmetry software automatically displays when an alarm occurs at the
device. The option requires Auto Show Graphic on any Alarm ("Maintenance/User & Preferences/Client
Preferences" screen) or Display Graphic on Alarm ("Operation/Alarms/Definitions" screen) to be selected.

206
Symmetry Software Reference Manual

Selecting Show this Device on Alarm automatically removes the option from any other icon of the same
device. If you remove the icon, the option is automatically applied to another icon of the same device, if one
exists.

Activity Filters Screen ("Setup/Configuration/Activity Filters")

General
About the Activity Filters Screen
The Activity Filters screen can be displayed using any of the following methods:
 By selecting "Setup/Configuration/Activity Filters".
 By clicking Filters in the "Home/Monitoring/Alarms" or "Home/Monitoring/Activity" screen.
 By right-clicking an alarm in the "Home/Video & Audio/Virtual Matrix" screen and selecting Activity
Filters, Define.
Activity filters enable you to:
 Partition the viewing of alarms in the "Home/Monitoring/Alarms" screen. Each filter you define can be
displayed as a separate tab in the Alarms screen. Each tab displays only those alarms that pass
the filter rules, such as alarms of a specified type or from a specified location.
You can use the Select Filters button in the Alarms screen to choose the filters (and therefore tabs) to
display in the Alarms screen.
Each Symmetry user can have different activity filter tabs displayed in the Alarms screen. Up to ten tabs
can be displayed, in addition to the "All Alarms" tab.

Note: The All Alarms tab is displayed in the "Home/Monitoring/Alarms" screen if Show All Alarms Filter
is selected in your user role. If you are viewing an activity filter tab other than All Alarms, and an alarm
occurs that is visible in another tab, that tab is highlighted with a flashing bar in an orange-color. The
highlighting remains until you have viewed the tab.

 Limit the types of alarms and events displayed in the "Home/Monitoring/Activity" screen. Each filter
you define is automatically added to the Filter menu; selecting a filter causes the screen to display
only those alarms and events that pass the filter rules.
 Limit the types of alarms displayed in the "Home/Video & Audio/Virtual Matrix" screen. Each filter
you define is automatically added to the menu displayed when you right-click an alarm; selecting a
filter causes the screen to display only those alarms that pass the filter rules.

Note: You can use only those filters that have either been defined yourself, or by another user with the Visible
to all Users option set in the "Setup/Configuration/Activity Filters" screen.
Note:Restrict alarm counts to selected filters in the "Maintenance/User & Preferences/Client Preferences"
screen affects alarm counts and other indications of alarm conditions. For further information, please refer to
the help for the Client Preferences screen.
Note: The Role Filters button in the "Maintenance/User & Preferences/Roles" screen can be used to filter the
alarms and events displayed to a user based on the user's role. If a role filter is defined, Symmetry does not
display any alarm or event to a user unless it passes the role filter, irrespective of the tabs and filters selected in
the Alarms or Activity screen. The message "Warning role filters are applied" appears near the top of the
Alarms and Activity screens if a role filter is active.

Creating a New Filter


To create a new activity filter:
1. Open the Activity Filters screen.

207
Activity Filters Screen ("Setup/Configuration/Activity Filters")

2. Click New.
3. Specify a name for the filter in the Description field.
4. Use Column Name, Operator, Value Type and Value to specify a filter rule, then click Apply Rule.
5. If you want to apply additional rules to the filter, click Add OR or Add AND, then repeat step 4.
6. Click OK.
Modifying an Existing Filter
To modify an existing activity filter:
1. Open the Activity Filters screen.
2. Select the filter you want to modify and click Open.
3. If required, modify the filter name displayed in the Description field.
4. If you want to modify one of the filter's existing rules:
4a) Select the rule in the large box.
4b) Edit the rule using Column Name,Operator, Value Type and Value, then click Apply Rule.
5. If you want to apply additional rules to the filter, click Add OR or Add AND, then repeat step 4b.
6. Click OK.

Selection Screen
Using the Selection screen
You can use the Selection screen to create a new filter or to find an existing filter to edit. Click here for an
overview of Selection screens and how to use them.
The Selection screen includes a Role Filter column. This shows whether the filter has been selected as a
default filter for a user role, as specified in the "Maintainance/User & Preferences/Roles" screen.

Definition Screen Options


Description
Specifies the name of the filter.
Visible to All Users
Selecting this option enables the filter to be used by other Symmetry users. If you are not the original owner of
the filter do not deselect this option.
Column Name, Operator, Value Type, Value
You can define a filter rule by setting up Column Name, Operator, Value Type and Value, then clicking Apply
Rule.
Choose one of the following from Column Name (each option corresponds to a column heading in the Alarms
screen):
 Who - To set up a rule based on the name of the person who caused the alarm. Use the Operator
menu to specify whether the person's name must be exactly equal, contain or not contain the text
specified in Value. Case is not important.
 What - To set up a rule based on the alarm message (for example, Door Forced). Choose the alarm
message in the Value Type menu.
The menu contains a Text option, which you can use to type a text value in a Value field that appears
(case is not important). The filter will display alarm messages that contain the specified text.
Value Type also includes Stored Video Clip for filtering alarm messages that have an associated video
clip stored on a Digital Video Recorder (DVR) or Symmetry NVR.
 Where - To set up a rule based on the alarm location (for example, Reader 1). Choose the type of
device in Value Type (for example, Reader), then the device name in Value.

208
Symmetry Software Reference Manual

The menu contains a Text option, which you can use to type a text value in the Value field (case is not
important). The filter will display an alarm message if the device name contains the specified text.
Choose System Alarms if you want the filter to display system alarms of the type specified in Value.
 Time - To set up a rule based on the time of the alarm. Choose the required Operator and enter the
time in the Value field (24-hour value, such as 14:30).
 Priority - To set up a rule based on the priority of the alarm. Choose the required Operator and
enter the priority in the Value field.
 Category - To set up a rule based on the category of the alarm (e.g. as defined in the "Install/Access
Control/Reader" screen).
 Location - To set up a rule based on the location of the alarm (e.g. as defined in the "Install/Access
Control/Reader" screen).
Apply Rule
Applies the rule you have set up using Column Name, Operator, Value Type and Value. The rule is displayed in
the large box and will be used as part of the filter definition.
Add OR
Click this button if you want to add a logical OR rule to the filter. For example, if the rule is defined as
What=Wrong PIN, OR What=Door Forced, an alarm message will be displayed only if it is a Wrong PIN or Door
Forced alarm.
After clicking Add OR, specify the rule using Column Name and other settings, then click Apply Rule.
Add AND
Click this button if you want to add a logical AND rule to the filter.
The AND operation applies to all other rules in the filter definition. For example, if the rule is defined as
What=Wrong PIN, OR What=Door Forced AND Where=Reader2, Wrong PIN and Door Forced alarms will be
displayed only if they are from Reader2.
After clicking Add AND, specify the rule using Column Name and other settings, then click Apply Rule.
Remove
Deletes the rule highlighted in the large box to the left.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Threat Levels Screen ("Setup/Configuration/Threat Levels")

Introduction
Use this screen to specify the colors and names of the five threat levels and any associated commands. The screen
is available only if the Threat Level Manager license is installed.
For an overview of threat level management, please refer to the Threat Level Manager Installation and User Guide.

Threat Color
If required, click on a colored box on the left side of the screen to change a threat level's color. The color is used
when the threat level is displayed elsewhere in the user interface (such as in the indication of the current threat
level in the bar along the bottom of the Symmetry window).

Threat Name
You can change the name of a threat level in the text box.

209
Patrol Tours Screen ("Setup/Configuration/Patrol Tours")

Commands
Clicking the Commands button displays the Threat Commands screen, which allows you to associate one or more
commands with the threat level.

Requires Authentication
Selecting Requires Authentication will require two people to provide their username and password before the
current threat level can be changed (in "Home/Monitoring/Change Threat Level"). Both people need the Authorize
Change of Threat Level user privilege ("Maintenance/User & Preferences/Accounts" screen).

Patrol Tours Screen ("Setup/Configuration/Patrol Tours")

General
What is this screen used for?
You can use this screen to set up patrol tours.
The patrol tours you set up in this screen can be used only for the currently selected company.
The purpose of setting up a patrol tour is to enable a guard's progress to be monitored as he or she patrols a
site.

Note: Patrol tours can be set up only if the Guard Patrol Manager software is installed, as described in the
Guard Patrol Manager Installation and User Guide.

Using the Selection screen


The Selection screen is displayed when you select Patrol Tours from "Setup/Configuration". You can use the
Selection screen to create a new patrol tour or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

Using Patrol Tours


Setting Up a Patrol Tour
Patrol tours are set up using the "Setup/Configuration/Patrol Tours" screen. If required, several patrol tours can
be set up to encompass different areas of the site and to avoid predictability. Each patrol tour specifies the
sequence of tour points around the site and the time allowed for the guard to travel between them. The tour
points are either key-operated switches (monitor points) or card readers.
The same monitor point or reader can be used by more than one patrol. However, a patrol cannot start if it uses
a monitor point that is in another patrol that has started. This is to ensure that monitor point activation is
attributed to the correct patrol. This restriction does not apply to readers, since a transaction at a reader can be
attributed to a card holder and hence patrol.
Each guard who is to patrol the site must have the Patrol Card option set in the "Home/Identity/Card Holders"
screen.
Operating a Patrol Tour
When a guard is ready to start a patrol, you select the Patrol Start command from the
"Home/Monitoring/Command Center" screen and specify the guard's name.
You can monitor the progress of a patrol tour by using the "Home/Monitoring/Activity" screen.
Commands from the "Home/Monitoring/Command Center" screen can be used to reset (abandon) a tour or to
put it on hold. When held, the tour resumes automatically when the guard clocks at the next tour point.
When the patrol is complete, you need to open the "Home/Monitoring Command Center" screen, select the
patrol tour, then send the Patrol Reset command. This acknowledges that you have been monitoring the patrol
and have seen that the patrol was completed.

210
Symmetry Software Reference Manual

Alarms and Events


Alarms/events can be generated during the patrol, including:
 Arrived Too Early At Point - the guard has arrived too early at the tour point.
 Overdue At Point - the guard has not arrived at a patrol tour point within the time allowed.
 Out Of Sequence Now At Point - the guard has missed a tour point altogether.
 Successful Clock At Point - the guard arrived at the tour point correctly.
 Patrol Tour Complete - the guard has arrived at the last tour point.
Producing Reports
Reports on previous patrols can be generated from the "Reports/History/Patrols" or
"Reports/Configuration/Predefined Reports/Predefined Patrols" screen.
"Reports/History/Activity" and "Reports/Configuration/Predefined Reports/Predefined Activity" reports can
include transactions at patrol tour points. Select the Patrol Operations checkbox in the System Activity
options before clicking Run.
You can report on the tours made by a specific guard by selecting Card Number in the Filter By menu, and
entering the card number of the guard.
Using Readers
When a tour point is a reader, any of the following is accepted from the guard's card as a valid patrol tour
transaction:
 A valid access-control transaction.
 Any valid card command.
 A valid card-trigger transaction. Note that a card set up as a conditional card (in the
"Home/Identity/Card Holders" screen) does not open doors.

Definition Screen Options


Patrol Tour Name
This is the unique name of the patrol tour.
Sequence of Readers/Points
This box lists the readers and monitor points that are in the patrol tour and the sequence in which the guard
should tour them. The device at the top of the list is the first in the sequence.
Readers/Points Available
This box lists the readers and monitor points that are not yet in the patrol tour. A reader or monitor point can be
in more than one tour.
Only those devices that have been assigned to the currently selected company are available (as defined by the
installer).
The order of selection from this list determines the sequence of the patrol tour.
Timings for Reader/Point
This shows the device that you have highlighted in the Sequence of Readers/Points box. You can set up
Arrive in (Mins) and +/- (Mins) for the highlighted device.
Arrive in (Mins)
This specifies the nominal length of time that the guard is given to travel from the previous device in the tour to
the highlighted device. For the first device in the tour, the time is from the start of the tour (a tour can be started
by a command from the "Home/Monitoring/Command Center" screen).
You can use the +/- (Mins) option to specify a tolerance for this time.
An alarm/event is generated if the guard does not arrive in time at the device, arrives too early, or misses the
device altogether.

211
Advanced Access Titles Screen ("Setup/Configuration/Advanced Access Titles")

If Arrive in (Mins) and/or +/- (Mins) are set to zero, no time limits are imposed for that device. It may be useful
to use a value of zero for the first device in the tour if the time to reach the device is variable.
+/- (Mins)
Use this box to specify the tolerance for Arrive in (Mins). If a value of zero is specified, no time limit is imposed
(although the sequence of tour devices is still important).
>>/<</Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Advanced Access Titles Screen ("Setup/Configuration/Advanced


Access Titles")

General
Use this screen to define the titles for the advanced access rights in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. The default titles are "Advanced 1" to "Advanced 16".
Click here for further information about advanced access rights.
The titles you set up in this screen can be used only for people associated with the currently selected company.

Global Access Codes ("Setup/Configuration/Global Access


Codes")

General
Overview of this screen
This screen is displayed only if you are using a Symmetry head office system (that is, a Symmetry Global
Edition Head Office license has been installed at the Symmetry system you are using). You can use this screen
to set up global access codes.
A global access code is a set of access codes defined using the "Operation/Times/Access Codes" screen at
one or more regions. When you open this screen, Symmetry makes available all access codes that have been
defined at all regions configured in the "Install/Global/Region" screen.
You can include access codes from different regions in the same global access code. If required, you can
include the same access code in more than one global access code.
The global access codes you define using this screen are available when setting up access rights in the
"Home/Identity/Card Holders" screen at the head office. Assigning a global access code to a card holder's
access rights causes the head office to download the card automatically to the appropriate regions (thereby
allowing the card holder to have access rights at those regions). For example:
 A card holder is assigned the global access code named "Region 1 and 2: Standard Work Hours".
 The global access code includes the access codes "Standard Hours 9am-5pm" from region 1, and
"Standard Hours 8am-4pm" from region 2.
 The head office downloads the card automatically to regions 1 and 2.
 At region 1, the card has the access rights "Standard Hours 9am-5pm".
 At region 2, the card has the access rights "Standard Hours 8am-4pm".
It is possible to create a global access code that contains no regional access codes; this allows the regional
access codes to be assigned at a later date.
Please refer to the Global Edition Installation and User Guide for an introduction to Global Edition.

212
Symmetry Software Reference Manual

Using the Selection screen


The Selection screen is displayed when you select Global Access Codes from "Setup/Configuration". You can
use the Selection screen to create a new global access code or to find an existing one to edit. Click here for an
overview of Selection screens and how to use them.

Definition Screen Options


Description
Specify a name for the global access code.
List of Access Codes Available
This box lists the regional access codes that are not yet in the global access code.
Access Codes in this Group
This box lists the regional access codes that are in the global access code.
>>/<</Copy/Delete/Notes/Permissions/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

Facility/Customer Codes Screen


("Setup/Configuration/Facility/Customer Codes")

General
Overview of this screen
Some card technologies have a customer code (otherwise known as a facility code) encoded within the card
number, which is used to identify the company that the card owner is associated with in the Symmetry software.
You can use this screen to define the customer codes used by each company. By default, each company can
have up to eight customer codes, although the installer is able to remove this restriction using an ini file setting.
More than one company can use the same customer code.
By default, the number of customer codes per system is limited to 8, but again, the installer is able to remove
this restriction using an ini file setting.
Note that you must ensure that each customer code specified within the definition of each reader
("Install/Access Control/Reader" screen) is defined in the Facility/Customer Codes screen. This means that
each company must have at least one customer code, even if the cards used by the company cannot
contain a customer code (such as some proximity cards).
When using Micronodes, only one facility/customer should be used.
You can find out who is using a customer code by using the "Reports/Identity Reports/Access" screen.
Using the Selection screen
The Selection screen is displayed when you select Facility/Customer Codes from the "Setup/Configuration"
menu. You can use the Selection screen to create a new facility/customer code or to find an existing one to
edit. Click here for an overview of Selection screens and how to use them.

Definition Screen Options


Facility/Customer Code
This is the customer code to be used by the companies in the List of Companies to Use the Code box.

213
Entry Point Screen ("Setup/Identity Verification/Entry Point")

Companies Available
This box lists the available companies that are not yet assigned to the customer code. Click on the appropriate
line in the Companies Available list, followed by >>. Use the Ctrl or Shift keys to select more than one
company.
List Of Companies to Use the Code
This box lists the companies that are assigned to the customer code. You can remove a company from the list
by clicking on the appropriate line, then <<. Use the Ctrl or Shift keys to select more than one company.
You cannot remove a company from the list if a card definition uses the customer code (as specified in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen).
Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Entry Point Screen ("Setup/Identity Verification/Entry Point")

General
Overview of this Screen
You can use this screen to specify entry points to the site. Entry points are used in views, as configured in the
"Setup/Identity Verification/View" screen.
The "Home/Identity/Verification" screen displays the entry points in a selected view.
Using the Selection screen
The Selection screen is displayed when you select Entry Point from "Setup/Identity Verification". You can use
the Selection screen to create a new entry point or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

Screen Options
Description
This is the name of the entry point. This is displayed in the "Home/Identity/Verification" screen.
Tag Name
This optional text is displayed in the entry point's button in the side bar of the "Home/Identity/Verification"
screen. Since space is limited in the button, you may want to use an abbreviated form of the entry point's name.
Auto Clear After
Selecting this option and entering a value in this field specifies the length of time the
"Home/Identity/Verification" screen displays the stored image and card/personal details following a grant/deny
access transaction.
Camera 1/2/3
Optionally, specify up to three live video images to display in the "Home/Identity/Verification" screen for the
entry point.
Digital video cameras defined in the "Install/Video & Audio/Digital Video" screens are available for selection.
A user of the "Home/Identity/Verification" screen is able to view video only from cameras that are available to
the user's role. The Permissions button in the camera definition screen determines the roles that are allowed
to view video from a camera.
The following options may be displayed, depending on the camera type:
 View - For 360-degree cameras such as the Oncam Grandeye that support dewarping, you can
choose one of the dewarped camera views. The camera will switch to display the view you select.

214
Symmetry Software Reference Manual

 PTZ Preset - You can choose one of the camera's PTZ presets set up for the camera, if it has any.
The camera will switch to display the PTZ preset you select. For 360-degree cameras, the camera
view you select may affect the available presets, since each view can have different presets (as
configured in the camera definition screen in Symmetry)
Control Reader
Select the main reader used at the entry point.
Additional Readers
You can choose a reader group from this menu. When the entry point is in automatic verification mode (PC
Door Control mode off), the "Home\Identity\Verification" screen displays alarm\event messages from all readers
in this reader group, as well as from the Control Reader.
You may want to use this option if the entry point has a main (control) reader and other separate readers for
use by VIPs or other categories of card holder.
The selected reader group is used only when the entry point is in automatic verification mode and has no other
effect than to cause alarm\event messages from readers in the group to be displayed in the
"Home\Identity\Verification" screen.
Call Station
Optionally, specify the intercom call station to display in the "Home/Identity/Verification" screen for the entry
point. This will allow the user of the "Home/Identity/Verification" screen to use the intercom system to
communicate with people at the entry point.
The PC at which the "Home/Identity/Verification" screen is used must be defined as an intercom client in the
"Install/Video & Audio/Intercom/Clients" screen.
Intercom call stations are defined in the "Install/Video & Audio/Intercom" screens.
Command 1/2/3
Optionally, choose up to three predefined commands to display for the entry point in the
"Home/Identity/Verification" screen.
Predefined commands are configured in the "Operation/Commands/Predefined" screen.
The third command is not available if Allow Activity Comments is selected.
A user of the "Home/Identity/Verification" screen is able to run only those predefined commands that are
available to the user's role. The Permissions button in the "Operation/Commands/Predefined" screen
determines the roles that are allowed to run a command.
Notification Sound
If you select a sound ("wav" file), it will be played in the "Home/Identity/Verification" screen when there is a card
transaction at the entry point, providing the entry point is in manual verification mode (PC Door Control mode).
Entry Point Type
This option determines the graphic that is used for the Grant Access and Deny Access buttons in the
"Home/Identity/Verification" screen.
Auto Pause Video (Manual Verification)
Choose this option if you want live video at the entry point to be paused when there is an access control
transaction at the entry point, providing the entry point is in manual verification mode (PC Door Control mode).
Allow Grant Access
Selecting this option enables the Grant Access button in the "Home/Identity/Verification" screen.
Allow Card Holder Lookup
Selecting this option enables the Lookup Card holder button in the "Home/Identity/Verification" screen.

215
View Screen ("Setup/Identity Verification/View")

Allow Lock/Unlock
Selecting this option enables the Unlock and Lock buttons in the "Home/Identity/Verification" screen (to lock or
unlock the door or other entry device).
Allow Deny Access
Selecting this option enables the Deny Access button in the "Home/Identity/Verification" screen.
Allow Activity Comments
Selecting this option causes the Activity Comment icon to be displayed in the "Home\Identity\Verification"
screen. Clicking the icon enables the user to add a comment against the current alarm\event message
displayed in that screen.
Selecting Allow Activity Comments disables Command 3 to provide space in the "Home\Identity\Verification"
screen for the new icon.
Card Alarm Notification
This option is relevant only for automatic verification mode (PC Door Control mode off).
Selecting this option causes any one of the following alarms at the Control Reader to prompt a user of the
"Home\Identity\Verification" screen whether to grant or deny access to the card holder:
At Wrong Door
At Wrong Time
Card Expired
Card Holder on Vacation
Unknown Card

Note: Granting access has the same effect as granting access from the "Home/Monitoring/Command Centre"
screen. It does not generate an Access Granted transaction against the card holder, since the card holder does
not have valid access rights.

View Screen ("Setup/Identity Verification/View")

General
Overview of this Screen
You can use this screen to specify the entry points to include in a view and the order of the entry points in the
view. Entry points are defined in the "Setup/Identity Verification/Entry Point" screen.
Selecting a view in the "Home/Identity/Verification" screen causes the entry points in that view to be displayed.
A view can contain up to 27 entry points. An entry point can be in more than one view. You cannot have two
entry points in the same view that use the same reader.
The screen applies only to the currently-selected company.
Using the Selection screen
The Selection screen is displayed when you select View from "Setup/Identity Verification". You can use the
Selection screen to create a new view or to find an existing one to edit. Click here for an overview of Selection
screens and how to use them.

Screen Options
Description
This is the name of the view.

216
Symmetry Software Reference Manual

About the Previous and Next Buttons


When you are in the Definition screen, you can use the following icons located in the top-right corner of the
screen to display the previous or next record in the database:

If you have made any changes, you are prompted to save those changes before the previous or next record is
displayed.
Available Entry Points
This box lists the entry points that are not yet in the view.
In this View
This box lists the entry points that are in the view.
Up/Down buttons
The up/down buttons to the right of the screen allow you to change the order of a selected entry point. For
example, moving an entry point to the top of the list will cause that entry point to be displayed at the top of the
view in the "Home/Identity/Verification" screen.
Default View
Select this option if you want the view to be the view that is displayed by default the first time a user opens the
"Home/Identity/Verification" screen. The next time a user opens the screen, the last view the user used is
displayed.
Only one view can be the default view. Selecting this option for a view automatically deselects the option in all
other views.
Camera Limit
This allows you to specify the maximum number of camera images to display for each entry point in the view.
You may want to use this setting to create two different views that include the same entry points, but have
different camera limits. This would, for example, enable the view that has the lower camera limit to be displayed
on a monitor that has a lower resolution.
Rotate View
This option is available if there is only one entry point in the view.
If you want the "Home/Identity/Verification" screen to list previous transactions at the entry point, select this
option and enter the number of transactions to list in Entry Point History Limit. Once this limit is reached, a
new transaction causes the oldest transaction to be removed.
Entry Point History Limit
See Rotate View above.
Single View
This option is available if there is only one entry point in the view.
Select this option if you want the view to occupy the entire "Home/Identity/Verification" screen.
>>/<</Copy/Delete/Permissions/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

217
Data Titles Screen ("Setup/Identity Verification/Data Titles")

Data Titles Screen ("Setup/Identity Verification/Data Titles")

General
Overview of this Screen
You can use this screen to specify card and personal information to display in the "Home/Identity/Verification"
screen for card holders and visitors.
The screen applies only to the currently-selected company.

Note: If your system is configured for more than one company, make sure that the personal information
configured in this screen is exactly the same for all companies that are in the same company group. For
example, if you select First Name for the first item of personal information, make sure you select First Name
when setting up this screen for all other companies in the same company group. If you do not do this, personal
information will not be displayed correctly in the "Home/Identity/Verification" screen when a card holder
presents a card not belonging to the user's currently-selected company.

Screen Options
Card Holder Data
Use the menus to specify the card and personal information to display in the "Home/Identity/Verification" screen
for card holders.
The options you can select include the personal data titles defined in the "Setup/Identity/Personal Data/Card
Holder Titles" screen, and various items of information defined in the "Home/Identity/Card Holders" screen.
You can use the buttons to the right of the menus to choose the font, text color and background color to use for
the displayed information. The selected font and colors are shown to the right of the buttons. Choosing (None)
resets the font and colors.
Visitor Data
Use the menus to specify the card and personal information to display in the "Home/Identity/Verification" screen
for visitors.
The options you can select include the personal data titles defined in the "Setup/Identity/Personal Data/Visitor
Titles" screen, and various items of information defined in the "Home/Identity/Visitors" screen.
You can use the buttons to the right of the menus to choose the font, text color and background color to use for
the displayed information. The selected font and colors are shown to the right of the buttons. Choosing (None)
resets the font and colors.

218
Install Menu

Installation Wizard ("Install/System/Installation Wizard")


You can use the Installation Wizard to configure Symmetry following software installation. For further information,
click Help in the Installation Wizard dialog.

Node Defaults ("Install/System/Default Settings/Node")


Use this screen to set up defaults to be used within the "Install/Access Control/Node" screen.
The screen contains a subset of the options displayed in the "Install/Access Control/Node" screen. For further
information about the options, click here.

Reader Defaults ("Install/System/Default Settings/Reader")


Use this screen to set up defaults to be used within the "Install/Access Control/Reader" screen.
The screen contains a subset of the options displayed in the "Install/Access Control/Reader" screen. For further
information about the options, click here.

Monitor Point Defaults ("Install/System/Default Settings/Monitor


Point")
Use this screen to set up defaults to be used within the "Install/Access Control/Monitor Point" screen.
The screen contains a subset of the options displayed in the "Install/Access Control/Monitor Point" screen. For
further information about the options, click here.

Reader/Card Formats ("Install/System/Default


Settings/Reader/Card Formats")

Introduction to this Screen


Purpose of the Screen
Use this screen to name and define each reader type being used, and the allowable formats of the cards that
can be used at the reader. Clicking Find displays several popular types.
Double-clicking a reader/card format name displays the acceptable card format details for that reader. Some
readers require fixed card formats, and for these cases, the card format details are not shown.
The reader/card formats names are used in the Reader Definitions ("Install/Access Control/Reader") and
Reader Defaults ("Install/System/Default Settings/Reader") screens, and for encoding and reading magstripe
cards in the "Maintenance/Access Control/Encode Cards", "Maintenance/Access Control/Read a Card" and
"Home/Identity/Card Holders" screens.

219
Card Formats Definition Screen ("Install/System/Default Settings/Card Formats")

About the Options


Reader/Card Format Name
This is a unique name that describes the reader type and card formats.
Reader Interface Type
This is the interface type. If you have selected New in the Selection screen, you must specify the reader
interface type before you can specify the card formats.
Card Format Details
If the reader type does not require fixed-format cards, this area lists the format of the data on the cards. You
can specify up to eight different formats, depending on the reader type.
The supplier of the cards should provide the information for these fields.

Card Formats Definition Screen ("Install/System/Default


Settings/Card Formats")

Introduction to this Screen


You can use this screen to:
 View or create card formats for use with M4000 nodes, and change general settings such as the
name of the format and the enabled/disabled status.
 Assign a card layout to a card format.
 Create new card layouts, or modify existing ones.

Note: You cannot change the card layout assigned to a built-in card format, or modify any of the built-in card
layouts.

You can access this screen from the Card Formats Selection screen, which allows you to choose whether to open
an existing card format or create a new one. The screen is available only if it is enabled in your user role
(Maintenance/User & Preferences/Roles" screen).

Using the Card Formats Definition Screen


Description
This is the name of the card format.
Enabled
This allows you to enable or disable the card format. It is not possible to disable a card format that is being
used by a card holder or visitor, or if it is the default card format.
Default
This allows you to specify that the card format you are viewing is to be used as the default for your company
group.
The default is used as the default in the Card Format menu in the "Home/Identity/Card Holders" and
"Home/Identity/Visitors" screens when the Symmetry operator belongs to the company group.
The default you specify in this screen overrides the default card format selected in the "Maintenance/User &
Preferences/System Preferences" screen.
If you remove the checkmark from the Default checkbox, the default card format is the one defined in the
"Maintenance/User & Preferences/System Preferences" screen, and the appropriate card format in the Card
Formats Selection screen is marked as the default. You cannot remove the checkmark if the card format is the
same one selected as the default in the System Preferences screen.

220
Symmetry Software Reference Manual

AID
This is a unique identifier for the card format.
The default is the AID that is stored in M4000 nodes. When an M4000 node receives a transaction from a card
that does not match any of its known formats, the M4000 passes the AID and other card data to Symmetry.
Symmetry attempts to match the AID and other card data with the card formats that are defined in this screen,
starting with those that have the same AID. This can allow Symmetry to decode the data and display relevant
information in the Alarms and Activity screens.
The AID must be a hexadecimal string with an even number of characters.
Format ID
The Format ID can be used to specify the card format to use for a card holder or visitor when using data
import, as described in the Data Connect Manual.
Layout
This allows you to choose the card layout to use for the card format named in the Description field.
The menu is grayed out if you have opened a built-in card format from the Selection screen, as the layout of
built-in card formats is fixed.
The menu is also grayed out if the card format is already being used in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
New
You can click this button to create a new card layout in the Data Layout Definition screen. When you save the
new layout, it will be automatically selected as the layout to use for the card format named in the Description
field.
The button is grayed out if you have opened a built-in card format from the Selection screen, as the layout of
built-in card formats is fixed. The menu is also grayed out if the card format is already being used in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Modify
You can click this button to modify the card layout selected in the Layout menu. The Card Layout Definition
screen is displayed.
The button is grayed out if the card layout selected in the Layout menu is a built-in card layout, as these card
layouts are fixed. The button is available for other layouts, even if the card format is already being used in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Copy/Delete/Apply/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

Clients ("Install/System/Clients")

Introduction to this Screen


Introduction
Use this screen to define each Symmetry client.
Once you have defined each client, you can use the "Install/System/Client Ports" screen to set up the type of
security management equipment connected to the client's ports.

About the Options


Client Name
This is the unique name of the client. Choose a name that best describes the client, such as Guard's Computer,
Admin Computer, etc.

221
Client Ports ("Install/System/Client Ports")

Network Name
Shows the Windows computer name of the client.
The association between client name and Windows computer name was made using Installation Wizard when
Symmetry was first started at the client.
If you want to associate the client with a different Windows computer name, re-run the Installation Wizard (from
"Install/System"), and use the Client Name screen to re-make the association.
"Client software to be installed/configured" is displayed if the association has not yet been made (because the
client has not been started for the first time).
Display real-time current activity at this client
Select this option if you want the "Home/Monitoring/Activity" and "Home/Identity/Verification" screens to be able
to be used at the client.
Output Alarms/Events to printer
Select this option if you want the client to print alarm/event messages that have been set up for printing in the
"Operation/Alarms/Reporting" screen. The alarm/event messages will be printed on the default Windows
printer, which should be of the dot-matrix type (laser printers are unsuitable due to their inability to use
continuous stationery).
This option is available only if Display real-time current activity at this client is selected.
This option can be overridden on a global basis using Enable Printing of Alarms/Events in the
"Maintenance/User & Preferences/System Preferences" screen.
The alarms/events printed at a client depend on alarm routing, as set up in the "Operation/Alarms/Reporting"
screen.
There is no need to restart the client or services after changing this option.
The account used by the "SymmetryServices" service must have permission to print. This can be tested by
logging in as the account, adding the printer in the Control Panel, and checking that you can print a document
from this account.
Client offline Monitoring
Selecting this option enables the Client/Server Offline and Client/Server Online alarms/events to be generated
for the client. If a client has chains connected to it, it is important for the server to be able to report that it cannot
communicate with the client.
The Client/Server Offline and Client/Server Online alarms/events can also be generated if the server goes
offline (such as if the Symmetry services at the server shut down). The alarm/event is displayed the next time
the server goes online. These alarms/events are reported by clients that have alarms routed to them.
Release
You can use this button to release a Symmetry client license from the machine. You may want to do this if you
want to install the Symmetry client software on a different machine using the same license serial number.

Note: Do not use this option for the Symmetry server machine, even if it includes a client license.

Client Ports ("Install/System/Client Ports")

Introduction to this Screen


What is this screen used for?
Use this screen to define the type of security management hardware connected to each client's ports.
In the Selection screen, choose the name of the client using the Client Name pull-down list, then select Find to
find any existing port definitions, or New to set up a new port definition.

222
Symmetry Software Reference Manual

About the Options


Client Name
This is the name of the client whose ports you wish to set up.
Client Type
This specifies the client type, as set up in the "Install/System/Clients" screen.
Port
Select the port that you wish to set up (only those ports that have not yet been set up are available for
selection:
 Network - Select this if the selected client is to be used as the supervising client to communicate
with nodes on LAN chain(s) via its network (Ethernet) port.
For full details of LAN chains, please refer to the NIC Module Configuration Guide.
 IPNet - Select this if the client is to be used as the supervising client to communicate with intrusion
system(s) via its network port. Please refer to the Intrusion Management Installation and User
Guide for an overview of configuring and using the intrusion panels interface.
 COMNet - Select this if the client is to be used as the supervising client to communicate with a
Bosch D6600 intrusion communications receiver via its network port. Please refer to the Intrusion
Management Installation and User Guide for an overview of configuring and using the
communications receiver interface.
 IntercomNET- Select this if the client is to be used as the supervising client to communicate with a
Stentofon Alphacom intercom system via its network port. Please refer to the Intercom
Management Installation and User Guide.
 USB - Select this option to define a connection to one of the client's USB ports.
 COM (RS-232) - Select this option to define a connection to one of the client's COM ports. Each
client can have up to 256 COM port definitions, of which up to 16 can be used for connection to
hardwired or dial-up chains.
If you selected an existing port record from the Selection screen, the Port pull-down menu is grayed out. You
must delete the record to change the port.
Allocation
The Allocation pull-down menu in the "Install/System/Client Ports" screen specifies the type of hardware
connected to the selected port.
If you selected an existing port record from the Selection screen, the Allocation pull-down menu is grayed out
if the port is allocated to a chain that has been set up in the "Install/Access Control/Chains/Hardwired" screen
or in the "Install/Access Control/Chains/Dial-Up" screen. You must first delete the chain definition to change the
allocation.
Bioscrypt Enrollment Reader
A Wiegand reader for reading fingerprints. The reader can be used for access-control purposes, or for
secure logons. The reader also includes a smart card reader/writer.
Selecting this option displays a Configure Fingerprint Reader button. Make sure that the reader is
connected to the port before selecting this option. You must use this option to configure all Bioscrypt
fingerprint readers, including those that will be connected to nodes for access-control. Bioscrypt fingerprint
readers cannot be used until they have been configured.
The first time you select Configure Fingerprint Reader, you will be prompted to specify a customer code
(range 0 to 4095 only) in the ini file. This is stored in the reader and is of use only if the reader is to be
used as an access-control reader. When the reader is used as an access-control reader, the reader will
check the customer code stored in the reader against the customer code on the card. The reader also
compares the fingerprint data stored on the card with the fingerprint presented to the reader. If both sets of
data match, the customer code and card number are downloaded to the node, which determines whether
or not to grant access through the door, based on the person's stored access rights.

223
Client Ports ("Install/System/Client Ports")

(It may seem strange that the reader checks the customer code and then passes the customer code and
card number to the node to check access rights, but this is necessary for the operation of the reader. The
reader requires a password check for each transaction, and the password has been set up to be the same
as the customer code.)
For further information, see Overview of Fingerprint Readers.
Commend Controls
A port for connection to a Commend Intercom System (available only for Securimaster systems). Only one
Commend system can be connected to Symmetry. If you select Commend Controls for a COM port, the
option will not be available for other COM ports. If you select Commend Controls, you are not able to add
an Intercom System to the same Symmetry system, and vice versa.
By default, the Commend 416 system hardware is supported. If the Commend 200/700 system hardware
is used, the relevant parameter must be set in multimax.ini.
Overview of the Controls option
Communications Receiver
Select this option if a Bosch D6600 communications receiver is connected to the client COM port. The
baud rate must be the same as set at the receiver (default 38400).
Please refer to the Intrusion Management Installation and User Guide for details of the Bosch DD600
integration.
Communications Receiver LAN Chain
This is displayed automatically if you have selected COMNet from the Port menu.
Dial-In Alarms Reporting
Select this option if you want the COM port to be able to receive alarms from a separate Symmetry system
that has its own server.
Click here for an overview of dial-out/dial-in alarms reporting.
Dial-Out Alarms Reporting
Select this option if you want the COM port to be able to copy alarms to a separate Symmetry system that
has its own server. Note that alarms must be routed to the client specified in the Client Name box to
enable the dial-out alarms to be sent through the selected Port.
Click here for an overview of dial-out/dial-in alarms reporting.
HGU Enrollment Reader
A reader for capturing biometric hand print templates for the Biometrics tab of the "Home/Identity/Card
Holders" and "Home/Identity/Visitors" screens.
For further information, see Overview of Biometric Hand Templates and HGUs.
Intercom System
A Stentofon Alphacom Intercom System connected via a COM port.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.

Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls
and Intercom System. Also, only one client in the system can be connected via a COM port to a
Stentofon Intercom System.

Intercom System LAN Chain


A Stentofon Alphacom Intercom System connected over a network.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.

224
Symmetry Software Reference Manual

Intrusion System
An intrusion system connected to a client COM port. Please refer to the Intrusion Management Installation
and User Guide for an overview of configuring and using the intrusion panels interface.
Intrusion System LAN Chain
The port for communication with intrusion systems over a network. Please refer to the Intrusion
Management Installation and User Guide for an overview of configuring and using the intrusion panels
interface.
IP Biometric Encoder
A network port used to communicate with a biometric encoder, such as the Suprema BioLite N2.
Click Configure Encoder to specify:
 Description - a name for the device.
 Network Address - The IP address of the device or its network (DNS) name.
LANnode Chain
The port for communication with nodes on a LAN (Local Area Network) chains. A LAN chain
communicates via a COM or Network (Ethernet) port of a client.
For full details of LAN chains, please refer to the NIC Module Configuration Guide.
Click here for details of the steps you need to take to set up a LAN chain.
Magstripe Encoder
A magstripe encoder for encoding and reading magstripe card details (available only if the Card Encoding
Module license is installed).
An encoder of this type is used for the "Maintenance/Access Control/Encode Cards" and
"Maintenance/Access Control/Read a Card" screens. It is also used at magstripe versions of the
Verification Client.
Multinode Dial-Up Chain
A port used for communication with a remote chain of nodes (via a modem. All client-initiated calls use this
port, but the remote node's modem may call this port or a secondary dial-in port.
Each port may communicate with one or more remote chains (as defined in "Install/Access
Control/Chains/Dial-Up" ).
There is a restriction on the maximum number of dial-up chains connected to each client. This is
dependent on the option purchased.
Multinode Hardwired Chain
The port for communication with the first node in a chain, where the chain does not return to a second port
on the client.
Note that the Multinode Hardwired Chain selection should be used for a chain of multiNODE-2,
multiNODE 2100, M2150, M1100, M1200, M1400 or multiNODE-2000 nodes.
Multinode Primary Bi-Directional Chain
The port for communication with the first node in a chain, where the chain returns to a second port on the
client. Communication with the nodes is normally carried out through the primary port, but if communication
is lost, the secondary port is used to communicate with the nodes on the other side of the break.
You must set up the next even-numbered COM port as the chain's secondary bi-directional port.
This option is available for odd-numbered COM ports only.
Multinode Secondary Bi-Directional Chain
The port for communication with the last node in a chain, where the chain returns to a second port on the
client.
You must set up the previous odd-numbered COM port as the chain's primary bi-directional port.

225
Client Ports ("Install/System/Client Ports")

This option is available for even-numbered COM ports only.


RF Ideas iClass Encoder
Information about this option will be provided at a later date.
S81x Fingerprint Enrollment Reader
An enrollment reader used to capture fingerprints, and to encode NXP® MIFARE® or NXP MIFARE
DESFire contactless smart cards for the S81x series of fingerprint readers.
For further information, see Overview of Fingerprint Readers.
S821 Ti Encoder
The S821 encoder is used to encode blank Texas Instruments™ (ISO 15693) smart cards to the
"smartMAX" format, or to re-encode existing smartMAX" format Texas Instruments cards.
The encoder can be used to encode smart cards using the Encode button in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen. The encoder can be used only at the client that it is connected
to.
S822 iClass Encoder
A port used for communication with a remote chain of nodes (via a modem. All client-initiated calls use this
port, but the remote node's modem may call this port or a secondary dial-in port.
Each port may communicate with one or more remote chains (as defined in "Install/Access
Control/Chains/Dial-Up" ).
There is a restriction on the maximum number of dial-up chains connected to each client. This is
dependent on the option purchased.
Secondary Dial-In Chain
Calls initiated from nodes on a remote chain use this port if the phone number in the "Install/Access
Control/Chains/Dial-Up" screen corresponds to the modem connected to this port. (All client-initiated calls
use the dial-up port.)
If a remote site is to use a secondary dial-in port, two Dial-Up Chain records need to be created, as
described in the help for "Install/Access Control/Chains/Dial-Up".
Serial Device
An external device such as an intruder alarm that can be controlled by ASCII messages from Symmetry.
Introduction to Serial Messages and Devices
Signature Pad and Signature Pad (Topaz)
Select Signature Pad if you are using a Transaction Team 1500 or Mobinetix PenWare1500 signature pad
(not currently supported in this version of Symmetry). Select Signature Pad (Topaz) if you are using a
Topaz Signature GEM pad.
A signature pad is a device that a card holder can use to write his/her signature for direct input to the
Biometrics tab of the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Signature pad(s) must be connected only to the computer(s) at which the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen is going to be used to capture signatures.
Configuring a Topaz USB Signature Pad:
1. Although the device may be a USB device, select a COM port and a speed of 19200.
2. Add a file names "SigPlus.ini" file to the Windows folder, containing the following:
[Tablet]
TabletComPort=1
TabletType=6
TabletLCDMode=0
TabletModel=SignatureGem1X5

226
Symmetry Software Reference Manual

EnableColor=0
Win95USB=0
ImageScreenResolution=1
UseMultiUSB=0
DisableMessages=0
[SignatureGem1X5]
TabletXStart=400
TabletXStop=2400
TabletYStart=350
TabletYStop=950
TabletLogicalXSize=2000
TabletLogicalYSize=600
TabletFilterPoints=4
TabletTimingAdvance=4
TabletBaudRate=19200
TabletResolution=410
3. Restart the Symmetry software.
Smart Card Encoder
A smart card encoder (reader/writer), which is available only if the Card Encoding license is installed. An
encoder can be used:
 By the Encode button in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen
to encode smart cards.
 By the Capture button in the "Maintenance/User & Preferences/Accounts" screen to capture
the details of a smart card for secure logons, and for secure logons themselves. An encoder
must be located at the same client at which the Capture button is used or at the client used
for secure logons.
 By the "Maintenance/Access Control/Read a Smart Card" screen.
 At Encoding Clients.
 At smart card versions of the Verification Client.
Switcher CCTV
A CCTV switcher unit is a unit that switches camera outputs to nominated monitors. A switcher unit can be
connected to any client that supports ports.
Overview of CCTV switching
Symmetry Blue Enrollment Reader
This is a Symmetry Blue USB enrollment reader.
Adding this port causes a Bluetooth icon to be displayed in the "Home/Identity/Card Holders" and
"Home/Identity/Visitors" screens. The icon allows a Bluetooth-enabled mobile device that has been
previously installed with the Symmetry Blue mobile app, to be enrolled for the card holder or visitor. The
mobile device can then be used at Symmetry Blue readers to gain access in a similar manner to using a
conventional card.
There can be only one Symmetry Blue enrollment reader per Symmetry client.
VICON Multiplexer
This is a CCTV multiplexer.

227
Serial Device Definition ("Install/System/Serial Devices/Port Settings")

Baud Rate
Specify the communications baud rate (normally 9600 in all cases). This option is grayed out if Network has
been selected.
Add Virtual Serial Device
This option is displayed if you choose Intrusion System or Intrusion System LAN Chain from the Allocation
menu. DMP XR200 and DSC PC4020 intrusion systems allow the Symmetry software to download commands
containing user-definable messages. The messages are definable in a text format and could, for example, be
used to arm and disarm areas or display messages at keypads. A message can be sent to a panel using
Symmetry commands, such as from the Command Center.
To send messages to an intrusion system, you need to define the messages in the "Install/System/Serial
Devices/Messages" screen, and define a serial device definition for the port in the "Install/System/Serial
Devices/Port Settings" screen.
Please refer to the Intrusion Management Installation and User Guide for step-by-step guidance on how to
configure and use the intrusion interface.
Encryption
This is displayed only if an Encrypted Communications license is installed and you have logged on with System
Admin privileges (as specified in the "Maintenance/User & Preferences/Roles" screen) and Port is set to
Network. You need to select Encrypt and enter the correct encryption key if the LAN chains that the client is
supervising use a CoBox NIC module, NIC-3 (XPort) module, NIC-4 module or EN-DBU programmed with
special encryption firmware.
Selecting Encrypt enables the client to use encrypted communications to/from the LAN chains it is supervising.
The encryption key consists of 16 or 32 pairs of hexadecimal characters, depending on whether 128-bit or 256-
bit encryption is used. 256-bit encryption is FIPS140-2 compliant. The keys are not displayed if you are viewing
an existing port definition.
The keys must be programmed into the NIC module or EN-DBU.
Encryption must also be set up for the LAN chains in the "Install/Access Control/Chains/LAN" screen.

Serial Device Definition ("Install/System/Serial Devices/Port


Settings")

Introduction to this Screen


See Introduction to Serial Messages and Devices.

About the Options


Description
Enter a name for the serial device.
Company
Select the company that is to own the serial device.
Client Name/Port
If the external equipment is to connect to the serial port of a Symmetry client PC, choose the name of the client
and the port that the serial device is connected to (as defined in "Install/System/Client Ports").
Ports connected to an intrusion alarm system are also listed if Add Virtual Serial Device was selected in the
"Install/System/Client Ports" screen and the intrusion system that connects to the port (as defined in
"Install/Intrusion/Intrusion/System Configuration") supports two-way communications.
For an intrusion system, if you select IPNet in the Port menu, a LAN menu appears for you to choose a LAN
chain. The LAN chain you choose identifies the intrusion system that will receive messages.

228
Symmetry Software Reference Manual

The options are grayed out if the serial device has been used in the definition of another item (such as a
scheduled command). This indicates that you must delete the item before you can change the settings here.
Node/Address
If the external equipment is to connect to an RS232/NIC module, choose the name of the node that contains
the RS232/NIC module. Address is read only and shows the selected node's address.
These options are not relevant if you have used Client Name to specify a connection to a serial port of a
Symmetry client PC.
The options are grayed out if the serial device has been used in the definition of another item (such as a
scheduled command). This indicates that you must delete the item before you can change the settings here.
LAN
This is displayed only if you have selected IPNet in the Port menu and Add Virtual Serial Device has been
selected for the port in the "Install/System/Client Ports" screen (to enable messages to be sent to an intrusion
system via the same network link used to transfer transactions from the intrusion system to Symmetry.
Select the LAN chain definition (as defined in the "Install/Access Control/Chains/LAN" screen) that identifies the
intrusion system that you want to send messages to.
Baud Rate, Data Bits, Parity, Stop Bits
The baud rate, number of data bits, parity and number of stop bits must match the requirements of the external
equipment.
These settings are not relevant if Device is Virtual is selected (if Port is a serial connection to the intrusion
panel, the baud rate is taken from the "Install/System/Client Ports" screen).
Device is Virtual
This is displayed if the Port connects to an intrusion system and has Add Virtual Serial Device selected in the
"Install/System/Client Ports" screen.
Device is Virtual is selected and permanently grayed out to indicate that the serial device definition can be
used to send messages to an intrusion system via the same serial or network link used to transfer transactions
from the intrusion system to Symmetry.
Provide Protocol
This is displayed if the Port connects to an intrusion system and has Add Virtual Serial Device selected in the
"Install/System/Client Ports" screen.
If you select Provide Protocol, the messages you intend to send to the intrusion system do not need to be
defined (in the Install/Serial Device/Messages screen) with termination characters and other data. Refer to the
help for the "Install/System/Serial Devices/Messages" screen (click here).

Serial Messages Definition ("Install/System/Serial


Devices/Messages")

Introduction to this Screen


See Introduction to Serial Messages and Devices.

About the Options


Description
Enter a name for the serial message definition.
Company
Select the company that is to own the serial message.

229
Company Definitions ("Install/System/Companies")

Message String
Enter the ASCII text string of the serial message. You can use up to 200 characters, with each character being
an ASCII value from 00 to 255.
The Message String depends on whether Provide Protocol is selected in the "Install/System/Serial
Devices/Port Settings" screen. Selecting Provide Protocol avoids the need to provide termination characters
and other data in the message string, and is the recommended choice. When Provide Protocol is not selected,
a raw format message can be sent.

Note: Please refer to the panel distributor for details of the message strings to use.
Note: The time at the panel can be updated with the PC's time by setting Provide Protocol and sending the
message string =Clock (case is important). This command can also be applied to all panel types for testing
purposes. For DMP panels, the PC's clock must be set to a 12-hour format for this message to be recognized.

Company Definitions ("Install/System/Companies")

Introduction to this Screen


What is this screen used for?
A building may be occupied by several different companies, but only one Symmetry system needs to be used.
Use this screen to create a record for each company to be used.
A record for the company name entered during the installation process is added automatically and is also
shown in the "Symmetry button/About" screen.
When you set up devices (such as readers, monitor points and auxiliary outputs) in the Install screens, you
specify the company that the devices belong to. To make the system secure across companies, user interface
features such as pull-down lists displayed elsewhere in the system display only those devices that are assigned
to the company (or companies) being operated on. For example, when creating reader groups, only those
readers that are assigned to the currently selected company are available.
Although every device must be assigned to a specific company, shared reader groups and shared floor groups
enable readers and floors to be used by any of the other companies defined.

Note: You can create more than one company if Micronode nodes are being used, but they must all use the
same customer code, as set up using the "Setup/Configuration/Facility/Customer Codes" screen.

What needs to be done after creating a new company?


Once you have added a new company, you need to use the "Install/System/Company Groups" screen to add it
to the company group of the relevant users (including to the installer's company group). If a user has more than
one company in his/her company group, the Change Company option in the "Home/Monitoring" menu is
displayed.

Note: After changing the number of companies in a company group, users who use that company group need
to log out then back in again to see the effects of the change.

Do not forget to assign the company to the correct customer code(s) using
"Setup/Configuration/Facility/Customer Codes".
Deleting companies
If you want to delete a company, you must first "unhook" the company from the database. For example, you
need to remove the company's readers from reader groups, remove the company from company groups, etc. If
you select Delete, the system will tell you what remains to be unhooked.
Do not attempt to delete the final company; the system must always have at least one company.

230
Symmetry Software Reference Manual

About the Options


Company Name
This is the unique name of the company.
Create Default Time Codes
This option is available only when you are adding a new company. Select the option if you want the new
company to use a copy of the time code definitions ("Operation/Times/Time Codes") and/or hours definitions
("Operation/Times/Hours") from an existing company.
Use Copy From to select the company from which to copy the definitions. Select Time Codes if you want to
copy both time code and hours definitions, or Hours Only to copy only hours definitions.
The names of all time code and hours definitions copied to the new company are prefixed with the identification
number of the company the definition was copied from (for example, "1", "2", etc.).

Company Groups Screen ("Install/System/Company Groups")

General
Overview of this screen
You can use this screen to define company groups. Each company group of one or more companies. Company
groups are used in the "Maintenance/User & Preferences/Roles" screen to specify the companies that users of
a specified role have access to.
Using the Selection screen
The Selection screen is displayed when you select Company Groups from "Install/System". You can use the
Selection screen to create a new company group or to find an existing one to edit. Click here for an overview of
Selection screens and how to use them.

Screen Options
Company Group Name
This is the name of the company group.
Companies Available
This box lists all of the companies that are not yet in the company group. The same company can be assigned
to more than one company group.
Assigned Companies
This box lists the companies that are in the company group.
>>/<</Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Hardwired Chain Definitions ("Install/Access


Control/Chains/Hardwired")

Introduction to this Screen


Purpose of the screen
Use this screen to define a name for each hardwired (including bi-directional) chain, the client port with which it
will communicate and its communication parameters.

231
LAN Chain Definitions ("Install/Access Control/Chains/LAN")

Prerequisites
Before you can use this screen, you need to use the "Install/System/Client Ports" screen to set up the client
connected to the chain.

About the Options


Hardwired Chain Name
This is the unique name of the chain. Choose a name that best describes the chain, such as Main Building
Nodes.
Client Name
This is the name of the client that the chain is connected to, as defined in "Install/System/Client Ports".
Port Name
This is the client's port that the chain is connected to. In the case of bi-directional chains, the primary port is the
only port available for selection.
Enabled
Choose Enabled to allow normal communications to and from the chain.
Deselecting the option disables all server-initiated communications to the chain (such as downloading of card
data). It may be useful to disable communications while setting up a chain that has not yet been installed, as
this may prevent unwanted messages.

Note: You should not disable communications for chains that are already installed and in service, as this may
cause a mismatch between the data held in the databases and at the nodes.

Intermessage Delay Time


Each node on the chain is polled in turn. This is the time between polls. This option is not currently used.
General Message Timeout
This is the length of time that the client will wait for a response from a node after a poll message has been sent.
This option is not currently used.
Number of Retries
This is the maximum number of times that the poll message is resent if the node does not respond. Following
this number of retries, the Node Timed Out alarm/event is generated.

LAN Chain Definitions ("Install/Access Control/Chains/LAN")

Introduction to this Screen


Purpose of the screen
Use this screen to define a name for each LAN chain, the client port with which it will communicate and the
communication parameters.
Click here for details of the steps you need to take to set up a LAN chain.
About the Selection Screen
The Selection screen is displayed when you select LAN from the "Install/Access Control/Chains/LAN" screen.
You can use the Selection screen to create a new LAN chain or to find an existing one to edit. Click here for an
overview of Selection screens and how to use them.
The Options and Chain Status columns indicate the status of the communication and Enabled settings in the
definition screen.

232
Symmetry Software Reference Manual

LAN Configuration Tab


LAN Chain Name
Enter a unique name for the LAN chain. Choose a name that best describes the chain, such as North Annex.
LAN Client Name
Select the name of the client that will be used to communicate with the LAN chain, as defined in the
"Install/System/Client Ports" screen.
LAN Port Name
Select the port that will be used to communicate with the LAN chain, as defined in the "Install/System/Client
Ports" screen.
The selected client may communicate with the LAN chain via its network connection (choose COMNet,
IntercomNET, IPNet or Network as appropriate), or via one of its serial (COM) ports if it uses Commport Host
PAD. Only COM ports with an Allocation type of LANnode Chain (as set in the "Install/System/Client Ports"
screen) are listed.
LAN Interface
If you have selected Network in the LAN Port Name menu, select the type of NIC module fitted to the first
node in the chain.
Select MSS1 if the chain uses an MSS1 NIC module or external Micro Serial Server PAD.
Select CoBox/XPort if the chain uses a CoBox, NIC-3 (XPort), NIC-4 or wireless NIC-WI module.
CoBox, NIC-3 and NIC-4 modules can be used for encrypted communications.
Network Address
Each NIC module uses a unique IP address, which can be static or DHCP-assigned. If the address is DHCP-
assigned and the network also has a DNS server, Symmetry can communicate with the NIC module by name
rather than by IP address.
Specify the fixed IP address or DHCP host name (DNS name) of the NIC module. These are specified using
the NIC module configuration tool, as described in the NIC Module Configuration Guide.
Port Number
This option is displayed only if you have selected IntercomNET in the LAN Port Name menu.
Enter the intercom communications Port Number, as specified when setting up the communication settings in
AlphaPro (see the Intercom Management Installation and User Guide).
Current Password
This displays the current password (if previously set and saved).
New Password
You should associate the LAN chain with a password of up to 16 alphanumeric characters. Whenever the
selected client communicates with the LAN chain, it supplies the password to obtain access to the data held in
the nodes. This is a security measure to prevent unauthorized access to the data.
It is recommended that you specify a password, but if you leave the field blank, no password is used.
With nodes that have specific firmware (please contact your technical support representative for details), a Too
Many Login Failures alarm is generated if three or more unauthorized login attempts are made while the node
is offline. The alarm is generated when Symmetry reestablishes communications.
Time Difference
Specify the time difference between the client and remote chain. A negative time means that the time at the
chain is behind that of the client, and vice versa.
When the system adjusts the time at remote nodes, it uses the Time Difference setting to add or subtract the
correct number of hours to set the correct time at the remote nodes.

233
LAN Chain Definitions ("Install/Access Control/Chains/LAN")

Time Difference is also used to ensure that any alarms or events received from a remote site are logged with
the time at the remote site, rather than the time at the client PC. For example, if Time Difference is -01:00, one
hour is subtracted from the time of alarms/events that are received from a remote site.
Time Zone
This field is displayed only if the ShowTimeZoneCode setting is enabled in the ini file.
Enter the time zone code in which the chain is located. The time zone code will be shown against transactions
that relate to the chain, such as in reports and in the "Home/Monitoring/Alarms" screen.
The entered time zone code is saved only if Time Difference is not zero.
Encryption
This is displayed only if an Encrypted Communications license and you have System Admin privileges (as
specified in the "Maintenance/User & Preferences/Roles" screen). Use the options to select the type of
encryption required between the supervising client and the node at the head of the LAN chain.

Note: Encryption must also be set up for the client in the "Install/System/Client Ports" screen.

Choose:
 Two Fish - If a CoBox module is used for encryption.
 AES128 or AES256 (Rijndael) - If a NIC-3 (XPort) module, NIC-4 module or M2150 EN-DBU is
used. Choose AES128 if the client port uses 128-bit encryption, or AES256 if the client port uses
256-bit encryption.
Options
Choose one of the following options:
 Continuous - The client will continuously poll the chain. If there are two or more continuously-polled
chains or other devices communicating with the same network port on a client, each is polled in
turn.
 Periodic - The client contacts the chain only when there is data to download (such as new card
data) and at the times specified in the Periodic Contact tab. The Period Contact tab is displayed
only when Periodic is selected.
The chain always initiates communications with the client immediately on detection of an alarm condition.
Events are uploaded only when the client initiates communications.
 Fallback - Select this option if the LAN chain is to use a modem at the node for fall-back
communications in the event that the standard network connection is lost. Selecting this option
displays the Fallback tab.
 Secondary - Select this option if the node at the head of the LAN chain contain two NIC4 modules.
The secondary NIC module is used if the network connection to the primary fails. Each NIC
module uses a separate IP address, but only one LAN chain needs to be defined. The LAN
Configuration tab specifies the IP address for the primary NIC module. A Secondary Connection
tab is displayed, which enables you to specify the IP address of the secondary NIC module.
Continuous polling must be used if dual NIC4 communications is required.
Anti-Passback Mode
Select:
 None if you do not want nodes on the LAN chain to be included in a global zonal antipassback
scheme. Selecting None does not stop the nodes from being used for a chain-level or node-level
antipassback scheme, as set up in the "Install/Access Control/Node" Screen.
 Zonal (Global Client) if you want nodes on the chain to be able to be used in an antipassback
scheme that can include nodes from other LAN chains communicating with the same LAN Client
Name.

234
Symmetry Software Reference Manual

 Zonal (Global System) if you want nodes on the chain to be able to be used in an antipassback
scheme that can include nodes from any other LAN chain in Symmetry.
If you select Zonal (Global Client) or Zonal (Global System), you must also select Zonal (Chain) in the
"Install/Access Control/Node" screen for any LAN node that is to be included in the global antipassback
scheme.
Each LAN Client Name can have a maximum of 16 LAN chains defined with zonal antipassback.
You must select the Continuous polling option to be able to select Zonal (Global Client) or Zonal (Global
System).
Click here for an overview of antipassback.
Enabled
Choose Enabled to allow normal communications to and from the chain.
Deselecting the option disables all server-initiated communications to the chain (such as downloading of card
data). It may be useful to disable communications while setting up a chain that has not yet been installed, as
this may prevent unwanted messages.

Note: You should not disable communications for chains that are already installed and in service, as this may
cause a mismatch between the data held in the databases and at the nodes.

Fallback Tab
Setting Up Fallback
To set up fall-back communications for a node LAN chain, you also need to:
1. Set up the information in the Fallback tab of the "Install/Access Control/Chains/LAN" screen.
2. Use the "Install/System/Client Ports" screen to create a port for a secondary dial-in chain.
3. Create a new record in the "Install/Access Control/Chains/Dial-Up" screen, and set the following options:
 Client Name - Select the name of the client that is connected to the secondary dial-in port.
 Port Name - Select the secondary dial-in port.
 Host Initialization String - Select the modem type being used at the client, or enter the
initialization string if a different modem is being used.
Host Phone Number
This specifies the telephone number of the modem at the client.
Remote Phone Type
This specifies whether the LAN chain's modem uses pulse or tone dialing.
Remote Initialization String
Select the type of modem connected to the LAN chain. This automatically selects the appropriate initialization
string. Alternatively, enter the required initialization string if a different modem is being used (refer to the
modem manual).

Periodic Contact Tab


Call Time and Recall Interval
Call At (Call Time) specifies the time at which the client automatically calls the chain for the first time in each
day. If more than one automatic call is required, specify the period between automatic calls in Recall Interval.
Note that there may be significant delays in contacting sites if there are many chains to contact at the same
time.
The client also calls the chain immediately when there are any important and relevant changes to the system
databases, such as to download card data. Likewise, the chain calls the client immediately when alarms are
generated (but not events).

235
Dial-Up Chain Definitions ("Install/Access Control/Chains/Dial-Up")

Number of Retries and Delay Between Retries


This specifies the maximum number of times that the client tries to establish communications with the chain
following an unsuccessful attempt. If a delay between retries is required, specify the value in Delay Between
(Retries).
The setting is relevant only for client-initiated calls. Symmetry uses a default setting for communications to the
client.
Wait for Answer
This specifies the length of time that the client waits for a communications link to be established with the chain.
If this time is exceeded, the client "hangs up".
The setting is relevant only for client-initiated calls. Symmetry uses a default setting for communications to the
client.
Max Connect Time
This is the maximum length of connect time for a call (set to zero for no maximum). If this maximum is
exceeded, the call is terminated. This enables the termination of a connection that has not been terminated
normally.

Secondary Connection Tab


Use DHCP to obtain IP Address
You can allow a DHCP server to assign an IP address automatically to the secondary NIC module in the node
at the head of the LAN chain. The NIC module must contain firmware version 6.1.0.2 or later.
Use DHCP Name to specify the network name of the NIC module. The network name must also be specified
when setting up the NIC module using the configuration tool, as described in the NIC Module Configuration
Guide.
Use static IP Address
Select this option to specify a fixed IP address for the secondary NIC module.
The IP address should have been obtained from the network manager and programmed into the NIC module or
PAD using the NIC module configuration utility, as described in the NIC Module Configuration Guide.
Each device on the same network must have a unique IP Address.

Dial-Up Chain Definitions ("Install/Access Control/Chains/Dial-Up")

Introduction to this Screen


Purpose of the screen
Use this screen to define a name for each dial-up chain, the client port with which it will communicate and the
communication parameters.
You can also use this screen to specify the initialization string for a modem connected to a client's secondary
dial-in port (by selecting a secondary dial-in Port Name).
Prerequisites
Before you can use this screen, you need to use the "Install/System/Client Ports" screen to set up the client
connected to the chain.
Using Secondary Dial-In Ports
If you want the remote chain's modem to communicate with a different modem (that is, not the modem that is
used to call the remote site):
1. Specify the client modem's telephone number that will be called by the remote site in Host Phone Number.
2. Complete the other parameters.

236
Symmetry Software Reference Manual

3. Create another dial-up chain record making sure that you select the appropriate secondary dial-in Port
Name as defined in "Install/System/Client Ports". All of the fields will be grayed out except Host
Initialization String, in which you define the type of secondary dial-in modem connected to the client, or
its initialization string.

About the Options


Dial-Up Chain Name
This is the unique name of the remote chain. Choose a name that best describes the chain, such as High St
Annex.
Client Name
This is the name of the client that calls the remote dial-up chain, as defined in the "Install/System/Client Ports"
screen.
Port Name
This is the COM port on the client that calls the remote dial-up chain. The same port can communicate with
more than one remote dial-up chain.
Log Off Delay (secs)
When a client has finished communicating with a remote site that has dialed in, it waits for the specified period
of time before logging off.
Using a value other than 0 is particularly useful if an alarm command is to be issued when acknowledging an
alarm from the remote site, since it enables the command to be sent in the same telephone call that the alarm
is received.
An application example is when a person at a remote site requests entrance using a call-request button, which
generates a monitor-point alarm. When the alarm is acknowledged, a Grant Access command can be sent in
the same telephone call if Log Off Delay is set to an appropriate value. This enables the caller to gain access
more quickly.
Host Phone
The Number is the telephone number that the remote chain uses to call the client. Type specifies whether the
remote chain's modem uses pulse or tone dialing.
Remote Phone
The Number is the telephone number that the client uses to call the remote chain. Type specifies whether the
client's modem uses pulse or tone dialing.
Contact Period (Call At and Recall Interval)
Call At (Call Time) specifies the time at which the client automatically calls the chain for the first time in each
day. If more than one automatic call is required, specify the period between automatic calls in Recall Interval.
Note that there may be significant delays in contacting sites if there are many chains to contact at the same
time.
The client also calls the chain immediately when there are any important and relevant changes to the system
databases, such as to download card data. Likewise, the chain calls the client immediately when alarms are
generated (but not events).
Retries (Number and Delay Between)
This specifies the maximum number of times that the client tries to establish communications with the chain
following an unsuccessful attempt. If a delay between retries is required, specify the value in Delay Between
(Retries).
The setting is relevant only for client-initiated calls. Symmetry uses a default setting for communications to the
client.

237
Dial-Up Chain Definitions ("Install/Access Control/Chains/Dial-Up")

Wait for Answer


This specifies the length of time that the client waits for a communications link to be established with the chain.
If this time is exceeded, the client "hangs up".
The setting is relevant only for client-initiated calls. Symmetry uses a default setting for communications to the
client.
Max Connect Time
This is the maximum length of connect time for a call (set to zero for no maximum). If this maximum is
exceeded, the call is terminated. This enables the termination of a connection that has not been terminated
normally.
Password: Current/New
This is the password the client supplies to the remote chain to establish communications. If the password is
invalid, the remote chain does not allow any data transfer. If you want to change the password, type it in the
New field; this becomes the Current password when you select OK. If the password is blank, the system
assumes that no password is required.
Host Initialization String
Select the type of modem connected to the port named in Port Name. This automatically selects the
appropriate initialization string. Alternatively, enter the required initialization string if a different modem is being
used (refer to the modem manual).
Note that if the remote modem is going to call a secondary dial-in port, the Port Name will not correspond to
the secondary dial-in port being called. In this case, you need to create a new Dial-Up Chain record, select the
appropriate secondary dial-in Port Name and specify the modem/initialization string there.
Remote Initialization String
Select the type of modem connected to the remote chain. This automatically selects the appropriate
initialization string. Alternatively, enter the required initialization string if a different modem is being used (refer
to the modem manual).
Enabled
Choose Enabled to allow normal communications to and from the chain.
Deselecting the option disables all server-initiated communications to the chain (such as downloading of card
data). It may be useful to disable communications while setting up a chain that has not yet been installed, as
this may prevent unwanted messages.

Note: You should not disable communications for chains that are already installed and in service, as this may
cause a mismatch between the data held in the databases and at the nodes.

Time Difference
Specify the time difference between the client and remote chain. A negative time means that the time at the
chain is behind that of the client, and vice versa.
When the system adjusts the time at remote nodes, it uses the Time Difference setting to add or subtract the
correct number of hours to set the correct time at the remote nodes.
Time Difference is also used to ensure that any alarms or events received from a remote site are logged with
the time at the remote site, rather than the time at the client PC. For example, if Time Difference is -01:00, one
hour is subtracted from the time of alarms/events that are received from a remote site.
Time Zone
This field is displayed only if the ShowTimeZoneCode setting is enabled in the ini file.
Enter the time zone code in which the chain is located. The time zone code will be shown against transactions
that relate to the chain, such as in reports and in the "Home/Monitoring/Alarms" screen.
The entered time zone code is saved only if Time Difference is not zero.

238
Symmetry Software Reference Manual

Dial-Out Alarm Definitions ("Install/Access Control/Chains/Dial-Out


Alarm")

Introduction to this Screen


Purpose of the screen
Use this screen if you want alarms to be copied to another independent Symmetry system.

Note: Only one Dial-Out Alarms record is allowed per system.

Before you can use this screen, you need to use the "Install/System/Client Ports" screen to set up a port to be
used for dial-out alarms reporting.
Click here for an overview of dial-out/dial-in alarms reporting.

About the Options


Dial-Out Site Name
Enter a unique name for the dial-out site.
Dial-Out Client Name
Select the name of the client at the dial-out site that is to copy alarms to the alarms-receiving site. Only those
clients that have a Dial-Out Alarms Reporting port set up in the "Install/System/Client Ports" screen are
included in the pull-down list.
Dial-Out Port Name
Select the COM port that is to be used to send alarms to the alarms-receiving site.
Send Alarms to Phone No.:
Enter the telephone number that the dial-out client must use to call the alarms-receiving site.
Type (Tone/Pulse)
Specify whether the modem uses pulse or tone dialing.
This Site's ID Ref No.:
Specify the site's reference number. The reference number must be the same as defined in the "Install/Access
Control/Chains/Dial-In Alarm" screen at the alarms-receiving site. The alarms-receiving site will not allow
communications if the reference number is incorrect.
Retries (Number and Delay Between)
This specifies the maximum number of times that the client can try to establish communications with the
alarms-receiving site following an unsuccessful attempt.
If a delay between retries is required, specify the value in Delay Between (Retries).
Wait for Answer
This specifies the length of time that the dial-out client waits for a communications link to be established with
the alarms-receiving site. If this time is exceeded, the client "hangs up".
Max Connect Time
This is the maximum length of connect time for a call (set to zero for no maximum). If this maximum is
exceeded, the call is terminated. This enables the termination of a connection that has not been terminated
normally.

239
Dial-In Alarm Definitions ("Install/Access Control/Chains/Dial-In Alarm")

Password
Specify the password the dial-out site must supply to the alarms-receiving site to establish communications.
The password must be the same as defined in the "Install/Access Control/Chains/Dial-In Alarm" screen at the
alarms-receiving site. The alarms-receiving site will not allow communications if the password is incorrect.
Initialization String
Select the type of modem connected to the port named in Dial-Out Port Name. This automatically selects the
appropriate initialization string. Alternatively, enter the required initialization string if a different modem is being
used (refer to the modem manual).
Enabled/Disabled
Choose Enabled to allow normal communications to the alarms-receiving site.
Selecting Disabled disables all communications to the alarms-receiving site. It may be useful to select
Disabled while setting up the system, as this will prevent unwanted communications.

Dial-In Alarm Definitions ("Install/Access Control/Chains/Dial-In


Alarm")

Introduction to this Screen


Purpose of this screen
Use this screen if you want Symmetry to be able to receive alarms from a separate Symmetry system.
Before you can use this screen, you need to use the "Install/System/Client Ports" screen to set up a port to
receive the alarms.
Click here for an overview of dial-out/dial-in alarms reporting.

About the Options


Dial-In Site Name
Enter a unique name for the alarms-receiving (dial-in) site.
Dial-In Client Name
Select the name of the client at the dial-in site that is to receive the alarms. Only those clients that have a Dial-
In Alarms Reporting port set up in the "Install/System/Client Ports" screen are included in the pull-down list.
Dial-In Port Name
Select the COM port that is to be used to receive alarms.
This Site's ID Ref No.:
Specify the reference number of the alarms-receiving site.
The reference number must be the same as defined in the "Install/Access Control/Chains/Dial-Out Alarm"
screen at the dial-out site. The alarms-receiving site will not allow communications if the dial-out site sends an
incorrect reference number.
Password
Use this field to specify the password of the dial-in site. The dial-out site must supply the correct password to
establish communications with the dial-in site.
Initialization String
Select the type of modem connected to the port named in Dial-In Port Name. This automatically selects the
appropriate initialization string. Alternatively, enter the required initialization string if a different modem is being
used (refer to the modem manual).

240
Symmetry Software Reference Manual

Enabled/Disabled
Choose Enabled to allow normal communications with the dial-out site.
Selecting Disabled prevents communications from taking place with the dial-out site.

Node Definitions ("Install/Access Control/Node")

Introduction to this Screen


Purpose of the Screen
Use this screen to set up and name each node used. The default settings are defined in the
"Install/System/Default Settings/Node" screen.

Note: Some options documented in this help topic may not be available, depending on the node type you are
configuring.

About the Selection Screen


The Selection screen is displayed when you select Node from the "Install/Access Control/Node" screen. You
can use the Selection screen to create a new node or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
The Selection screen includes a Chain Status column, which indicates:
 For nodes that use a chain defined in the "Install/Access Control/Chains" screen, the status of the
Enabled setting in the chain definition screen.
 For EN or other nodes that do not use a chain defined in the "Install/Access Control/Chains" screen,
the status of the Enabled setting in the Communications tab of the node definition screen.

Note: You need to close and reopen the Selection screen to see any change of chain status.

Prerequisites
The chain on which the node is located must have been set up using the Hardwired, LAN or Dial-Up option in
the "Install/Access Control/Chains" menu.
This is not required for an EN or M4000 nodes.
Node Description
A unique name for this node.
Location
Click here for information about this option.
Category
Click here for information about this option.
Account Number
Click here for information about this option.
Area Number
Click here for information about this option.
Zone Number
Click here for information about this option.

241
Node Definitions ("Install/Access Control/Node")

Tabs
Setup Tab
Chain Name
This specifies the chain that the node is to be connected to.
Chain name for EN and M4000 nodes
You do not specify a chain name for EN or M4000 nodes. To add a new EN or M4000 node, select
<New> and choose the node from the Node Type menu.
Chain name for ASSA ABLOY DSR nodes
To add an ASSA ABLOY Door Service Router (DSR), select <New> and choose Assa Abloy DSR
from the Node Type menu.
Please refer to the Third-Party Access Devices Configuration and User Guide for an introduction to
the integration with ASSA ABLOY DSR locks.
Chain name for SR-Series nodes
For SR-Series nodes, you can select:
 The <New> option to create a new chain for a network-attached node. The new chain
will be named the same as Node Description. Once you have selected the Node
Type, you can use the Discover button to discover this first node on the chain (the
node connected to the network). Note: A chain created in this way is not available in
the "Install/Access Control/Chains/LAN" screen.
 An existing chain previously created using <New>.
 An existing hardwired or dial-up chain.
Note: Deleting the first node on an SR-Series chain created using <New> makes the node with the
lowest address the first node, and the chain is renamed accordingly.
By default, Chain Name and Node Address are grayed out if you have opened an existing node. This can
be changed using a setting in multimax.ini.
Node Type

Note: Your system may not show all of the following, or may show earlier node types.

Assa Abloy DSR


This is an ASSA ABLOY Door Service Router and is available only if you have the "ASSA ABLOY
DSR Lock" license installed.
Please refer to the Third-Party Access Devices Configuration and User Guide for further information.
EN-LDBU
This option is available only if a "Disconnected Doors" license is installed. An EN-LDBU is a
Symmetry node that enables the Assa Abloy Aperio range of wireless locks to be integrated into the
Symmetry System. The node is based on the same hardware an EN-DBU, but contains special
firmware to enable the integration.
An on-board network port enables communication with the Symmetry software. The DC Comms port
is used to communicate with Aperio hubs.
The node can be set up in this screen without the need for a client port and chain to be set up
previously.
For further information, please refer to the Aperio Locks Configuration and User Guide.
EN-1DBC
This is a one-door controller with built-in database unit. The device has an integrated network port
and the ability to be powered over Ethernet (PoE).

242
Symmetry Software Reference Manual

The node can be set up in this screen without the need for a client port and chain to be set up
previously.
EN-2DBC
This is a two-door controller with built-in database unit. The device provides:
 An integrated network port.
 The ability to be used as an M2150 intrusion node.
 The ability to be powered over Ethernet (PoE).
 Support for version 3 of the Simple Network Management Protocol (SNMP). This
allows status monitoring by third-party network applications.
The node can be set up in this screen without the need for a client port and chain to be set up
previously.
Multinode-2
A standard multiNODE-2 using through-hole or the later surface-mount boards. (Note for installers
who are used to installing pre-MultiNODE-2 nodes: this option removes any link between reader
alarms and auxiliary outputs.)
Multinode-2 Alarm Panel
A multiNODE-2 automatically configured to enable monitor points and auxiliary outputs to be set up
for the arming and disarming of alarm panels. The arming and disarming are actioned through the
use of card commands. Refer to Customer Support for further details.
Multinode-2-Alarm Relays
A multiNODE-2 automatically configured to emulate a Micronode, where the auxiliary outputs on the
I/O module have a fixed purpose (aux output 1 = x relay, aux output 2 = Reader A alarm, aux output
3 = y relay, aux output 4 = Reader B alarm).
Multinode-2 Card Relays
A multiNODE-2 automatically configured to enable the node's auxiliary outputs to be grouped into
output groups and switched on when a card is granted access from the reader nominated as the
Card Relays Reader in the "Install/Access Control/Reader" screen.
For further information, see Overview of Output Groups and Card-Relay Nodes.
Multinode-2 Elevator
This node is based on the multiNODE-2 hardware but contains other elevator interface boards. If
selected, only one reader can be used with the node (reader 1; the elevator reader). The auxiliary
outputs can be grouped into floor groups, which specify the floor-selection buttons that are enabled
on the elevator control panel when a card is granted access. The node's monitor points can be used
to monitor the floor-selection buttons pressed on the elevator control panel. Up to 32 access-
controlled floors can be used.
Multinode-2 with ACR
Select this node type if the node is a multiNODE-2 used in conjunction with a remote alarm
controller.
Multinode-2+ node types
This is functionally the same as the Multinode-2 node type, but offers built-in mains failure and
tamper reporting without the need to use I/O-module monitor points. Three models are available,
each giving a different maximum card capacity. The card capacity of the multiNODE-2000 being
used must be selected in Cards/Transactions.
multiNODE-2000 Alarm Mode
This configures a multiNODE-2000 node to give the same functions as theMultinode-2 Alarm Panel
node type.

243
Node Definitions ("Install/Access Control/Node")

multiNODE-2000 Alarm Relays Mode


This configures a multiNODE-2000 node to give the same functions as the Multinode-2 Alarm
Relays node type.
multiNODE-2000 Card Relays Mode
This configures a multiNODE-2000 node to give the same functions as theMultinode-2 Card
Relaysnode type.
multiNODE-2000 Elevator Node
This node, which is based on the multiNODE-2000 hardware but contains other elevator interface
boards, offers the same functions as theMultinode-2 Elevator node type, but allows up to 64
access-controlled floors to be used.
multiNODE-2000 (M2000-8)
These are functionally the same as the equivalent multiNODE-2 node types, but provide a fixed
50,000 card limit (the multiNODE-2 card limits are programmable in the "Install/Access
Control/Node" screen).
multiNODE-2000 HGU Node
This is a multiNODE-2000 node with firmware that supports connection to Biometric Hand Geometry
Unit (HGU) readers.
See Overview of Biometric Hand Templates and HGUs.
multiNODE-2100 Elevator Node
This is a multiNODE-2100 (M2100) node that contains special firmware and elevator interface
boards for control of elevator systems. The node supports 32 floors, or 64 floors with the addition of
an extender (slave) unit. The node also supports up to four elevator cabs, each having its own
access control reader. No door or alarm control units can be fitted to an M2100 elevator node.
The node's auxiliary outputs can be grouped into floor groups, which specify the floor-selection
buttons that are enabled on the elevator control panel when a card is granted access.
Note: Please refer to the help for Auxiliary Output Number ("Install/Access Control/Auxiliary
Output" screen) and Number of Cabs ("Install/Access Control/Node") for information about which
auxiliary outputs are used for which floors and cabs.
For further details of the M2100 Elevator Node, please refer to the M2100 Engineering Guide and
installation instructions.
multiNODE-2100 HGU Node
This is a multiNODE-2100 node with firmware that supports connection to Biometric Hand Geometry
Unit (HGU) readers.
See Overview of Biometric Hand Templates and HGUs.
multiNODE 2100 / 2150 Series DBU
An M2100/M2150 node consisting of a configurable number of controllers, with mains failure and
tamper reporting. This node type uses the DBU database unit and is fully described in the M2100
Engineering Guide or M2150 Design Guide.
The card and transaction capacity of the database unit must be selected in Cards/Transactions.
M2100 and M2150 nodes can use alarm/output controllers, as well as door controllers.
You must configure the controllers used by the node in the Door & I/O Controllers tab.
multiNODE-2150 Series 8DBC/2DBC/4DBC
These are M2150 nodes that contain a database unit and door controller. Please refer to the M2150
Design Guide.
The card and transaction capacity of the multiNODE-2150 being used must be selected in
Cards/Transactions.

244
Symmetry Software Reference Manual

M2150 nodes can use alarm and output controllers, as well as door controllers.
After selecting this node type, you must configure the controllers used by the node in the Door & I/O
Controllers tab.
M1100, M1200 and M1400
These node types are collectively known as multiNODE-1000 (M1000). The M1100 and M1200 are
available only with the Business Edition version of the Symmetry software. The M1400 is available
only with Professional Edition and above.
A license is required for each reader connected to M1100 and M1200 nodes. If fully licensed, the
Symmetry software allows up to 16 readers connected to M1100 nodes to be defined, and up to 64
readers connected to M1200 nodes to be defined. There is no system maximum for readers
connected to an M1400.
The M1100 supports up to 1000 card holders and/or visitors, the M1200 supports up to 2000, and
the M1400 supports up to 4000. Two-reader and four-reader variants of each type are available.
No other node types can exist on the same chain as a M1100/M1200/M1400. A mixture of 1100,
1200 and 1400 nodes are not allowed on the same chain.
M2150 EN-DBU
An M2150 node with an on-board network port, configurable number of controllers, mains failure and
tamper reporting.
The node can be set up in this screen without the need for a client port and chain to be set up
previously.
The card and transaction capacity of the database unit must be selected in Cards/Transactions.
M2150 nodes can use alarm/output controllers, as well as door controllers.
You must configure the controllers used by the node in the Door & I/O Controllers tab.
M4000
M4000 is an intelligent next-generation node for Symmetry access-control systems. The node offers
enhanced flexibility over the way the hardware is configured, a local database that is able to support
up to 1 million card holders and 65,000 offline transactions, and a 1Gbit network interface with AES
encryption.
M4000 includes a built-in web interface, which is used to specify and configure all hardware in the
node. For example, the web interface is used to specify:
 The number of door-entry and input/output controllers being used.
 The number and type of readers being used.
 The number and purpose of each input and output. M4000 does not have dedicated
reader and door ports; instead, each input and output is configurable.
 The supervision level being used for each input.
When you add a new M4000 node in Symmetry, the system automatically uploads all readers,
monitor points and auxiliary outputs configured in the web interface, and adds these items to the
relevant screens in the Symmetry software. With M4000, you cannot create new readers, monitor
points, etc. in Symmetry - this must be carried out using the web interface.
You can add a new M4000 node without the need to define a client port and chain first.
After selecting M4000 from the Node Type menu, click Discover to discover the device on the
network.
For full information about how to plan, install and configure an M4000 system, please refer to the
M4000 Commissioning Guide.
Address and Callback Port
These fields are displayed only if you have selected Assa Abloy DSR from the Node Type menu.
In Address, enter the URL that Symmetry should use to communicate with the DSR. This should include
the port number (e.g. http://10.0.0.55:8080).

245
Node Definitions ("Install/Access Control/Node")

In Callback Port, enter the address and port number that the DSR should use to send events to
Symmetry. This is in the format:
http(s)://Symmetry_Server_IP_Address:Port
For example, https://10.0.0.66:9090
Please refer to the Third-Party Access Devices Configuration and User Guide for further information.
Node Address
This is the node address on the chain. Addresses that are already used in a chain are not displayed in the
pull-down list.
Each entry in the list may show an address outside brackets, followed by an address inside brackets. Any
addresses shown in brackets relate to the old addressing scheme (1 to 249). Addresses shown outside the
brackets relate to the latest addressing scheme, which uses addresses in the range 1 to 32.
Note: This information is not required if you are defining an M2150 EN-DBU, EN-1DBC, EN-2DBC, EN-
LDBU or M4000. These devices do not support multiple nodes on the same chain.
By default, Chain Name and Node Address are grayed out if you have opened an existing node. This can
be changed using a setting in multimax.ini.
Cards / Transactions
This specifies the amount of memory in the node that is to be reserved for card details. If you specify a
higher limit for the maximum number of cards, the amount of memory available for logging historical
information is reduced. For example, 7,000/4.3K means that with an area of memory reserved for 7,000
cards, the maximum number of stored events and alarms is 4,300.
For multiNODE-2 nodes, the pull-down menu includes different choices for nodes fitted with extended,
rather than standard, memory - make sure you choose the correct setting.
If the node type selected is a multiNODE-2000 or multiNODE-2100, the Cards/Transactions setting you
choose must correspond to the model variant purchased.
Wiegand Format
This lists all Wiegand card formats, as defined in the "Install/System/Default Settings/Reader/Card formats"
screen. The format you choose determines the format used by all readers connected to the node that have
"Default Wiegand" (for example, Series 600/700/800 using Default Wiegand) in the name of the Reader
Type, as specified in the "Install/Access Control/Reader" screen.
Video Server Connection
Not used.
Number of Cabs
This is displayed only for an M2100 elevator node.
Select the number of cabs the elevator node is to control (one reader per cab).
 If you select one cab, auxiliary outputs 1 to 64 are available to control floors 1 to 64.
 If you select two cabs, auxiliary outputs 1 to 16 are for the first 16 access-controlled floors
for cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the first 16 access-controlled floors for
cab 2 (reader 2). Auxiliary outputs 33 to 48 are for the last 16 access-controlled floors for
cab 1 (reader 1). Auxiliary outputs 49 to 64 are for the last 16 access-controlled floors for
cab 2 (reader 2).
 If you select four cabs, auxiliary outputs 1 to 16 are for the 16 access-controlled floors for
cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the 16 access-controlled floors for cab 2
(reader 2). Auxiliary outputs 33 to 48 are for the 16 access-controlled floors for cab 3 (reader
3). Auxiliary outputs 49 to 64 are for the 16 access-controlled floors for cab 4 (reader 4).
Options:

246
Symmetry Software Reference Manual

Allow local arming when node is offline


This option is available if Supports Intrusion Functionality is selected. The option Check node is
online before arming must also be selected.
Selecting this option allows a card holder at an intrusion reader to arm an area, irrespective of
whether the node is online or offline. If the option is not selected, the node must be online to arm an
area.
The node is considered offline if the Symmetry software has not been able to communicate with it
within the last minute.
Allow local change to scheduled arming time
If this option is set, card holders will be able to change the time of the next auto-arm at M2150
arming/disarming readers connected to this node. All subsequent auto-arms will occur at the
scheduled time (unless changed again).
Note: Card holders also need area access rights to change the auto-arm time of an area.

Allow local Zone Bypass using Reader


This option is available if Supports Intrusion Functionality is selected.
Selecting this option allows a card holder to bypass a zone that is an alarm state. To bypass a zone,
the zone must belong to an area that is in the card holder's access rights.
Check node is online before arming
This option is available if Supports Intrusion Functionality is selected.
Selecting this option causes the Symmetry software to check the online/offline status of the node
when an area is armed. This status is used by Allow local arming when node is offline to
determine whether a card holder can arm an area if the node is offline.
The node is considered offline if the Symmetry software has not been able to communicate with it
within the last minute.
Enable Learn Mode During Card Download
A person may use a card at one of the node's readers while a card download is taking place. In this
situation, it is possible that the node may not yet have the card's details. Selecting this option
enables the card's details to be downloaded ahead of all others that are waiting.
Node Supports 10 Digit PIN Functionality
This option is available only for certain node types and only when Allow 10 Digit PIN Codes is set
in the "Maintenance/User & Preferences/System Preferences" screen.
You should set this option for any node that supports 10-digit PINs.
See "About 10-Digit PIN Codes" for further information.
Advanced Toggle Mode Available
If selected, readers that are connected to the node can use advanced toggle mode. If the option is
not selected, the readers can use standard toggle mode.
About toggle mode
Node Supports Card Usage Remaining
Select this option if the node has firmware that supports the tracking of limited-use cards.
Usage Remainingin the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen can
specify that a card can be used a limited number of times. WithNode Supports Card Usage
Remainingselected, the node blocks usage of a card until the Symmetry software decides whether
or not the limit has been exceeded and whether to grant access. If the option is not selected, it may
be possible to use the card rapidly in succession to exceed the limit while the Symmetry software
makes the decision.

247
Node Definitions ("Install/Access Control/Node")

The option provides a more secure method of tracking card usage.


Selecting the option ungraysCard Usage, which specifies the maximum time the node must wait for
a decision from the Symmetry software. If a response is not received within this period of time,
access is denied.
Node Supports Disabling of Door Alarms
Select this option only if you are sure that the node contains firmware that supports this feature.
Selecting this option allows scheduled commands to be set up in the
"Operation/Commands/Scheduled" screen to disable or enable door alarms, and allows the
command to be executed at the node that controls the reader. For further information, please see
"Disabling or Enabling Door Alarms".
Node Supports Extended Card Watch
This is a customer-specific option and is not used in the current version of firmware.
Node Supports Extended Trigger Commands
Select this option if the node has firmware that supports additional alarm/event message types in the
IF part of a trigger command (Anti-Passback Hard, Anti-Passback Soft, At Wrong Door, At Wrong
Time, Card Expired, Cardwatch, Door Not Opened, Granted Access, Inactive, Lost Card, Not Yet
Valid, Unknown Card, Wrong PIN and User Code Lockout.)
See Alarm/Event Messages for details of each message.
Node Supports User Initiated Door Times / PIN Changes
Selecting this option enables additional Command Mode options to be made available in the
"Install/Access Control/Reader" screen for S6xx or later readers connected to this node.
The additional options added are User Initiated PIN and User Initiated Door Time, which enable
command-card holders to change their PIN or override the default door open time from the keypad
of the reader.
You do not need to select Node Supports User Initiated Door Times / PIN Changes if readers
connected to the node are to be used to issue conventional Card Command alarms/events.
For further information, see About Card Commands.
Set Customer Code Only if Downloading
A card can be used at one of the node's readers while a card download is taking place. Selecting
this option sets all readers at the node into "customer code only" mode prior a download, thereby
allowing a card that has not yet been downloaded to be used. At the end of the download, the
readers are returned back to how they are configured in the database (which may be different from
how they were prior to the download).
The option is displayed only if a Micronode node type has been selected.
Customer code only mode allows access to any card that has a customer code that is the same as
one of the customer codes stored in the node. The customer codes stored in a node are dependent
on the person's access rights: a node stores all customer codes assigned those people who are able
to use one of the node's readers. A person's customer code is specified in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.
In situations where the customer code cannot be provided from the card, customer code only mode
gives only superficial protection; for example, a proximity card that has no customer code is
accepted provided that the card number is within the current card-block range.
Supports Intrusion Functionality
This option is displayed for some node types, such as the M2150 8DBC and EN-2DBC. Select this
option if you require the node to be used as part of an M2150 intrusion system.
This setting is available if an intrusion license is installed, and is relevant only for M2150 intrusion
systems.

248
Symmetry Software Reference Manual

Anti-Passback Mode
Specifies the antipassback mode for the node. This is not displayed if the Node Type is an elevator node.

Note: You must also specify the readers to be used for antipassback in the "Install/Access
Control/Reader" screen.

See Overview of Antipassback for further information.


Disabled
Select Disabled if you do not want the node to be used for antipassback.
Zonal (Local)
This option is available if the node has connections that enable it to be chained.
Select Zonal (Local) if you want only readers connected to the node you are defining to be able to
be used in the same zonal antipassback scheme.
It is not possible to have a mix of Zonal (Chain) and Zonal (Local) settings for the same chain.
Therefore, if you select Zonal (Chain), all subsequent node definitions for that chain will not provide
the Zonal (Local) option, and vice versa.
Zonal (Chain)
This option is available if the node has connections that enable it to be chained.
Select Zonal (Chain) if you want readers connected to the node to be in the same zonal
antipassback scheme as readers attached to nodes in the same chain.
If a network is used to communicate with nodes, you can extend the scheme to enable the node to
be included in the same antipassback scheme as nodes in other chains by using Zonal (Chain) and
either Zonal (Global Client) or Zonal (Global System) in the Communications tab or
"Install/Access Control/Chains/LAN" screen, as appropriate.
This option is not available for nodes on dial-up chains (to prevent excessive modem
communications traffic).
Zonal
This option is available if the node does not have connections that enable it to be chained.
If more than one reader can be connected to the node, Zonal allows readers connected to the node
to be used in the same zonal antipassback scheme.
You can extend the scheme to enable the node to be included in the same antipassback scheme as
nodes in other chains by selecting Zonal and either Zonal (Global Client) or Zonal (Global
System) in the Communications tab.
Timed
Select Timed if you want to set up a timed antipassback scheme for the node. A timed antipassback
scheme cannot include readers connected to different nodes; each timed antipassback node creates
a separate scheme.
Learn Mode (Wait Time)
Specifies the length of time that the node waits for details of a card from the client. During the wait time, a
standard Symmetry reader alternately flashes its red and green LEDs. If the client does not reply within
this length of time, the card is not given access. A time of 0 disables learn mode on the node.
If you switch learn mode on or off following the commissioning of the system, then for each node modified,
the card database should be downloaded to it for completeness and synchronization. This is NOT
synchronized automatically.
What is learn mode?
In learn mode, the client gives the node details of a new card (as set up in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen) only when the card is used at one of the node's readers.

249
Node Definitions ("Install/Access Control/Node")

In addition, if the node's card memory becomes full, the details of the least-recently-used card are
removed from the node. If the card is used again, the details have to be relearnt.
Learn mode maximizes the efficient use of memory in the nodes, but causes a slight delay while the
node learns the details. On suitable readers, the green and red lights flash alternately while the node
learns the details.
Symmetry services must be running at the server to enable a card to be learnt (this will be the case if
Symmetry has been installed and set up correctly). In addition, the Symmetry software must be
running at the client that is communicating with the chain.
Card Usage (Wait Time)
This option is available only if Node Supports Card Usage Remaining has been selected. Use the field to
specify the length of time the node must wait for an access-control decision from the Symmetry software.
Entry/Exit Delay
This option is available if Supports Intrusion Functionality is selected.
The option determines the length of time allowed for a card holder to:
 Pass through the entry/exit route after arming an area. An alarm is generated if the card
holder triggers an entry/exit route sensor after the specified time period has expired.
 Disarm an area after triggering a sensor in the entry/exit route. An alarm is generated if the
card holder fails to disarm the area within the specified time period.
PC Door Control
This specifies the maximum period of time that a guard can take in the "Home/Identity/Verification" screen
to decide whether to grant or deny access to a transaction from a reader that is in PC door control mode.
See PC Door Control for further information.
Disable Reader Time
This option is not currently supported. It will be used to provide support for BIXI RS485 readers.
Floor Selection Options
This is displayed if the Node Type is an elevator node.
Disabled means that the node is not connected to the elevator control panel to recognize when a floor-
selection button is pressed. When a card is used at the reader, another card cannot be used until the Time
To Select A Floor ("Install/Access Control/Reader" screen) has elapsed; this is to give time for a button to
be pressed.
Common means that the node has one of the inputs to the Elevator Interface Module (such as the input
for the pair of connections Button Row 0, and Common 0) connected to the elevator control panel to
recognize when a floor-selection button is pressed. When a card is used at the reader, another card
cannot be used until the Time To Select A Floor ("Install/Access Control/Reader" screen) has elapsed or
until a floor-selection button is pressed. This option is available only for multiNODE-2 elevator nodes.
Individual means that the node is connected to each button of the elevator control panel to recognize
when a specific floor-selection button is pressed. When a card is used at the reader, another card cannot
be used until the Time To Select A Floor ("Install/Access Control/Reader" screen) has elapsed or until a
floor-selection button is pressed. This mode also enables the selected floor number to be included with the
transaction details. For multiNODE-2 elevator nodes, a monitor point definition must be set up for each
floor button monitored (not necessary for M2000 or M2100 elevator nodes).
Enable Node
Choose Enable Node to allow normal communications to and from the node.
Deselecting Enable Node disables all server-initiated communications to the node (such as downloading
of card data). It may be useful to deselect Enabled while setting up a node that has not yet been installed,
as this may prevent unwanted messages.

250
Symmetry Software Reference Manual

Note: You should not deselect Enable Node for a node that is already installed and in service, as this
may cause a mismatch between the data held at the databases and at the node.

Node in Maintenance Mode


This option is available if Supports Intrusion Functionality is selected.
Selecting the option places the node in a maintenance mode state.
Company
This option is enabled only if Supports Intrusion Functionality is selected.
The option is used for Activity Reports ("Reports/History/Activity" screen). The option enables alarms and
events that are not otherwise associated with a specific company to be included in an Activity Report,
depending on the company or company group selected in the "Reports/History/Activity" screen.
EOL Resistor
This option is applicable for M2150 Intrusion nodes or M2150 nodes fitted with v4.0 or later firmware.
The option determines the resistor values (default values in kOhms) to use for cable supervision.
The resistor values you need to use depend on the value you select for EOL Resistor, the level of cable
supervision and the normal state of the contacts, as given below.
Note: The resistor values must be used for all forms of cable supervision: monitor points (including zones),
door monitors and exit-request switches.
3-state supervision:
 Normally-closed contacts - Use only resistors of the selected value (1k, 4.7k or 10k).
 Normally-open contacts - Use only resistors of the selected value (1k, 4.7k or 10k).
4-state or 6-state supervision:
 Normally-closed contacts - Use only resistors of the selected value (1k, 4.7k or 10k).
 Normally-open contacts - Use resistors that have the following value:
Selected resistance = 1: Use only 2.2k resistors
Selected resistance = 4.7: Use only 10k resistors
Selected resistance = 10: Use only 22k resistors
Please refer to the M2150 Design Guide for illustrations of these resistor configurations.
Note: The Custom option allows a non-default resistor value to be used. Please refer to your Technical
Support representative if a custom resistor value is required.
Lock Out
This option is available if Supports Intrusion Functionality is selected. The option enables you to choose
configuration settings to lock when the node is placed in lock-out mode.
Selecting Lock Out displays a dialog that allows you to choose the types of information to lock.
The Device Configuration option covers changes to readers, monitor points, auxiliary outputs and areas.
The System Programming option covers all changes not specifically covered by the other options.
The Automatic Download When Remote Programming is Re-enabled option causes the Symmetry
software to download all configuration data to the node when lock out mode is switched off.
Changes to the node definition are prevented if any information is locked.
Factory Reset
This is displayed only if you have System Admin privileges (as specified in the "Maintenance/User &
Preferences/Roles" screen) and only when the option has been enabled in the ini file. Selecting the option
causes the node to be re-initialized. All the node's database information is automatically deleted and
reloaded.
You may want to use this option if you suspect that the node's databases have become corrupt.

251
Node Definitions ("Install/Access Control/Node")

Communications Tab

Note: This tab is displayed only for an EN node. Use the Discover button before setting up the details of a new
node of this type.
Note: After saving, you can edit the communication settings only if you remove the check mark from Enabled,
save the information and re-open the node definition. Remember to re-enable communications.

Client Connected to
Select the name of the client that will be used to communicate with the node, as defined in the
"Install/System/Clients" screen.
Enabled
Choose Enabled to allow normal communications to and from the node.
Network Address
Enter in this field the IP address or network (DNS) name of the node, as configured using the separate
configuration tool (such as G4Flashnet).
If you have used Discover, this field is automatically populated with the network name of the node, as
configured using the separate configuration tool. You can replace this with the IP address, if you wish.
Gateway IP Address
A gateway is an IP router that forwards traffic to destinations beyond the local network. If the node is on a
separate IP network segment from the client, connected through a gateway, specify the local IP address of
the gateway.
Subnet Mask
Specify the subnet mask number obtained from the network administrator. This number identifies which
network segment the node is on.
Current Password
This displays the current password (if previously set and saved) that the client uses to log into the node.
New Password
You can assign a password of up to 16 alphanumeric characters. Whenever the selected client
communicates with the node, it supplies the password to obtain access to the data held in the node. This is
a security measure to prevent unauthorized access to the data.
It is recommended that you specify a password, but if you leave the field blank, no password is used.
With nodes that have specific firmware (please contact your technical support representative for details), a
Too Many Login Failures alarm is generated if three or more unauthorized login attempts are made while
the node is offline. The alarm is generated when Symmetry reestablishes communications.
Time Difference
Specify the time difference between the client and node. A negative time means that the time at the node
is behind that of the client, and vice versa.
When the system adjusts the time at the node, it uses the Time Difference setting to add or subtract the
correct number of hours to set the correct time.
Time Difference is also used to ensure that any alarms or events are logged with the time at the node,
rather than the time at the client PC. For example, if Time Difference is -01:00, one hour is subtracted
from the time of alarms/events that are received from the node.
Host settings
Primary IP Address
This option is available if you have chosen "Periodic" or "Continuous connection established by
Controller" in Connection Type. For a period connection, enter the IP address of the client specified

252
Symmetry Software Reference Manual

in Client Connected to. For "Continuous connection established by Controller" enter the IP address
of the Symmetry server.
Secondary IP Address
This option is available if you have chosen "Continuous connection established by Controller" in
Connection Type. Enter the IP address of the secondary (backup) Symmetry server, or 0.0.0.0 if
you are not using a secondary server. This is a non-standard feature that should be used only under
guidance from your Technical Support Representative.
Port Number
Enter the port number to use at the Symmetry client/server specified by the Primary/Secondary IP
address.
You may want to change the port number that the node uses if the network administrator has
policies regarding port usage.
It is recommended that you do not change the default of 3001 without consulting technical support.
Note: The port number changes automatically from 3001 to 3002 if you select Continuous-
connection established by Controller for Connection Type.
Options
Connection Type
Choose one of the following options:
Continuous-connection established by server/client
The client will continuously poll the node. If there are two or more continuously-polled nodes or
other devices communicating with the same network port, each is polled in turn.
Periodic
The client contacts the node only when there is data to download (such as new card data) and
at the times specified in the lower area of the tab. The node always initiates communications
with the client immediately on detection of an alarm condition. Events are uploaded only when
the client initiates communications.
Continuous-connection established by Controller
The node will continuously poll the Symmetry server specified in Primary IP Address. If you
select this option, also enter the Remote Interval and MAC Address.
Fallback
Select this option if the node is to use a modem for fall-back communications in the event that the
standard network connection is lost. Selecting this option displays the Fallback tab.
The Baud rate for the fallback modem is set in the LAN tab.
Secondary
Select this option if the node at the head of the chain contains two NIC4 modules. The secondary
NIC module is used if the network connection to the primary fails. Each NIC module uses a separate
IP address. The Communications tab specifies the IP address for the primary NIC module. The
Secondary Connection tab enables you to specify the IP address of the secondary NIC module. The
Continuous connection established by server/client option must be used if dual NIC4
communications is required.
Call Time and Recall Interval
CallTime specifies the time at which the client automatically calls the node for the first time in each
day. If more than one automatic call is required, specify the period between automatic calls in Recall
Interval.
This is for a Periodic connection type only.

253
Node Definitions ("Install/Access Control/Node")

Wait for Answer


This specifies the length of time that the client waits for a communications link to be established with
the node. If this time is exceeded, the client "hangs up".
The setting is relevant only for client-initiated calls. Symmetry uses a default setting for
communications to the client.
This is for a Periodic connection type only.
Number of Retries and Delay Between Retries
This specifies the maximum number of times that the client tries to establish communications with
the node following an unsuccessful attempt. If a delay between retries is required, specify the value
in Delay Between Retries.
The setting is relevant only for client-initiated calls. Symmetry uses a default setting for
communications to the client.
This is for a Periodic connection type only.
Max Connect Time
This is the maximum length of connect time for a call (set to zero for no maximum). If this maximum
is exceeded, the call is terminated. This enables the termination of a connection that has not been
terminated normally.
This is for a Periodic connection type only.
Remote Interval
In the event of a failed connection attempt to either the primary or secondary host, the node will wait
for the specified period of time before attempting to re-connect.
MAC Address
If you have selected Continuous-connection established by Controller, enter the MAC address
of the node.
Enable SNMP Support
This is available only for the EN-2DBC. Select the option if you want the node to expose information
about itself through the Simple Network Management Protocol (SNMP).
SNMP allows third-party applications (Network Management Systems) to monitor or manage SNMP-
enabled devices on the network. These applications may, for example, display information about the
current status of each SNMP device on the network.
The node supports SNMP version 3.0.
SNMP Passphrase
Specify a password. This must contain 8 characters (if necessary, append with spaces to
make 8 characters).
The third-party application must provide this password if an authentication option is selected
from SNMP Security Level.
SNMP Security Level
No Security - The third-party application needs to log in to the node to gather information.
Authentication No Private - The application needs to log in, but data encryption is not used.
Authentication and Private - The application needs to log in, and data encryption is used.
The SNMP community for the node is "public". The USM username is "initial". The algorithms for
authentication and data encryption are MD5 and DES respectively. The passphrase (if used) must
be 8 characters.
The following SNMP parameters are available:
 sysDescr (object ID .1.3.6.1.2.1.1.1.0) - String containing:

254
Symmetry Software Reference Manual

system name, part number, firmware version, PCB revision, door status, input status, PoE
status and Symmetry online status.
 sysUpTime (object ID .1.3.6.1.2.1.1.3.0) - Uptime (milliseconds)
 ifType (object ID .1.3.6.1.2.1.2.2.1.3.1) - Network interface type
 ifMtu (object ID .1.3.6.1.2.1.2.2.1.4) - Network max transmission unit
 ifSpeed (object ID .1.3.6.1.2.1.2.2.1.5) - Network speed in bytes/sec
 ifPhysAddress (object ID .1.3.6.1.2.1.2.2.1.6) - Network MAC address
 ifInOctets (object ID .1.3.6.1.2.1.2.2.1.10) - Number of received packets
 ifInDiscard (object ID .1.3.6.1.2.1.2.2.1.13) - Number of dropped packets
Anti-Passback Mode
The following are available if you select the Continuous polling option:
 None if you do not want to use either of the following two options. Selecting None does not
prevent other nodes in the same chain from being in the same antipassback scheme if
Zonal (Chain) is selected in the Setup tab.
 Zonal (Global Client) if you want the node to be able to be used in a zonal antipassback
scheme with readers from other nodes that communicate with the same client over a LAN.
Ensure Zonal (Chain) or Zonal is selected in the Setup tab.
 Zonal (Global System) if you want the node to be able to be used in an antipassback
scheme with readers from any other nodes in Symmetry. Ensure Zonal (Chain) or Zonal is
selected in the Setup tab.
Click here for an overview of antipassback.
Encryption
This option is displayed only if you have System Admin privileges (as specified in the "Maintenance/User &
Preferences/Roles" screen) and the Encrypted Communications license is installed.
The option specifies the type of encrypted communication to use between the node and the managing
client computer.
Select None to disable encryption, or choose one of the displayed encryption types to enable encryption.
If you enable encryption, make sure that the node supports the selected encryption type.

Reporting Tab
This tab specifies whether each message causes an alarm, event or is not reported at all at the node.
This specification is at the node level, not at the server level. Therefore, although you may define a message as
an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the message is to be
reported as an event by the server. Such an approach may be needed if it is important for a node on a remote
site to communicate the message to the server immediately (only alarms are sent immediately to the server).
In addition, note that the "Operation/Alarms/Routing" screen may block node alarms from being displayed.
See Alarm/Event Messages for details of each message.
LAN Tab
The LAN tab is displayed if you are setting up a node that communicates over a network with the Symmetry
client PC. The tab allows you to specify additional information about the connection.
LAN Chain First Node
Select Yes only if the node is the first node in a chain; that is, it connects directly to the network or to a
PAD device.
Inter-message Timeout and Retry Timeout
These options are grayed out and can be adjusted only under consultation with your Technical Support
representatives.

255
Node Definitions ("Install/Access Control/Node")

M2150 Fallback Baud Rate


This specifies the baud rate to use for communications to a fallback modem. A database unit uses a fall-
back modem for communications to a Symmetry PC if an Ethernet communications failure is detected on
COM D.
Please refer to the M2150 Design Guide for details of how to configure the port-usage switches on the
database unit to enable fall-back communications.
Door & I/O Controllers Tab
About this Tab
This tab is displayed only if you have selected a multiNODE-2100 (M2100) or multiNODE-2150 (M2150)
node type in the Setup tab.
The tab enables you to specify the door, alarm and output controllers used by the node.
See About Alarm and Output Controllers for an introduction to alarm/output controllers.
Internal Controller Units
The Internal Controller Units section of the tab (applicable to M2100 only) enables you to specify any of the
following used by the node:
 4DC or 4DCU - Four-Door Control Unit.
 AC24/4 or ACU - Alarm Controller.
These devices are housed in the same cabinet as the Database Unit (DBU), and connect to the DBU using
a ribbon cable. A 4DCU/ACU fitted in the top-left corner of the cabinet always has an address 1, and a
4DCU/ACU fitted in the top-right corner always has an address of 3.
External Controllers
The External Controllers section of the tab enables you to specify any remote door, alarm or output control
units used by the node:
 1DC - One-door remote control unit (M2100 1DCR-P).
 2DC or 2DCR - Two-door remote control unit (M2100 2DCR or M2100 2DCR-P, or M2150
2DC).
 4DC or 4DCR - Four-door remote control unit (M2100 4DCR-P, or M2150 4DC\4DCN).
 8DC - Eight-door remote control unit (M2150 only).
 AC24/4 or ACR - Alarm controller (M2100 ACR or M2150 AC24/4).
 M2150 OC4/24 - Output controller (M2150 only).
Each of these devices connects to the database unit using via an RS485 connection, rather than via a
ribbon cable. This allows the controller to be sited remotely from the database unit. The specified address
must match the address set on the PCB, in the range 1 to 8. Each device controlled by the same database
unit must have a different address.
Address
Each controller must be assigned a different address in the range 1 to 8. The address specified must
match the address set using the links or switches on the PCB (4DCUs and M2100 ACUs have a pre-
defined address of 1 or 3).
Note the following points:
 The 4DCU, 4DCR-P, ACR (AC) and M2100 ACU occupy two addresses. This means that if,
for example, you assign address 3 to an ACR, address 4 cannot be used by any other
controller.
 The address of a 4DCU or M2100 ACU is pre-defined as either 1 or 3. Address 1 is used for
the 4DCU/ACU sited in the top-left corner of the cabinet (that is, connected to the first
controller port of the DBU). Address 3 is used for the 4DCU/ACU sited in the top-right corner
of the cabinet (that is, connected to the second controller port of the DBU). Since the
address is fixed, only two 4DCUs/ACUs can be used.

256
Symmetry Software Reference Manual

 The address of an M2100 ACR or 4DCR-P must be set to 1, 3, 5 or 7 only, since the device
occupies two addresses.
 The M2150 8DC occupies four addresses and must be set to address 5.
Symmetry enforces the above addressing rules.
Description
Using the Description field, specify a meaningful description for each controller based on its location or
function. The description will be used when setting up readers, auxiliary outputs and monitor points
connected to the controller. It is also used by the Node Tamper and AC Power Fail alarm/event messages
to indicate the controller that is at fault.
Selecting Use Controller Type As Description causes each description to be automatically set to the
same as the controller type, but using this option is not recommended.
Secondary Connection Tab
This tab is displayed if Secondary is selected in the Communications tab to indicate that the node at the head
of the chain contains two NIC4 modules.
The Communications tab specifies the IP address for the primary NIC module. The Secondary Connection tab
enables you to specify the IP address of the secondary NIC module.
Fallback Tab
This tab is displayed if Fallback is selected in the Communications tab to indicate that the node uses a modem
for fall-back communications in the event that the standard network connection is lost.
The Baud rate for the fallback modem is set in the LAN tab.
Discover
Click this button to display a screen that enables you to locate a discoverable node on the network (e.g. EN or
M4000 node).
Each has a unique MAC address, which is displayed in the screen and printed on a label on the case or
Ethernet port. Select the node, and click OK. Depending on the node type, you may need to use the
Communications tab to set up other communications settings. If the network has a DHCP server, the node is
automatically allocated an IP address.
To be listed in the screen, the node must be on the same subnet as the computer you are using.
If you are defining a new node, only those that have not yet been defined in the Symmetry software are listed.
If you have opened an existing node definition, clicking Discover lists all nodes that have not yet been defined,
and the node you have opened. This enables you to re-assign the current node definition to a new node
(perhaps to replace a faulty unit). The current node assigned to the node definition is marked by an asterisk (*)
in the Current column. You can use this feature to set up node definitions before the hardware is installed.

Reader Definitions ("Install/Access Control/Reader")

Introduction to this Screen


Purpose of the Screen
Use this screen to set up and name each reader used. The default settings are defined in the
"Install/System/Default Settings/Reader" screen.
The system has a maximum number of readers that can be used, depending on the Symmetry license
purchased. The "Symmetry button/About" screen shows the maximum licensed for this installation.

Note: The Selection screen lists readers with their chain, node, multiNODE-2100/2150 controller and reader
addresses. For example, 1/001/2/4 means chain 1, node 001, controller 2 and reader 4. For readers not
connected to an multiNODE-2100/2150 controller, the controller address is not applicable and therefore the
controller address is shown as "-"; for example, 1/001/-/4.

257
Reader Definitions ("Install/Access Control/Reader")

Note: Set up shared reader groups ("Setup/Device Groups/Shared/Shared Readers") if you want the reader to
be used by more than one company.
Note: Some options documented in this help topic may not be available, depending on the node type you are
configuring.
Note: For M4000 nodes, all reader configuration is carried out in the web interface, not in this screen. The
readers set up in the web interface are automatically imported into this screen.

Prerequisites
The node that the reader is connected to must have been set up using the "Install/Access Control/Node"
screen.
Reader Description
A unique name for this reader.
For M4000 nodes, if a reader (access point) is deleted in the web interface, the name is prefixed with "Del", but
remains undeleted. This allows you to view, modify or remove any locations where the reader is used in
Symmetry, such as in access rights or commands.
If a Hand Geometry Unit (HGU) reader at an HGU node is selected, the description is divided into two 16-
character fields. The reader description is also displayed at the HGU reader as the default message, and the
two fields represent the two-line message at the HGU reader.
Location
Click here for information about this option.
Category
Click here for information about this option.

Tabs
Setup tab
Owned by Company
Select the company that is to own the reader.
Account Number
Click here for information about this option.
Area Number
Click here for information about this option.
Zone Number
Click here for information about this option.
Node Description
Choose the node or controller that the reader is connected to.
Lock Address
This option is displayed only if the node selected in the Description menu is an EN-LDBU.
Specify the address of the reader; this is the EAC Address displayed in the Aperio Programming
Application.
For further information, please refer to the Aperio Locks Configuration and User Guide.
Controller Description
This pull-down list is relevant only if you have selected a multiNODE-2100 or multiNODE-2150 node type.
Choose the controller that the reader is connected to.

258
Symmetry Software Reference Manual

Reader Type
In most cases, this menu selects the reader or card format name, as defined in the Reader/Card Formats
screen.
If available, selecting Display Additional Reader Types increases the number of reader types listed in the
menu.
If you choose a reader type that has "Default Wiegand" in its name (for example, Series 600/700/800
using Default Wiegand), the card format used is defined in Wiegand Format in the "Install/Access
Control/Node" screen.
For ASSA ABLOY locks, you can choose either a DSR PoE or DSR Wifi lock type from this menu.
A Hand Geometry Unit (HGU) reader can be selected if the node type selected is an HGU node.
Overview of Biometric Hand Templates and HGUs
Reader Port Number
This specifies the reader port number that the reader is connected to. Ports that are already used are not
displayed in the pull-down list. The multiNODE-2 and M2000 elevator nodes have just one reader port.
M2100 elevator nodes have four reader ports for up to four cabs.
Click here for information about installing HGU nodes.
MCLP (20 mA), RS 485, Wiegand, Custom Messages (20mA)
Some reader types have different communication options. Choose the communication method used by the
reader. For example, 20mA MultiNODE Current Loop Protocol (MCLP).
Choose Custom Messages (20mA) if the reader is an M2150 intrusion reader. Only certain reader types
can be used as M2150 intrusion readers.
Facility/Customer Code
A node always requires a customer code (otherwise known as facility code) to be provided following a
transaction at a reader. The customer code plus the card number makes the card unique to a specific
company. You can use "Setup/Configuration/Facility/Customer Codes" to assign a customer code to one
or more companies.
Normally, the reader supplies the customer code after reading a swiped card. However if, for example, the
reader is in user-code mode or the card does not store a customer code, the reader is not able to supply
the customer code. In these situations, the customer code defined in this field is used. The node combines
this customer code with card number, finds the corresponding record as set up in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen, then determines whether or not to grant access.
Remember that each person has just one customer code allocated in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. Therefore, all the readers that the person is going to use that do not read a
customer code must have the same customer code.
Every customer code must be allocated to the appropriate companies in the Facility/Customer Codes
screen.
You only need to specify a default customer/facility code if the reader/card format does not supply a
customer code.
Display Additional Reader Types
Choose this option to display additional reader types in the Reader Type menu. With this option not
selected, only the most popular readers are listed.
Supports 4 Line Display
Select this option if the selected reader has a customizable 4-line display. This option is available only if
the reader is an M2150 intrusion reader; that is, Custom Messages (20 mA) is selected.
Reader State
Note that the reader's Card Only/Card+PIN/Disabled mode can also be altered by the use of a command.
 Card Only - If selected, card holders and visitors do not have to enter a PIN.

259
Reader Definitions ("Install/Access Control/Reader")

 Card + PIN - If selected, card holders and visitors have to enter a PIN after presenting their
card.
 Customer Code Only-No Store and Customer Code Only-Store - These modes cause
readers to allow access to any card that has a customer code that is the same as one of the
customer codes stored in the reader's node.
 If you select Customer Code Only-Store, each transaction causes the customer code to be
recorded in the log. Otherwise, no log information is stored.
 Disabled - If selected, the reader is disabled.
Anti-Passback Options
A Hard antipassback reader logs an antipassback violation as an alarm/event and does not grant access.
A Soft antipassback reader logs an alarm/event, but does grant access. None specifies that the reader is
not an antipassback reader.
Soft and Hard and the antipassback fields do not apply if the node that controls the reader is set up as an
elevator node or has not been set up for antipassback.
The Zonal Data options are available if the reader's node is set up for zonal antipassback. The Timed
Data options are available if the reader's node is set up for timed antipassback.
Using the "Install/Access Control/Node" screen (and the "Install/Access Control/Chains/LAN" screen, if
LAN chains are used), you can specify which nodes to include in the same antipassback scheme. All
readers on these nodes will be in the same antipassback scheme.
Note that the maximum value for Passback Timeout is 63 minutes. An exit antipassback reader is defined
by setting the timeout value to zero. In this case, the card can be used at any time without causing an
alarm or event. This allows for situations where a person enters an antipassback-protected area, then
wishes to exit the area immediately, perhaps, for example, because he or she forgotten something. The
use of an exit antipassback reader also causes the time delay for reuse of the card to be zeroed, so the
person can reenter the antipassback-protected area immediately, without having to wait.
For zonal antipassback, use zone numbers between 1 and 63. Zone 0 is the Symmetry default "neutral"
zone. A card can enter or exit the neutral zone without violation.
Note that zonal (chain) antipassback mode is not available for nodes on dial-up chains. Use zonal (local)
or timed antipassback for nodes on dial-up chains.
Click here for an overview of antipassback.
Intrusion
The intrusion options are available if the intrusion cost option is installed, and are relevant only for M2150
intrusion systems. A suitable Reader Type must also be selected.
Note: Please refer to the M2150 Intrusion Guide for system examples.
Arming/Disarming Reader
Select this option if the reader is an M2150 intrusion reader that will be used to arm and disarm
areas.
Note:
 The reader must connect to the same node as the zones in the areas to be armed or
disarmed.
 There can be more than one M2150 intrusion reader per node.
 Selecting this option does not prevent the reader from being used also as an access-
control reader located outside the protected area.
 Assign the reader to an area using the "Setup/Device Groups/Intrusion Areas" screen.
 Card holders require area access rights to arm or disarm intrusion areas. The access
rights can be set up in the "Home/Identity/Card Holders" screen.
 Card holders require reader access rights if the reader is also used for access control.

260
Symmetry Software Reference Manual

 This option is selected and grayed out if the reader is controlling a third-party intrusion
area. M2150 arming/disarming readers can be set up to do this in the
"Install/Intrusion/Intrusion/Device Configuration" screen.
Final Exit
Select this option if the reader door monitor is needed as a final exit sensor. This will cancel the exit
timer of the area associated with the reader when the door monitor is triggered.
Restrict Keypad to assigned Area
When selected, all functions at the reader are restricted to the area the reader is assigned to, as
specified in the "Setup/Device Groups/Intrusion Areas" screen. This means that a card holder is able
to arm, disarm, select, change the arming time and view only the area the reader is assigned to
(providing the area is also in the card holder's access rights). The reader will reflect the status of
only the area that it is assigned to.
Entry/Exit Route
Select this option if you want the exit timer to start when a card holder arms an area at the reader.
Any valid activations of the door monitor (such as from a valid card transaction or exit request) are
ignored while the exit timer is running. The entry timer starts if the door monitor is activated when the
area is armed.
Comms Receiver Alarm Type
This option is applicable if an intrusion license is installed, and is relevant only if a communications
receiver is set up in the "Maintenance/User & Preferences/System Preferences" screen.
Choose whether an alarm generated by the reader should be reported as a burglary, fire or generic
alarm. Only intrusion alarms are relevant.
Guid and Serial Number
These are displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu.
The fields are completed automatically when you select a lock using Discover.
The Guid is the lock ID. If you have the Guid and serial number of a lock (such as from the DSR Support
Tool), you can enter this information directly into the fields rather than using Discover.
Extended Unlock Time, Unlock Duration, Door Ajar Duration
These are displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu
Extended Unlock Time - This unlock time (in seconds) is used for card holders who have Extended Door
Times set in the "Home/Identity/Card Holders" screen.
Unlock Duration - This is the normal length of time (in seconds) that a lock remains unlocked after a
successful "Access Granted" event.
Door Ajar Duration - This specifies the length of time (in seconds) that the door must remain open before
a "Door Held Alarm" is generated.
Double Swipe/Passage Mode
This is displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu.
If you select this setting, card holders who have Passage / Double Swipe Mode selected in the
"Home/Identity/Card Holders" screen will be able to permanently unlock or lock the reader using their card.
Deadbolt Override
This is displayed only if you have selected an ASSA ABLOY DSR lock from the Reader Type menu.
If you select this setting, card holders who have Deadbolt Override selected in the "Home/Identity/Card
Holders" screen will be able to gain access including at times when the lock's deadbolt is thrown. Other
cards that do not have the setting are rejected when the deadbolt is thrown..

261
Reader Definitions ("Install/Access Control/Reader")

Modes tab
Key Card Mode
If enabled, the reader can recognize keycards, as set up in the "Home/Identity/Card Holders" screen. A
keycard holder can switch the reader between keycard-in and keycard-out states (access rights permitting)
by presenting his or her card, followed by PIN with the first and last two digits swapped. For example, this
being 3412 for a PIN of 1234, or 78345612 for a PIN of 12345678. When a reader is in keycard-out state,
all cards except keycards are denied access, irrespective of access rights. When a card reader is in
keycard-in state, normal operation is resumed.
Manual, scheduled and trigger commands can also be used to switch a reader into keycard-in or keycard-
out states.
Duress Mode

Note: This setting is not relevant for Suprema BioLite N2 fingerprint readers (please refer to the Third-
Party Access Devices Configuration & User Guide for details of how to configure duress for these
readers).

If enabled, a card holder or visitor can signal that he or she is gaining access under duress from another
person.
Click here for details of how duress is signaled.
A duress transaction generates the Duress alarm/event message, but still allows access or arms/disarms
the system.

Note: To enable duress signalling, configure the reader to require a PIN to be entered.

Two-Card Timeout
If set to a value other than zero, two cards must be used at the reader within the specified time before
access is granted.

Note: This option is grayed out if the reader is connected to an elevator node.

PC Door Control
Select this option if you want the reader to be in PC door control mode by default. If deselected, the default
mode is automatic door control mode. Selecting or deselecting this option does not affect the ability to
switch the reader between modes.
The option is selected automatically if Enable Random Search is selected.
Click here for further information.
Card Relays Reader
This option is available only when the reader is connected to a Multinode-2 Card Relays node type.
Setting this option specifies that the reader is used for the card relays feature.
Only one reader on a node can be selected as the card relays reader. Therefore, you cannot set Card
Relays Reader for more than one reader connected to the same node.
Understanding and Installing Card-Relay Nodes
Enable Random Search
Determines whether card transactions at the reader will cause random card holder searches. Selecting this
option causes PC Door Control to be automatically selected.
The Level setting determines whether there is a high or low probability of a search at the reader.
See Random Search.

262
Symmetry Software Reference Manual

Use Reader Acceptance Threshold


This has a different meaning, depending on whether you are setting up an HGU or fingerprint reader.
If you are setting up a fingerprint reader, click here for details of this option.
If you are setting up an HGU reader, it specifies the maximum score from the Hand Geometry Unit (HGU)
reader that represents a valid hand. The HGU reader compares the HGU template sent to it from the HGU
node with the actual hand print, then returns a score back to the node. If the score is less than or equal to
the selected Acceptance Threshold, the hand print is accepted as valid.
Deactivate Visitor Cards
Selecting this option causes any visitor card that uses the reader to be automatically deactivated when the
card holder is granted access. This feature is typically used at readers that allow visitors to exit the site.
For further information, please refer to Overview of Visitor Management.
Make Visitor Cards available for Re-use
This option is available only if Deactivate Visitor Cards is selected in this screen and if Auto Card
Number (Visitor Card) is not selected in the "Maintenance/User & Preferences/System Preferences"
screen.
Selecting the option causes Symmetry to set a visitor's card number to zero in the "Home/Identity/Visitors"
screen if it is automatically deactivated by Deactivate Visitor Cards. This allows the card number to be
easily reused for another visitor in Symmetry.
For further information, please refer to Overview of Visitor Management.
Visitor Mode
If selected, a visitor is granted access at the reader only after their escort makes a valid card transaction at
the same reader. This has the effect of requiring the visitor escort to confirm access for their visitor, and
reinforces the requirement for a visitor escort to accompany their visitor.
Please refer to the Overview of Visitor Management for further details of this option.
Command Mode
This menu is relevant for keypad versions of Series 6xx and later readers. See About Card Commands.

Note: The menu is unavailable for elevator nodes or Micronodes.

User Code Mode


Click here for details of this option.
IDS Code Mode
Click here for details of this option.
Fingerprint Mode

Note: This setting is not relevant for Suprema BioLite N2 fingerprint readers (please refer to the Third-
Party Access Devices Configuration & User Guide for details of how to configure duress for these
readers).

The fingerprint mode is relevant only if you have selected a Series 800 (S81x) fingerprint reader. Choose
the fingerprint mode:
 Disabled - If you do not want the reader to request a fingerprint. The reader will operate as
a standard contactless smart card reader.
 Single Fingerprint - If you want the reader to request only one fingerprint. If two fingerprints
are enrolled on a card, but an s81x fingerprint reader is in single-fingerprint mode, either of
the two fingerprints can be used to gain access.
 Two Fingerprints - If you want the reader to request two fingerprints.

263
Reader Definitions ("Install/Access Control/Reader")

The fingerprint mode can be overridden using manual, scheduled or trigger commands.
PIN Code Errors
Selecting Inactivate Card on PIN Error causes a card to be blocked (made inactive) if the card holder
enters their PIN incorrectly the number of times specified by Number of Attempts.
Selecting Inhibit Card on PIN Error causes a card to be suspended for a specified period if the card
holder enters their PIN incorrectly the number of times specified by Number of Attempts. The length of
the suspension period is defined by Card Inhibition Period in the "Maintenance/User &
Preferences/System Preferences" screen.
Click here for further details.
Degraded Mode
Specifies the action to take when a door controller cannot communicate with its database.
Customer Code Only allows access to any card that has a customer code that is the same as one of the
customer codes stored in the door controller. This list of customer codes is a copy of the information stored
in the main node.
The customer codes stored in a node are dependent on the person's access rights. A node stores a
person's customer code (as defined in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen) if the person has one of the node's readers in his/her access rights.
In situations where the customer code cannot be provided from the card, Customer Code Only gives only
superficial protection; for example, a proximity card that has no customer code is accepted provided that
the card number is within a card-block range.
Doors tab (available if the reader is not connected to an elevator node)
Unlock Relay Time
Once a door is unlocked, this is the maximum amount of time that the person is given to open the door
before it is relocked. If the door is not opened within this amount of time, the person must present the card
again. If the door is opened, it is relocked as specified by Keep Time.
This time can also be set up in the "Maintenance/Access Control/Door Timing" screen.
For a pictorial representation, see the timing diagrams.
Door Open Time / Door Pre-Held Time
These times are intended to indicate cases of when, for example, a door is jammed open. After the door
has been unlocked, if the door is open after the amount of time specified by Door Open Time, the reader's
pre-held sounder (if fitted) operates until the door is shut. The maximum length of time that the sounder
operates is specified by Door Pre-held Time (which could be zero). The sounder warns that the door
should be closed. If the door is still open at the end of the Door Pre-held Time, the reader generates a
'Door Held Open' event/alarm.
Also, if Valid Card Re-Lock Options in the Options tab is set to Door Closes, the lock is reengaged at
the end of the Door Open Time.
These times can also be overridden in the "Maintenance/Access Control/Door Timing" screen.
It is also possible for card holders to override the default door open time at Series 6xx or later readers,
providing the reader has a keypad. For further information, see About Card Commands.
For a pictorial representation of the timing options, see the timing diagrams.
Extended Unlock Time
This is an alternative unlock relay time for people who have the Extended Door Times option set in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
This time can also be set up in the "Maintenance/Access Control/Door Timing" screen.
Extended Open Time / Extended Pre-Held Time
These specify an alternative door open time and door pre-held time for people who have the Extended
Door Times option set in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.

264
Symmetry Software Reference Manual

These times can also be set up in the "Maintenance/Access Control/Door Timing" screen.
Delay Time
Specifies the length of time from a valid transaction or exit request to the door unlocking. The system
introduces this delay to enable the reader's bypass relay to operate, which could, for example, be used to
bypass an alarmed monitor point on the door.
For a pictorial representation, see the timing diagrams.
Keep Time
If Valid Card Re-Lock Options is set to Door Opens, this specifies the length of time from the door
opening to the lock engaging (assuming that the Door Open Time has not expired).
If Valid Card Re-Lock Options is set to Door Closes, it is the length of time from the door closing to the
lock engaging (assuming that the Door Open Time has not expired).
For a pictorial representation, see the timing diagrams.
Hold Time
This option is appropriate only if Bypass Relay Operation is set to Normal or Exit Request Only.
If Valid Card Re-Lock Options is set to Door Opens, this specifies the length of time from the door
closing to the bypass relay being switched off.
If Valid Card Re-Lock Options is set to Door Closes, it is the length of time from the lock engaging to the
bypass relay being switched off.
In both cases, when a door has been jammed open, it is the length of time from when the preheld alarm is
switched off to the bypass relay being switched off.
For a pictorial representation, see the timing diagrams.
Floors tab (available if the reader is connected to an elevator node)
Time To Select A Floor
Use this option to specify the maximum length of time that the floor-selection buttons remain enabled
following the access-control transaction. If a floor button is not pressed within this period of time, the
access-control transaction will need to be repeated before a floor can be selected.
Options tab (available if the reader is not connected to an elevator node)
Valid Card Relock Options
Specifies when the door lock is reengaged following an access-control transaction at a reader. The Door
Closes option is normally used only for locks that have a built-in Hall-effect "door locked" monitor. Different
rules can apply when the door is opened by an exit-request switch; see Exit Request Re-Lock Options.
For a pictorial representation, see the timing diagrams.
Exit Request Re-Lock Options
Specifies when the door lock is reengaged following an access-control transaction at an exit-request
button.
If As Valid Card is selected, the timing as specified for Valid Card Re-Lock Options is used; pressing the
exit-request switch is taken as a normal access-control transaction.
If Follow Exit Request is selected, the timing as specified for Valid Card Re-Lock Options is used,
except t2 and t3 (see timing diagrams 13 to 16) are started from when the exit-request switch is released.
The door lock is relocked only if the exit-request switch is not being pressed.
If Do Not Unlock is selected, the exit-request switch does not cause the door to unlock, but the bypass
relay operates according to timing diagram 1, 5, 9 or 13).
Bypass Relay Operation
Specifies how the reader's bypass relay is to operate. The relay energizes immediately the access-control
transaction occurs. The relay deenergizes according to Hold Time.
Normal - Specifies that the relay is to operate for all valid transactions, including from exit-request buttons.

265
Reader Definitions ("Install/Access Control/Reader")

Exit Request Only - Specifies that the relay is to operate only when the transaction is from an exit-request
button.
Keycard IN Only - Specifies that the relay energizes when a keycard-in transaction occurs, and remains in
this state until a keycard-out transaction. The relay operation is not dependent on other factors, such as
when the door is closed.
Re-evaluate Exit Request on Door Closing - This is for M2150 nodes only. When selected, both the
bypass and release relays will remain energized while the exit-request button remains pressed. Each time
the door is opened then closed within the Door Open Time (while the exit-request is pressed), the timer for
the Door Open Time restarts, which delays any pre-held alarm until the Door Open Time expires.
Do not Unlock if Door is Open - This has the same effect as Exit Request Only, but the door relay is not
energized if the door is already open. A Door Held alarm occurs if the door remains open for longer than
the Door Open Time.
Re-evaluate and Do Not Unlock - This is for M2150 nodes only. This enables both Re-evaluate Exit
Request on Door Closing and Do not Unlock if Door is Open.
By Pass Off - This is displayed only for a reader connected to an EN-2DBC or M1100/M1200/M1400 node
(collectively known as M1000 nodes). Relays marked "AUXILIARY" (M1000) or "OUTPUT" (EN-2DBC) on
the PCB can be used for auxiliary outputs or to bypass devices, but not for both purposes. The Bypass
Relay Operation option determines which of these two purposes the relay is used for. Selecting By Pass
Off enables the relay to be used as an auxiliary output, rather than for bypassing a device. For example, if
you set By Pass Off for reader port 2, this allows the relay to be used as auxiliary output 2. Any other
setting will cause the relay to be used for bypassing. Once you have configured the auxiliary output,
Bypass Relay Operation cannot be changed from By Pass Off.
Inhibit Reader While Door Open
Specifies whether the reader should be inhibited ( disabled) when the door is open following a valid
transaction. This is to ensure that potential conflicts are avoided when using a bi-directional turnstile. If you
select Both and two readers are used at one door, the exit reader will be inhibited as well as the entry
reader (if two readers are used at one door, selecting Yes will inhibit the entry reader only).
Two Readers At One Door
Two readers can be used to control a single door (one for entry and another for exit). To do this, select this
option for the entry reader, which must be an odd-numbered reader. The next even-numbered reader is
automatically selected for the exit reader.
Selecting this option may also be necessary for an HGU readers when used in conjunction with a
companion reader. Click herefor further information.
Exit Request Supervision State
Specifies the level of cable supervision for the reader's associated exit-request input.
In the case of four-state supervision, both short-circuits and open-circuits can be detected. If three-state
supervision is used and the device is normally open, only an open circuit can be detected. If the device is
normally closed, only a short circuit can be detected. Two-state supervision cannot detect cable faults.
This option is set to two-state supervision if Door Loop is selected for Door Monitor Supervision State.
Exit Request Normal State
Specifies the 'normal' (quiescent) state as open or closed dependent upon the type of exit-request device
fitted.
Door Monitor Supervision State
Specifies the level of cable supervision for the reader's associated door-monitor input.
In the case of four-state supervision, both short-circuits and open-circuits can be detected. If three-state
supervision is used and the device is normally open, only an open circuit can be detected. If the device is
normally closed, only a short circuit can be detected. Two-state supervision cannot detect cable faults.
Select Door Loop if M2150 is being used to replace third-party access-control equipment that uses a
single 2-core cable to monitor the lock sensor, door sensor and exit-request switch. Selecting this option

266
Symmetry Software Reference Manual

disables the door's exit-request input, which can be left disconnected. Please refer to the M2150 Design
Guide for further information.
Door Monitor Normal State
Specifies the 'normal' (quiescent) state as open or closed dependent upon the type of door-monitoring
device fitted.
Mute on Door Held
If selected, any door-held sounder for the reader is permanently switched off (muted). This option may be
of use if, for example, the door has a door-held sounder that is independent from any Symmetry hardware.
The option functions only for certain versions of node firmware - please contact your AMAG Support
Representative for details.
Toggle Mode
You can use this option to make toggle mode active or inactive at the reader.
About toggle mode
Toggle Mode Behaviour is available if the reader's node has Node Supports Advanced Toggle Mode
selected in the "Install/Access Control/Node" screen.
Select Double Card Present and specify a Timeout period if you want to be able to activate and
deactivate toggle mode using a card that has Allow Double Card Present Toggle Mode Activation set in
the "Home/Identity/Card Holders" screen. Otherwise, select Single Card Present.
All Cards can Lock when Double Card Present Active is available when Double Card Present is
selected. Select this option if you want any card to be able deactivate toggle mode.
Reporting tab
This specifies whether the message causes an alarm, event or is not reported at all at the reader's node.
This specification is at the node level, not at the server level. Therefore, although you may define a message as
an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the message is to be
reported as an event at the server. Such an approach may be needed if it is important for a node on a remote
site to communicate the message to the server immediately (only alarms are sent immediately to the server).
Note that the "Operation/Alarms/Routing" screen specifies the name of the client that alarms are sent to and at
what times.
See Alarm/Event Messages for details of each message.
Single Messages tab
This tab is displayed if Custom Messages (20 mA) is selected and Supports 4 Line Display is not selected.
That is, the reader is an M2150 intrusion reader that does not support a customizable 4-line display.
You can use the tab to change the default messages displayed at the reader. The left-hand column displays the
default messages. Type the replacement messages in the right-hand column (maximum 16 characters).
4 Line Messages tab
This tab is displayed if both Custom Messages (20 mA) and Supports 4 Line Display are selected. That is,
the reader is an M2150 intrusion reader that supports a customizable 4-line display.
You can use the tab to change the appearance, screens and messages displayed at the reader. The left-hand
column displays the default messages. The right-hand column displays the actual messages used.
To customize a screen/message:
1. Click the message you want to customize. A graphic of the message (as it appears on the screen of the
reader) is displayed.
2. In the graphic, either:
a) Double-click at the position where to want to add or delete text. The character you have selected is
bordered by a white rectangle. Type the new text as required.
or

267
Monitor Point Definitions ("Install/Access Control/Monitor Point")

b) Single-click and drag the mouse pointer to highlight text. You may want to do this for example to
underline several characters or set a flash effect.
Message Source
You can use the Message Source menu to copy the messages from a different reader. You can also set
the reader messages back to their default settings. Select Copy Messages after selecting the appropriate
option from the menu.
The following right-click options are available:
Edit Text
This is displayed only if you have highlighted text by single-click. Select the option to edit the text.
Customize Character
Allows you to customize the appearance of the character.
Select Character
Allows you to replace a selected character with a character from the default character set.
Align Text Left/Center/Right
Aligns the text to the left, center or right of the line.
Underline
Underlines the selected text.
Toggle Case
Toggles the case of the selected text.
Flash All
Causes the selected text to flash on and off.
Flash Background
Causes highlighing in the background to flash on and off. While the highlighting is on, the text is
darkened.
Highlight Background
Causes the background to be highlighted and the text to be darkened.
Clear Effects
Clears flash effects from the selected text.
Single/Double Height
Makes the line single or double height. This is available only for some screens.

Buttons
Copy/Delete/Notes/Permissions/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Monitor Point Definitions ("Install/Access Control/Monitor Point")

Introduction to this Screen


Purpose of the Screen
Use this screen to set up and name each monitor point connected to an access-control node\controller. The
default settings are defined in the "Install/System/Default Settings/Monitor Point" screen.

268
Symmetry Software Reference Manual

Note: The Selection screen lists monitor points with their chain, node, multiNODE-2100/2150 controller and
reader addresses. For example, 1/001/2/4 means chain 1, node 001, controller 2 and monitor point 4. For
monitor points not connected to a multiNODE-2100 or multiNODE-2150 controller, the controller address is not
applicable and therefore the controller address is shown as "-"; for example, 1/001/-/4.
Note: For M4000 nodes, all configuration of monitor points is carried out in the web interface, not in this screen.
The monitor points set up in the web interface are automatically imported into this screen.

Prerequisites
The node that the monitor point is connected to must have been set up using the "Install/Access Control/Node"
screen.

About the Options


Monitor Point Description
A unique name for this monitor point.
For M4000 nodes, if a monitor point is deleted in the web interface, the name is prefixed with "Del", but remains
undeleted. This allows you to view, modify or remove any locations where the monitor point is used in
Symmetry, such as in access rights or commands.
Location
Click here for information about this option.
Category
Click here for information about this option.
Owned by Company
Select the company that is to own the monitor point.
Account Number
Click here for information about this option. The option is available only if Use as Intrusion Input is not
selected.
Area Number
Click here for information about this option. The option is available only if Use as Intrusion Input is not
selected.
Zone Number
Click here for information about this option.
Node Description
The node or controller that the monitor point is connected to.
Controller Description
This pull-down list is displayed only if you have selected a multiNODE-2100 or multiNODE-2150 node type.
Choose the controller that the monitor point is connected to.
Monitor Point Number
This specifies which input on the node the monitor point is connected to. Inputs that are already used are not
displayed in the pull-down list.
Note: M2150 4DCs, 4DCNs and 4DBCs have unusual input/output numbering when a 4IN-8OUT module is
used:
 4IN-8OUT first module: inputs 1 to 4; outputs 1 to 4, and 9 to 12.
 4IN-8OUT second module: inputs 9 to 12; outputs 5 to 8, and 13 to 16.
The numbering when an 8IN-4OUT is used on an M2150 4DC, 4DCN or 4DBC is as expected:

269
Monitor Point Definitions ("Install/Access Control/Monitor Point")

 8IN-4OUT first module: inputs 1 to 8; outputs 1 to 4.


 8IN-4OUT second module: inputs 9 to 16; outputs 5 to 8.
Use as Intrusion Input
This setting is available if an intrusion license is installed, and is relevant only for M2150 intrusion systems.
Select the option if you want the monitor point to operate as a zone in an M2150 intrusion system. The node
that the monitor point connects to must be defined as an M2150 intrusion node in the "Install/Access
Control/Node" screen.
After selecting this option, use the "Setup/Device Groups/Intrusion Areas" screen to add the monitor point to the
required areas.
Options:
Normal Condition
Select Open or Closed, depending on the quiescent state of the device connected.
Point Response
Changes of state in the monitor point are ignored if the change of state lasts for a period of time that is less
than the point response time. Slow = 600mS; Fast = 30mS. Under normal circumstances, only the Slow
response should be used.
Supervision State
This determines the level of supervision for the monitor point input. (Note that three-state, four-state and
six-state supervision require cable termination resistors, as described in the Engineering Guide.)
In the case of four-state and six-state supervision, both short-circuits and open-circuits can be detected. If
three-state supervision is used and the device is normally open, only an open circuit can be detected. If the
device is normally closed, only a short circuit can be detected. Two-state supervision cannot detect cable
faults.
Six-state supervision is applicable only for multiNODE-2100 or multiNODE-2150 alarm/output controllers,
or for 4in-8out or 8in-4out I/O modules fitted to M2150 controllers/database units with v3.0 or later
firmware. You should choose six-state supervision only if the monitor point sensor has a tamper switch.
Tamper Normal
This option is applicable only if six-state supervision has been selected. Choose whether the sensor used
for the monitor point has a tamper switch that is normally open or normally closed.
Point Status
Select enabled or disabled as the default state. When disabled, a monitor point may still generate cable
fault messages.
Entry/Exit Route
This option is available if Use as Intrusion Input is selected.
Select this option if you want to use the monitor point as an intrusion zone that is located along an
entry/exit route.
After using an intrusion reader to arm the area associated with the zone, an alarm is not generated if the
zone is triggered during the exit timer period. This gives an operator time to leave the building after arming
the system.
Similarly, when entering the building and triggering the zone, an alarm is not generated if the area is
disarmed within the entry timer period. This allows the operator time to disarm the system after entering
the building.
Final Exit
This option is available if Use as Intrusion Input is selected.
Select this option if you want to use the monitor point as a final exit sensor to cancel the exit timer when
the monitor point returns to its normal state after being triggered.

270
Symmetry Software Reference Manual

The exit timer of the area associated with the monitor point terminates two seconds after the monitor point
and all entry/exit zones in the area are in their normal states.
Transaction Reporting
This specifies whether the message causes an alarm, event or is not reported at all at the monitor point's node.
This specification is at the node level, not at the server level. Therefore, although you may define a message as
an alarm in this screen, in the "Operation/Alarms/Reporting" screen, you may define that the message is to be
reported as an event at the server. Such an approach may be needed if it is important for a node on a remote
site to communicate the message to the server immediately (only alarms are sent immediately to the server).
Note that the "Operation/Alarms/Routing" screen specifies the name of the client that alarms are sent to and at
what times.

Note: The transaction reporting definition at the node level of Monitor Point Circuit Open and Monitor Point
Circuit Shorted messages cannot be modified from the default of "Event". If you select one of these node
types in the "Install/Access Control/Monitor Point" screen, these messages are removed from the Transaction
Reporting list.

See Alarm/Event Messages for details of each message.


Comms Receiver Alarm Type
This field is relevant only if a communications receiver is set up in the "Maintenance/User &
Preferences/System Preferences" screen.
Choose whether an alarm generated by the monitor point should be reported as a burglary, fire or generic
alarm.

Auxiliary Output Definitions ("Install/Access Control/Auxiliary


Output")

Introduction to this Screen


Purpose of the Screen
This screen enables you to set up and name each auxiliary output relay connected to a node.

Note: The Selection screen lists auxiliary outputs with their chain, node, multiNODE-2100/2150 controller and
auxiliary output addresses. For example, 1/001/2/4 means chain 1, node 001, controller 2 and auxiliary output
4. For auxiliary outputs not connected to a multiNODE-2100 or multiNODE-2150 controller, the controller
address is not applicable and therefore the controller address is shown as "-"; for example, 1/001/-/4.
Note: For M4000 nodes, all configuration of auxiliary outputs is carried out in the web interface, not in this
screen. The auxiliary outputs set up in the web interface are automatically imported into this screen.

Prerequisites
The node that the auxiliary output is connected to must have been set up using the "Install/Access
Control/Node" screen.

About the Options


Auxiliary Output Description
A unique name for this auxiliary output.
For M4000 nodes, if an auxiliary output is deleted in the web interface, the name is prefixed with "Del", but
remains undeleted. This allows you to view, modify or remove any locations where the auxiliary output is used
in Symmetry, such as in access rights or commands.

271
Auxiliary Output Definitions ("Install/Access Control/Auxiliary Output")

Location
Click here for information about this option.
Category
Click here for information about this option.
Owned by this Company
Select the company that is to own the auxiliary output.
Node Description
The node or controller that the auxiliary output is connected to.
Controller Description
This pull-down list is displayed only if you have selected a multiNODE-2100 or multiNODE-2150 node type.
Choose the controller that the auxiliary output is connected to.
Auxiliary Output Number
This specifies which output on the node the auxiliary output is connected to. Outputs that are already used are
not displayed in the pull-down list.
Note: M2150 4DCs, 4DCNs and 4DBCs have unusual input/output numbering when a 4IN-8OUT module is
used:
 4IN-8OUT first module: inputs 1 to 4; outputs 1 to 4, and 9 to 12.
 4IN-8OUT second module: inputs 9 to 12; outputs 5 to 8, and 13 to 16.
The numbering when an 8IN-4OUT is used on an M2150 4DC, 4DCN or 4DBC is as expected:
 8IN-4OUT first module: inputs 1 to 8; outputs 1 to 4.
 8IN-4OUT second module: inputs 9 to 16; outputs 5 to 8.
 8IN-4OUT first module: inputs 1 to 8; outputs 1 to 4.
 8IN-4OUT second module: inputs 9 to 16; outputs 5 to 8.
For an M2100 elevator node:
 If the elevator node is used for one cab, auxiliary outputs 1 to 64 are available to control floors 1 to
64.
 If the elevator node is used for two cabs, auxiliary outputs 1 to 16 are for the first 16 access-
controlled floors for cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the first 16 access-
controlled floors for cab 2 (reader 2). Auxiliary outputs 33 to 48 are for the last 16 access-
controlled floors for cab 1 (reader 1). Auxiliary outputs 49 to 64 are for the last 16 access-
controlled floors for cab 2 (reader 2).
 If the elevator node is used for three or four cabs, auxiliary outputs 1 to 16 are for the 16 access-
controlled floors for cab 1 (reader 1). Auxiliary outputs 17 to 32 are for the 16 access-controlled
floors for cab 2 (reader 2). Auxiliary outputs 33 to 48 are for the 16 access-controlled floors for cab
3 (reader 3). Auxiliary outputs 49 to 64 are for the 16 access-controlled floors for cab 4 (reader 4).
On an EN-2DBC or M1100/M1200/M1400 node (collectively known as M1000 nodes), relays marked
"AUXILIARY" (M1000) or "OUTPUT" (EN-2DBC) on the PCB can be used for auxiliary outputs or to bypass
devices, but not for both purposes. The Bypass Relay Operation option in the "Install/Access Control/Reader"
screen determines which of these two purposes the relay is used for. For example, if you set By Pass Off for
reader port 2, this allows the relay to be used as auxiliary output 2. Any other setting will cause the relay to be
used for bypassing.
Pulse Time
When the auxiliary output receives a pulse command, it operates for the specified pulse time, then reverts
automatically to its quiescent state.
The value you can enter here depends on the node type. The system validates the value you enter.
Output relay configuration for the Controls license

272
Symmetry Software Reference Manual

Disconnected Door Screen ("Install/Access Control/Disconnected


Door")

Introduction to this Screen


Purpose of the Screen
This screen enables you to set up an interface to SALTO locking systems. The screen is available only if a
license for this interface has been added in the "Maintenance/Licensing/System Licenses" screen.
The Disconnected Doors Installation and User Guide gives details of how to install, configure and operate the
interface.

About the Options


SALTO Server Name
Enter the name of the SALTO server (case sensitive).
SALTO Port Number
Enter the number of the port at the SALTO server that will be used for communications with the Symmetry
software. This must match the SALTO server port number specified in the SHIP tab of the SALTO
System/General Options screen.
Incoming Port Number
Enter the number of the port at the Symmetry server that will be used for communications with the SALTO
software. This must match the HOST server port number specified in SHIP tab of the SALTO System/General
Options screen.
Short Term Expiration
This determines the number of days within which card holders must present their card to a SALTO online
reader. This ensures that transactions stored on the card from offline readers are downloaded to the SALTO
database within a reasonable period of time.
The card will not be able to be used at offline readers if it is not used at an online reader within the specified
period. The time period resets each time the card is used at an online reader.
This option has the same meaning as Default expiration period in the Users tab of the SALTO
System\General options screen, although the setting here overrides the setting in the SALTO software.

Note: This setting does not apply to a card that is an executive card (as set in the "Home/Identity/Card Holders"
screen). A fixed expiration period of one year applies to executive cards.
Note: A card is cancelled and cannot be used at any reader if it is not used within the Expired keys time
period, as specified in the Visitors tab of the SALTO System\General Options screen.

Transaction Polling Interval


Determines the interval (in minutes) between each poll of the SALTO database to obtain new card transactions.
Polling does not update the Symmetry database with any changes made to doors, timezones or other settings
in the SALTO software; use the Refresh button for that purpose.
Starting Card Sector
Set Starting Card Sector to between 2 and 6 (inclusive) if you are using 1k MIFARE cards, or between 2 and
22 (inclusive) if you are using 4k cards. Sector 1 (the first sector on the card) cannot be used. The number of
sectors used from this starting card sector depends on the Number of Sectors To Use setting.
The starting card sector you choose will depend on the number of sectors selected in Number of Sectors To
Use and whether the cards are to be used for other purposes. For example, starting at card sector 15 on a 4k
card is not acceptable if sector 16 is used for other purposes.

273
Disconnected Door Screen ("Install/Access Control/Disconnected Door")

Number of Card Sectors To Use


This setting determines the number of card sectors to use to store transactions from offline SALTO readers.
The default of 9 sectors allows 12 transactions to be stored. Each additional sector allows six more transactions
to be stored.
You can use the maximum of 13 for 1k or 4k cards.

Note: You can safely increase this value at an operational site. However, if in the unlikely event of having to
decrease this value, existing cards will not function correctly and will need to be replaced. Re-encoding the
existing cards is not sufficient.

Mifare SAM Key A/B


Enter the SALTO Authorization Media (SAM) keys for this site. Each site has unique keys.
Personal Data Settings
Choose the personal data title to use for each card setting. For example, if you choose Personal Data Title 1
for "Office", the first personal data title in the "Setup/Identity/Personal Data/Card Holder Titles" screen will be
set to "Office".
Select a personal data title for each of the five card settings.
You can set each of the card settings to "Yes" or "No" in the "Home/Identity/Card Holders",
"Home/Identity/Visitors" or "Home/Identity/Bulk Card Amendments" screen (it is normal to set each setting to
"Yes"). The meaning of each setting is as follows:
Office
If set to "Yes", the card holder is able to switch an offline door between a permanently locked and
permanently unlocked state. To switch between states, the card holder must open the door, keep the
inside handle pressed down and present the card.
Only doors configured for Office mode in the Doors screen of the SALTO software can be operated in this
way.
Audit Openings
If set to "Yes", the card will store "door open" transactions from offline doors. The transactions are
transferred to the SALTO database, and then on to the Symmetry database, when the card is used at an
online reader.
The number of transactions that can be stored on the card is dependent on the Number Of Card Sectors
To Use setting. If the card becomes full, a new transaction overwrites the oldest transaction. Note that
audit openings and rejections are not stored in separate areas of memory, which means that an audit
openings may overwrite an audit rejection if the memory becomes full.
Audit Rejections
If set to "Yes", the card will store "rejected" transactions from offline doors. The transactions are
transferred to the SALTO database, and then on to the Symmetry database, when the card is used at an
online reader.

Note: The Audit Openings setting must also be set to "Yes" to store audit rejections.

The number of transactions that can be stored on the card is dependent on the Number Of Card Sectors
To Use setting. If the card becomes full, a new transaction overwrites the oldest transaction. Note that
audit openings and rejections are not stored in separate areas of memory, which means that an audit
openings may overwrite an audit rejection if the memory becomes full.
Last Reject
If set to "Yes", the card will separately store the last "rejected" transaction from an offline door.
The Audit Rejections setting does not need to be set to "Yes" to store the last reject.

274
Symmetry Software Reference Manual

Low Battery Warning


If set to "Yes", the card will store "Low Battery" warnings from offline readers.

Note: Any existing personal data titles are overwritten when you save changes. For example, if the first
personal data title is currently set to "Gender", and you set "Office" to Personal Data Title 1, the first personal
data title in the "Setup/Identity/Personal Data/Card Holder Titles" screen will change from "Gender" to "Office".
Note: If a setting is changed from "Yes" to "No" for an existing card, the card must be re-encoded.

Refresh
Click this button to update the Symmetry database with any changes made in the SALTO software, such as to
doors, timezones and door groups.
A refresh is also performed when the Symmetry software is restarted.

Intrusion System Configuration ("Install/Intrusion/Intrusion/System


Configuration")

Introduction to this Screen


Purpose of the Screen
Use this screen to define the intrusion systems connected to Symmetry.
Please refer to the Intrusion Management Installation and User Guide for an overview of intrusion management
and step-by-step instructions on how to configure and use the software.
For a Bosch B9512G panel, any users, areas, zones and outputs configured at the panel are uploaded to
Symmetry when you add the panel in this screen. For other panel types, you must use the
"Install/Intrusion/Intrusion/Upload Configuration" screen to carry out this task. Note: any user at a Bosch
B9512G panel who has a Bosch Authority Level of zero is not uploaded.

Options
Panel Description
Specify a name for the intrusion system.
Location and Category
These options are available only if you have selected a Bosch panel.
You can use these menus to specify a location and/or category for the panel.
You can specify a new location/category by typing in the relevant field, or you can select an existing
location/category.
The location and category can be displayed when viewing alarms and events.
Client Name
Select the name of the client that the intrusion system is connected to (serial connection) or is managed by
(LAN connection).
Company
Select the company that is to own the intrusion system.
This option is grayed out for an existing intrusion system if any device associated with it has been added to a
graphic or is assigned to a trigger, scheduled, threat level or predefined command.

275
Intrusion System Configuration ("Install/Intrusion/Intrusion/System Configuration")

Port Name
If the panel communicates to the client though a serial port, select the serial port. If the panel communicates
over a network, select the name of the LAN chain that the panel uses for communications.
If you want to set up a Bosch B9512G or Siemens (Vanderbilt) panel, you can select Create a new port.
Type
Select the make and model of the panel. This affects the options displayed in the lower area of the screen.
Offline Interval
If the alarm panel is offline for the specified period, an Intrusion Panel Timed Out alarm/event message is
generated. A value of 0 disables offline checking.
The option is grayed out and set to zero for some panel types.
Password
For a DMP system, enter the password that the Symmetry software needs to log in to the intrusion system to
establish communications. In DMP systems, this is known as the Remote Key.

System-Specific Options
DMP XR200 (also use for DMP SCS-1R)
Area Account Number
Specify the area account numbers to be recognized from the intrusion system. For each account number,
enter the number in the field and click Add. To remove an area account number, highlight the number and
click Remove.
Refer to the DMP documentation for details of the meaning of area account numbers.
Area Account Description
You can add a descriptive name for the account number.
Panel Account Number
Specify the account number of the intrusion system. This must match the account number configured into
the intrusion system itself.
Panel Account Description
You can add a descriptive name for the panel account.
Enable Ack for SCS
Select this option if you want the Symmetry software to communicate with the intrusion system using the
DMP SCS protocol. Selecting this option changes the protocol to enable the Symmetry software to
acknowledge alarm messages and prevent the intrusion system from sending multiple messages.
This option is applicable if the SCS1 receiver box is used. The option should not be selected if an SCS1
receiver box is not used.
Baud rate
This is displayed only if the intrusion system connects to a Symmetry client through a serial link. Select the
same baud rate that has been set at the intrusion system.
LAN Interface
This is displayed only if the intrusion system connects to Symmetry through a network. Select MSS1, or
iCOM if the intrusion system is fitted with an iCOM pad.
Port
This option is relevant only if LAN Interface is set to iCOM. Specify the iCOM port number as defined at
the intrusion system (for example, 2001).
Each intrusion system managed by the same Symmetry client MUST have a unique iCOM port number.

276
Symmetry Software Reference Manual

DMP XR500N\XR500
Panel Account Number
Specify the account number of the intrusion system. This must match the account number configured into
the intrusion system itself.
Enable Ack for SCS
Select this option if you want the Symmetry software to communicate with the intrusion system using the
DMP SCS protocol. Selecting this option changes the protocol to enable the Symmetry software to
acknowledge alarm messages and prevent the intrusion system from sending multiple messages.
This option is applicable if the SCS1 receiver box is used. The option should not be selected if an SCS1
receiver box is not used.
LAN Interface
This is displayed only if the intrusion system connects to the Symmetry through a network. UDP is
automatically selected.
Alarm Port (UDP)
Specify the alarm port number configured at the intrusion system. Use a different port number for each
intrusion system.
Command Port (IP)
Specify the port number used for commands, as defined at the intrusion system (for example, 3001).
Each intrusion system managed by the same Symmetry client MUST have a unique command port
number.
Full Status Updates
When Full Status Updates is not selected, Symmetry derives the status of zones from messages sent by
the panel. If an "alarm" message is received, Symmetry assumes that the zone is in alarm. If a "trouble"
message is received, Symmetry assumes that the zone is in a fault condition. (The messages sent from
the panel are user configurable and an "alarm" or "trouble" message does not necessarily represent the
actual state of a device.)
Selecting Full Status Updates causes Symmetry to request full status information when a message is
received. To obtain this information, Symmetry must log into the intrusion panel, which can slow down the
system.
DSC 4020, DSC 4030, HISEC CU30 and HISEC ThorGuard
Baud rate
This is displayed only if the panel connects to a Symmetry client through a serial link. Select the same
baud rate that has been set at the panel.
Full Status Updates
When Full Status Updates is not selected, Symmetry derives the status of zones from messages sent by
the panel. If an "alarm" message is received, Symmetry assumes that the zone is in alarm. If a "trouble"
message is received, Symmetry assumes that the zone is in a fault condition. (The messages sent from
the panel are user configurable and an "alarm" or "trouble" message does not necessarily represent the
actual state of a device.)
Selecting Full Status Updates causes Symmetry to request full status information when a message is
received. To obtain this information, Symmetry must log into the intrusion panel, which can slow down the
system.
Galaxy Dimension
Panel Account Number
Specify the account number of the intrusion system. This must match the account number configured into
the intrusion system itself.

277
Intrusion System Configuration ("Install/Intrusion/Intrusion/System Configuration")

Galaxy Type
Specify the model of Galaxy panel.
Ack Port
This is displayed only if the panel connects to a Symmetry client through a LAN.
This port number is hard-coded in the panel.
Alarm Port
This is displayed only if the panel connects to a Symmetry client through a LAN. It defines the port on the
Symmetry client that will receive alarms. The PORT NO setting on the panel (option 56.4.02.2.2) must
match this setting.
Command Port
This is displayed only if the panel connects to a Symmetry client through a LAN.
This port number is hard-coded in the panel.
Baud Rate, Data Bits, Stop Bits, Parity
This is displayed only if the panel connects to a Symmetry client through a serial link. Select the same
settings as set at the panel.
Onboard RIO on line 0
Zone addresses for a Galaxy panel are in the format yxxn, where:
 y is the line number (normally 1-4)
 xx is the RIO block number (00-15)
 n is the zone number (1-8)
If Onboard RIO on line 0 is set for a GD-264 or GD-520, an additional 8 zones are available with
addresses 0011-0018. In this case, the line number is 0.
Siemens (Vanderbilt) SPC
Receiver Port
This is the port belonging to the client (specified by Client Name) that is used to receive alarms from the
panel and send commands from Symmetry.
Enter the Receiver Port specified in the Siemens (Vanderbilt) EDP Receiver definition (as configured in
the "Communications/EDP Settings" screen of the Siemens (Vanderbilt) SPC Pro software). For further
information, please refer to the Intrusion Management Installation and User Guide.
This port must be added to the firewall exceptions at the client.
IP Address
Enter the IP address of the Siemens (Vanderbilt) panel.
Receiver ID
Enter the Receiver ID specified in the Siemens (Vanderbilt) EDP Receiver definition (as configured in the
"Communications/EDP Settings" screen of the Siemens (Vanderbilt) SPC Pro software). For further
information, please refer to the Intrusion Management Installation and User Guide.
EDP Panel ID
Enter the EDP Panel ID, as specified using the Siemens (Vanderbilt) SPC Pro software, in the Settings tab
of the "Communications/EDP Settings" screen. For further information, please refer to the Intrusion
Management Installation and User Guide.
Encrypted/Key
If you have set up the panel for encrypted communications, select Encrypted and enter the key.
Encryption is enabled and the key set up in the Siemens (Vanderbilt) EDP Receiver definition (as
configured in the "Communications/EDP Settings" screen of the Siemens (Vanderbilt) SPC Pro software).

278
Symmetry Software Reference Manual

Time Zone
Select the time zone in which the device is located. This ensures that any alarm/event messages displayed
in the Symmetry software show a date and time that corresponds to the location where the device is
installed.
Symmetry updates the time at the panel when it connects to the panel, including after a period of non-
communication. The time zone specified here determines the time sent to the panel.
The selected time zone also determines the date and time when any daylight-savings time changes occur.
Bosch B9512G
IP Address
Enter the IP address of the Bosch panel. This must be the same as the IPv4 Address specified in the
Bosch RPS Software.
Port
Enter the port number of the Bosch panel Symmetry must use for communications. This must be the same
as the TCP/UDP Port Number specified in the Bosch RPS Software.
Passcode
Enter the passcode of the Bosch panel. This must be the same as the Automation Passcode specified in
the Bosch RPS Software.
Fixed Passcode Length
Enter the required length of passcodes (IDS codes). This must be the same as Passcode Length
specified in the Bosch RPS Software.
If, for example, you specify 4, all IDS codes must be four digits long. A value of 0 is the same as a setting
of Disabled for Passcode Length in the Bosch RPS Software.
Resync
If changes have been made to the configuration of the Bosch panel, it is important to use Resync to keep
Symmetry in alignment with the current configuration of the panel.
To re-sync, click Resync followed by OK.
The re-sync can take several minutes, during which the "Home/Monitoring/Command Centre" screen
shows "Awaiting status information" against the status of the panel.

Intrusion Device Configuration ("Install/Intrusion/Intrusion/Device


Configuration")

Bosch B9512G, Siemens (Vanderbilt), DMP XR500N\XR550, DSC PC4030 (via


SN4442), HISEC and Galaxy Panels
Introduction
You can use the "Install/Intrusion/Intrusion/Device Configuration" screen to:
 Rename the following uploaded from the intrusion system (as appropriate):
panels
areas
zone groups
zones
outputs

279
Intrusion Device Configuration ("Install/Intrusion/Intrusion/Device Configuration")

The new names are used only within the Symmetry software and do not affect the names stored at the
intrusion system.
 Associate a graphic created in the "Setup/Graphics/Add" screen with an area or zone group. If an
area or zone group icon is added to a graphic, double-clicking the icon in the
"Home/Monitoring/Graphics" screen displays the associated graphic. More than one area or zone
group can be associated with the same graphic.
 For an area, use the Permissions button to specify the user roles that are allowed to arm or disarm
the area or display the area in the Command Center. Note: The Ignore/Bypass Permission
Filters option in the "Maintenance/User & Preferences/Accounts" screen may override the
specified permissions for specific users.
 If required, select any M2150 arming/disarming readers that are to be used to arm or disarm a
selected area. (Not supported for Galaxy panels.)
Using the Selection Screen
In the Selection screen:
1. Select the intrusion system from the Intrusion System menu.
2. Select Panels, Areas, Zone Groups, Zones or Outputs (as applicable) from the Intrusion Device menu.
Some of these options may not be available, depending on the type of intrusion system.
3. Click Find.
4. Double-click the panel, area, zone or output you want to configure, and make the required changes in the
screen displayed.
The options in the Definition screen are described next.
Options in the Definition Screen
Alias Name
Specify the name to use for the device in the Symmetry software.
Area/Zone Group Graphic
You can associated a graphic with an area or zone group. Please refer to the introduction above for further
information.
Setup tab
Use this tab to name the device.
Controlling Readers tab
You can use this tab to enable M2150 arming/disarming readers to arm or disarm a selected area
controlled by a Bosch 9512G, Siemens (Vanderbilt), DMP XR500N\XR550, DSC PC4030 (via SN4442) or
HISEC (CU30 or ThorGuard) panel.
How to configure the Symmetry software
To use this feature:
1. Define the arming/disarming readers in the "Install/Access Control/Reader" screen.
2. Open the appropriate area from the "Install/Intrusion/Intrusion/Device Configuration" screen.
3. In the Controlling Readers tab, choose the M2150 node from the Symmetry Panel menu.
Any arming/disarming reader connected to the node can be used to arm or disarm the area.
For this to function, a card holder requires only the area to be in their access rights. Readers
that have Final Exit or Entry/Exit Route selected are not listed.
4. Decide whether or not to move readers into the Readers Assigned box. If you move a
reader into the Readers Assigned box, a valid access-control transaction at the reader will
disarm the area and open the door. For this to function, the reader and area must be in the
card holder access rights.
Notes:

280
Symmetry Software Reference Manual

 A M2150 arming/disarming reader cannot be used to control both M2150 and third-
party areas. The left side of the tab does not display readers that are already
assigned in an M2150 area.
 A reader can be assigned to only one area.
Timeout
This specifies the maximum period of time that the M2150 node waits to receive an arming or
disarming acknowledgement messages from the third-party intrusion system. An acknowledgement
message must be received within the specified period to avoid a "Remote Area Timeout on Arming"
or "Remote Area Timeout on Disarming" event.
Degraded Mode When Offline
The selected option determines system behavior if the third-party intrusion system loses
communication with the M2150 node:
 Prevent Access Control only Arm/Disarm - If the area is in an armed state at the
time of the communication loss, card holders are prevented from opening the door. If
the area is in a disarmed state, card holders can open the door, access rights
permitting. The reader displays "Fail-check status".
 Continue with Access Control only Arm/Disarm - Card holders can open the door
(access rights permitting), irrespective of whether the area is in an armed or disarmed
state at the time of the communication loss. This allows a repair technician to restore
the communication loss should the third-party intrusion system be located inside the
area. The reader displays "Fail-Doors armed" in the armed state and "Fail-Doors
disarmed" in the disarmed state.

DMP XR200, DSC PC4020 and DSC PC4030 (with SRI) Panels
Introduction
You can use this screen to map transactions from the intrusion system to new Symmetry alarm/event
messages. You can set up different Symmetry alarm/event messages for each intrusion system.
An intrusion system can generate many different transactions, such as those to indicate burglary alarms, fire
alarms and arming/disarming sequences. The Symmetry software can recognize these transactions only if you
use this screen to map the transactions to new Symmetry alarm/event messages.
Each alarm/event message can represent one or more intrusion transactions. For example, you may decide to
create an alarm/event message for burglary alarms from a specified zone, and another for all fire alarms,
irrespective of the zone they relate to.
The system prevents duplicates of the same definition from being created (even if they have different
Description text). However, it is possible to create overlapping definitions. In this case, when a transaction is
received from the intrusion system, the system chooses the definition that is the most specific. Click here for an
example.
The following are examples of DMP transactions. The second of the following two definitions is used if a
burglary alarm occurs for zone 3 in area 2, since it more closely matches the actual transaction.
Example 1:
Event Definition = Zone Alarm
Message Type = Zone: Burglary
Zone Number = 3
Example 2:
Event Definition = Zone Alarm
Message Type = Zone: Burglary
Zone Number = 3
Area Number = 2
In the Selection screen:

281
Intrusion Device Configuration ("Install/Intrusion/Intrusion/Device Configuration")

1. Select the intrusion system in the Intrusion System menu.


2. Select Transactions in the Intrusion Device menu.
3. Click Find to display the Symmetry alarm/event message, or New to create a new one.
Using the Selection Screen
In the Selection screen:
1. Select the intrusion system in the Intrusion System menu.
2. Select Transactions in the Intrusion Device menu.
3. Click Find to display the Symmetry alarm/event message, or New to create a new one.
The options in the Definition screen are described next.
Options in the Definition Screen
Description
Use this field to specify the name of the Symmetry alarm/event message.
Note: For DMP transactions, the text used for the Symmetry alarm/event message is taken from the
transaction message if Use Message Descriptions is selected.
Owned by Company
Select the company that is to own the Symmetry alarm/event.
Intrusion System
If you choose the option that begins with "(All)", the Symmetry alarm/event message is generated if any
intrusion system of the specified type sends the defined transaction.
Selecting the panel transactions (central area of screen)
The options displayed in the central area of the screen depend on the Intrusion System you have
selected. Choose the intrusion system transactions to be represented by the Symmetry alarm/event
message.
For example, to set up a Symmetry alarm/event to represent all zone burglary alarms from zone 3 of a
DMP panel, select:
 Zone Alarm in Event Definition.
 Zone: Burglary in Message Type.
 3 in Zone Number.
Similarly, to set up a Symmetry alarm/event to represent all zone fire alarms irrespective of zone, select:
 Zone Alarm in Event Definition.
 Zone: Fire in Message Type.

Note: Refer to the intrusion system's documentation for further information.

DMP Options
Select the Event Definition and Message Type.
For DMP panels, each Event Definition and Message Type is represented by a 3-character
mnemonic. If special transactions are being passed from the intrusion system, select Custom and
enter the 3-character mnemonics as necessary.
Note: Leaving any of the fields blank below Message Type means "match all".
Use Message Descriptions - Select this option if you want the Symmetry alarm/event message to
use the embedded text in the DMP transaction, rather than the text in the Description field. Any
DMP user name contained in the embedded string will be mapped to the Who field in the Symmetry
message, with the remaining text mapped to the What field.

282
Symmetry Software Reference Manual

DSC 4030 Options


Use the fields and operator to specify the transaction message from the panel.
Use Field 1 as Alarm "Who" - Select this option if you want the "who" information in the Symmetry
alarm/event message to be the text from field 1 of the DSC 4030 message (the same as the "where"
information).
DSC 4020 Options
Use Event Definition to select the DSC 4020 transaction.
Leaving any of the fields under Event Definition blank means "match all".
Disable Transaction
Select this option if you do not want the transaction to generate a Symmetry alarm/event. You may want to
use this option to temporarily disable the transaction definition, rather than deleting it completely.
Enable Alarm Update
Selecting this option prevents multiple messages for the same alarm from appearing in the
"Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen. If you select this option, the
alarm you have defined in this screen will be prevented from appearing more than once at a time in the
"Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen. This applies even if the alarm is
triggered by different transactions from the intrusion system. Instead, only the time will be updated.
If you do not select the option, multiple messages for the same alarm can appear in the
"Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen.
Selecting the option will not prevent multiple trigger commands from being triggered by the alarm, if set up.
Reset Transaction
This pull-down menu enables you to specify an alarm/event message (previously created in this definition
screen) that will be recognized as a reset condition for the alarm/event you are currently defining. The
"Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen will prevent the alarm from being
cleared until the reset alarm/event message has occurred.

Intrusion System Upload ("Install/Intrusion/Intrusion/Upload


Configuration")

Introduction to this Screen


Purpose of the Screen
This screen is applicable only to Bosch B9512G, Galaxy panels and other intrusion systems that are supported
by the Full Intrusion Management interface.

Note: For the Bosch B9512G panel, this screen can be used only to find the current status of devices using the
Resync Status button.

For all but the Bosch B9512G panel, use the screen to upload details of the following configured at the intrusion
system (as appropriate):
panels
areas
zone groups
zones
outputs
users

283
Intrusion System Upload ("Install/Intrusion/Intrusion/Upload Configuration")

The details are uploaded to the Symmetry database and can be displayed in the "Home/Monitoring/Command
Center" screen.
Although you can choose to upload specific data, it is recommended that you use the default All Data setting
and click OK to upload all data.
The Symmetry software checks for changes each time you perform an upload. In this way, you can keep the
Symmetry software in step with any changes at the intrusion system, such as to the number of zones and areas
defined. Changes to names are made only if Upload descriptions for existing devices is selected.
If panels, zones, areas, and other items are removed from the intrusion system's database, they are
automatically removed from the Symmetry database only if not already assigned to a command or graphic in
the Symmetry software. Any items that are not automatically removed are listed in a report generated on
completion of the upload.
Please refer to the Intrusion Management Installation and User Guide for an overview of intrusion management
and step-by-step instructions on how to configure and use the software.
ThorGuard CU Configuration
In the ThorGuard Management Software:
 Set "Single Import/Export Event" in the Options tab of the ThorGuard CU Editor.
 If "Mask User ID" is not set, make sure that no user profiles have "Login with PIN" selected. If "Mask
User ID" is set, the setting for "Login with PIN" can be set or unset as required.
Siemens (Vanderbilt) System Devices
By default, the upload process automatically creates 21 zones that represent "system devices" under an area
named "System". These zones allow you to use the "Home/Monitoring/Command Center" screen to, for
example, see which system alerts are active and which need to be cleared before areas can be armed.

Options
Intrusion System
Select the intrusion system to upload, as defined in the "Install/Intrusion/Intrusion/System Configuration"
screen.
All Data
Select this option if you want all data from the selected intrusion system to be uploaded.
Specific Data
Select this option to choose specific categories of data to upload. The options, as described below, vary
depending on system selected.
Areas
Zone Groups
Zones
Outputs
Panel
Users
Upload descriptions for existing devices
Deselecting the option (the default) protects any changes you have made to the names in the
"Install/Intrusion/Intrusion/Device Configuration" screen. Select this option if you want the names to be
overwritten each time you perform an upload.
Remove Symmetry cardholder assignment if intrusion user no longer exists
Selecting this option causes the Symmetry software to remove all intrusion users from its database that no
longer exist in the intrusion system. The intrusion users will be removed from any assigned card holder access
rights.

284
Symmetry Software Reference Manual

Report destination
A report is produced on completion of the upload. Using the pull-down list, choose whether to send the report to
the screen, printer or file. If you send the report to a file, a dialog is displayed that enables you to specify the
report file name.
Resync Status
Clicking this button obtains the current status (for example, armed/disarmed status) of zones, areas and other
items from the intrusion system and updates the status as shown in the "Home/Monitoring/Command Center"
screen. Under normal circumstances, it should not normally be necessary to select this option.

HiSec Integration Configuration Screen


("Install/Intrusion/Intrusion/HI SEC Integration")

Introduction to this Screen


Purpose of the Screen
Use this screen to specify the communication settings that will enable the Symmetry software to obtain alarm
information from the ThorGuard Management software over the network.
The screen is available only if the HiSec Symmetry Video Management software is installed.
Please refer to the HiSec Symmetry Video Management Installation and User Guide for an overview of the
interface and step-by-step instructions on how to configure and use the software.

Options
Database Location
Specify the IP address of the computer that holds the ThorGuard database. This is normally the same as the IP
address of the ThorGuard server.
Database Name
Specify the name of the ThorGuard database. This is specified in the ThorGuard Database options, which are
accessed from the ThorGuard client user interface (select File/Database Options).
ThorGuard Server Address
Specify the IP address of the ThorGuard server.
ThorGuard Server Port
Specify the port number Symmetry should use at the ThorGuard server. This is normally 4451. The port
number is specified in the IP Listen Port field, which is displayed in the ThorGuard server settings.
User Logon
Specify the user name of an operator of the ThorGuard client.
User Password
Specify the password of an operator of the ThorGuard client.

285
Status Color Configuration Screen ("Install/Intrusion/Intrusion/Status Color Configuration")

Status Color Configuration Screen


("Install/Intrusion/Intrusion/Status Color Configuration")

Introduction to this Screen


Purpose of this screen
Use this screen to specify the colors to use to represent area, zone and zone group status in the
"Home/Monitoring/Graphics" screen.
For zones, the selected color affects the border around zone icons. For areas and zone groups, the selected
color affects the icon background fill. You can also choose whether the border/fill should flash.
Zone groups are applicable only to certain intrusion systems.
Using the screen
Choose the intrusion system from the System Type menu, then the appropriate option from the Device menu.
To change a color or flash setting, double-click a status, or select the status and click Open.

Options
System Type
Choose the intrusion system.
Device
Choose whether to set up the colors for area, zone or zone group status.
Status
The meaning of each status is self-explanatory, with perhaps the exception of the following:
Area Normal - The area is no longer in an alarm state.
Area Armed with Reduced Security - Click here for details.
Area Has Problems - A fault, tamper or alarm condition exists.
Zone Normal - The zone is no longer in an alarm state.
Zone In Fault - Click here for details.
Zone In Tamper - Click here for details.
Zone Group Armed with Reduced Security - Click here for details.
Zone Group Normal - The zone group is no longer in an alarm state.
Zone Group Has Problems - A fault, tamper or alarm condition exists.
Color options (displayed by double-clicking a status):
Color
Select the color (relevant only if Selected Color is selected).
Selected Color
Choose this if you want the selected status to be represented by the selected color.
No Color
Choose this if you do not want the selected status to be represented by a color.
Use Arm/Disarm Color
Choose this if you want the selected status to be represented by the armed or disarmed color. The Flash
option can be used to distinguish between the armed/disarmed status and the status you are currently
setting up.

286
Symmetry Software Reference Manual

Flash
Choose this if you want the border/fill to flash when the selected status occurs.

Communications Receiver Clients Definition


("Install/Intrusion/Communication Receiver/Clients")

Introduction to this Screen


Use this screen to define each Bosch DD6600 intrusion communications receiver being used to transmit alarms to
the Symmetry software.
For a general overview and further details of the communications receiver interface, please refer to the Intrusion
Management Installation and User Guide.

About the Options


Description
Enter a name for the communications receiver.
Client Name
If the communications receiver uses a serial interface, select the Symmetry client PC that the communications
receiver is connected to.
If the communications receiver is connected to the network, select the Symmetry client PC that is managing
communications (as set up in the "Install/System/Client Ports" screen).
Company
Select the name of the company that is to own the communications receiver.
Port Name
If the communications receiver uses a serial interface, select the COM port that the communications receiver is
connected to.
If the communications receiver is connected to the network, select the LAN chain set up for the communications
receiver (as set up in the "Install/Access Control/Chains/LAN" screen).
Com Port Settings
If a serial connection is used to the communications receiver, specify the serial communications settings as set
at the receiver. The default settings match the defaults at the receiver.
LAN Settings
If a network connection is used, enter the Port Number that the D6680 uses for communications. By default,
the D6680 uses port number 2001.

Communications Receiver Zones Definition


("Install/Intrusion/Communication Receiver/Zones")

About this Screen


You can use this screen to provide a description for each zone belonging to an account set up in the
"Install/Intrusion/Communication Receiver/Accounts" screen. For example, you may want to name zone 0003
belonging to "Group 4 Technology" as "Front door".

287
Communications Receiver Accounts Definition ("Install/Intrusion/Communication Receiver/Accounts")

If a description is provided, the "Home/Monitoring/Alarms" screen displays the zone description rather than the zone
number in any alarm messages that relate to the zone. This makes it easier to understand the meaning of alarm
messages displayed in the "Home/Monitoring/Alarms" screen.
For a general overview and further details of the Bosch DD6600 communications receiver interface, please refer to
the Intrusion Management Installation and User Guide.

Communications Receiver Accounts Definition


("Install/Intrusion/Communication Receiver/Accounts")

About this Screen


Use this screen to provide a description for each account number that can appear in alarm messages sent to a
communications receiver. Normally, the description will include the name of the company that the account number
belongs to.
Adding descriptions makes it easier to identify the source of alarms displayed in the "Home/Monitoring/Alarms"
screen.
For a general overview and further details of the Bosch DD6600 communications receiver interface, please refer to
the Intrusion Management Installation and User Guide.

Digital Video Device Selection Screen

Introduction
The Digital Video Device Selection screen is displayed when you select "Install/Video & Audio/Digital Video". You
can use the screen to set up devices such as digital video servers, recorders and cameras.
The area of the left side of the screen lists the types of digital video device you can configure.

Using the Screen


You can set up a new device by double-clicking the device type on the left side of the screen, or by selecting the
device type and clicking New. This displays a Definition screen, which enables you to specify configuration settings
for the device.
Selecting a digital video device type on the left side of the screen lists on the right-hand side of the screen any
devices of that type that have already been configured. Selecting <All Cameras> lists all cameras. Selecting <All
Servers> lists all video servers, video encoders, NVRs and DVRs. Double-clicking a device on the right-hand side
of the screen, or selecting the device and clicking Open, enables you to view or edit the device configuration
settings.
You can use the Description field to filter the devices listed on the right-hand side of the screen. The filter can
include wildcards and is applied when you choose a device type on the left side of the screen or click Find.
The Group By menu allows you to group devices in the Selection screen according to a selected attribute, such as
the location or category of the device, as defined in the Definition screen. The Selection List Rows Limit option in
the "Maintenance/User & Preferences/Client Preferences" screen determines the maximum number of devices
listed.

288
Symmetry Software Reference Manual

Axis Cameras ("Install/Video & Audio/Digital Video")

Introduction
Purpose of this Screen
This screen enables you to define the settings for a camera attached to a selected Axis video server. The
screen is available only if a Symmetry camera license is installed.

General Options
Description
Enter a unique name for the device.
Video Recorder
Select the Axis video server that the camera is connected to, as defined in the "Install/Video & Audio/Digital
Video"-Axis Video Servers screen.
Video Channel
Select the video channel that the camera is connected to on the recorder. Each camera connects to a separate
video channel. Any channel previously selected is not available in the list.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Configuration Settings Tab
This tab displays the web interface of the device.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Advanced Settings Tab
Live Video Format
This is not used. The video format must be MPEG4 (do not change it in the web interface).

289
75xx Camera / 79xx Encoder (HD)

Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
See Alarm/Event Messages for details of each message.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.

75xx Camera / 79xx Encoder (HD)

Introduction
Purpose of this Screen
This screen enables you to define the settings for an SD or HD 75xx camera or 79xx encoder.
Setting up a new Device
To set up a new device:
1. Attach the device to the network.
2. Define the IP address of the device using the supplied tool.
3. Click Discover.
All devices of the type you are adding that have not yet been defined in the Symmetry software are listed.
(Once you have saved the screen, the device will no longer be listed when you click Discover.)
If prompted, enter user name and password. The username and password of the default administrator
account are root and pass respectively.
4. Select the device, then click OK.
Note: You may be prompted to install additional software when you add the first device. Choose to install the
software.

General Options
Description
Enter a name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are root and pass respectively.

290
Symmetry Software Reference Manual

Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new device, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface and view live video.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the device (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a device on the network of the type you are configuring. Please refer to "Setting up a
new Device" above. The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Advanced Camera Properties Tab
HTTP Port
This is the port at the camera used to receive information from the Symmetry software. The port must be
the same as defined in the camera web interface.
Camera Transaction Port
This is the port at the camera used by the Symmetry software to listen for camera events. The port must
be the same as defined in the camera web interface.
SSL
Select this option if SSL (encrypted communication) is enabled at the camera.
Session Type
Select Unicast or Multicast networking.
Using multicast can greatly reduce network traffic, but care must be taken to ensure that the network
switches are compatible with multicast before any change is made.
Multicasting works by placing the task of reproducing data on a switch rather than on the source camera.
When a second client requests video from a camera, the data is sent from a switch rather than from the
camera, which reduces load on the camera and vastly decreases network traffic between the camera and
switch. Multicasting works by the camera having an IP address that is in a specific range used for
multicasting.
Session Name, Friendly Name and Firmware Version
This information is obtained automatically from the camera.

291
Axis IP Camera ("Install/Video & Audio/Digital Video")

Enable Live Audio


Selecting this option enables users to listen to audio from the camera from the "Home/Video &
Audio/Virtual Matrix" screen.
Enable Audio Recording
When selected, audio is recorded by the Symmetry NVR.
Refresh
This refreshes the information received from the camera (Session Name, Friendly Name and Firmware
Version).
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Open camera webpage
Click to open the camera web interface in a browser.

Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Reporting Tab
You can choose whether to enable or disable each message that can be generated by the device.
See Alarm/Event Messages for details of each message.

Privacy Zones Tab


You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.

Axis IP Camera ("Install/Video & Audio/Digital Video")

Introduction
Purpose of this Screen
You can use this screen to define the settings for an Axis IP camera. The screen is available only if a Symmetry
camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models and firmware versions
supported.

Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.

292
Symmetry Software Reference Manual

Before Using this Screen


Before setting up the camera in this screen, make sure that you have defined the following using the camera's
web interface or the AXIS tools:
 The camera's IP address.
 The "root" password for the camera.
Using this Screen
Setting up an IP camera in this screen may be as simple as specifying a name and entering the camera's IP
address. However, other tabs and options are provided if you need to set up other features.
Depending on whether Enable anonymous viewer login is selected in the camera's web interface, you may
also need to enter the username and password of an Axis "Viewer" to enable live video to be displayed at
Symmetry clients (see Username and Password below).
The Connect button is provided only if you want to access the camera's web interface in the Configuration
Settings tab, or if you want to view live video from the camera in the Privacy Zones or Pan/Tilt/Zoom tab (see
Connect below).
Note: If you have selected MPEG-4 and do not see a Live View, click the link near the bottom of the page to
install the MPEG-4 decoder.
Defining the same camera more than once
It is possible to add the same AXIS camera more than once to the Symmetry software (using the same IP
address). You may want to do this if you want to assign the same camera to different (or the same) NVR,
perhaps to record at different resolutions or for fault tolerance.
When you add an AXIS camera, the Symmetry software determines whether the camera supports multiple
profile streams. If it does, a Profile menu is displayed in the Advanced tab, which lists all available profiles. For
a new camera or if no profile has been selected, the profile selected in the Live View is selected.
Configuring the system for camera events
If you want the camera to send events such as those triggered by motion to Symmetry:
1. Add the camera to Symmetry and close the camera definition screen.
2. Log in to the camera's web interface, and verify that in "Event Servers", Symmetry has automatically
created an HTTP event server for the Symmetry server.
3. In the web interface, create a triggered event for each event to be sent to Symmetry.
a) Select Event Configuration, Event Types.
b) Click Add triggered.
c) Complete the event settings. Choose Send HTTP Notification to and the Symmetry event server next
to this option (the name of the event server ends with the name of the computer on which the Symmetry
server is installed).
4. Save the settings in the web interface.
5. Open the camera definition again in Symmetry, then click Save. This applies the settings needed to
enable the configured event types to be sent to Symmetry.

General Options
Description
Enter a unique name for the device.
Network Address
Enter the IP address or network (DNS) name of the device, as configured in the camera.

293
Axis IP Camera ("Install/Video & Audio/Digital Video")

Username and Password


If Enable anonymous viewer login is not selected in the Setup-Users page of the Axis web interface, it is
necessary to enter the username and password of an Axis "Viewer" user. This will enable live video to be
displayed at Symmetry clients.
If you want to use the Connect button (see below), you will need to enter the username and password of an
Axis Administrator user. The default Administrator username is "root". The password was set the first time the
camera web interface was accessed through the Axis IP Utility. Make sure you reverse the changes to the
Username and Password fields after you have finished with Connect.
Connect
Use Connect if you want to:
 Display live video from the camera in the Configuration Settings tab (for example, to make sure the
camera is positioned correctly).
 Access the camera's web interface in the Configuration Settings tab (for example, to add an Axis
"Viewer" user or to make other camera configuration changes).
 Use the Privacy Zones or Pan/Tilt/Zoom tab.
Before clicking Connect, you need to make sure you enter an Axis "Administrator" username and password in
the Username and Password fields.
After clicking Connect, you may be prompted to:
 Enter the username and password again in a separate dialog.
 Install the "AXIS Media Control" - click Install to install this add-on.

Note: After finishing the tasks you need to carry out, make sure you reverse the changes you made in the
Username and Password fields; that is, leave the fields blank or enter the username and password of an Axis
"Viewer" user.

Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
For an Axis IP camera, the status is Online only after entering an Axis Administrator username and password
and clicking Connect. An online status is not required for an Axis IP camera to operate properly.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Configuration Settings Tab
This tab displays the web interface of the device. The interface is displayed only if an Axis "Administrator"
username and password have been entered.

294
Symmetry Software Reference Manual

You may want to use the web interface to add a "Viewer" user or make other configuration changes to the
camera.
The Video format selected in the Live View page is used only for displaying video in the tab. The video format
for displaying video in the Virtual Matrix is specified in the Advanced tab.
Advanced Tab
Enable Live Audio
Selecting this option enables users to listen to audio from the camera from the "Home/Video &
Audio/Virtual Matrix" screen (assuming the camera supports audio).
Enable Audio Recording
When selected, audio is recorded by the Symmetry NVR.
Enable Multicast
Select this option if you want the camera to use multicast networking.
Using multicast can greatly reduce network traffic, but care must be taken to ensure that the network
switches are compatible with multicast before any change is made.
Multicasting works by placing the task of reproducing data on a switch rather than on the source camera.
When a second client requests video from a camera, the data is sent from a switch rather than from the
camera, which reduces load on the camera and vastly decreases network traffic between the camera and
switch. Multicasting works by the camera having an IP address that is in a specific range used for
multicasting.
Live Video Format
Select the video format for live video (MPEG-4 is always used during recording):
 MJPEG - Motion JPEG is gives good picture quality, but requires greater bandwidth than
MPEG-4.
 MPEG4 - This is the default selection, since the format gives a good compromise between
picture quality and bandwidth, but up to 1000 ports need to remain open in a specified
range. MPEG-4 is recommended for live viewing and for applications where bandwidth and
storage limitations are important factors. The ATEME decoder is used.
 MPEG4 RTSP Tunnelled - This uses the RTSP protocol to stream video from the camera.
By default, the camera uses port 554.
 MPEG4 HTTP Tunnelled - This uses a relatively high bandwidth. However, by default port
80 is used, which may be preferable in some networks.
 MPEG4 (Axis) - This uses the Axis MPEG4 decoder. Use this only if directed to do so, since
this prevents certain features such as privacy zones from being used.
 H264 - This provides the best compression performance. It gives improved picture quality
with low bandwidth requirements. The Intel decoder is used.
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.

295
Axis Video Servers ("Install/Video & Audio/Digital Video")

Privacy Zones Tab


You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
Note: The IP Camera Offline and IP Camera Online messages relate to messages sent directly from the
camera, which may appear only after the camera has returned to an online state. Using the Enable Offline
Monitoring option, a Symmetry NVR can independently monitor the online/offline status of the camera.
See Alarm/Event Messages for details of each message.
Enable Offline Monitoring and Offline Monitoring Interval
The Enable Offline Monitoring option is relevant only if the device is assigned to a Symmetry NVR.
Selecting the option will cause the Symmetry NVR to periodically check whether the device is online and
generate camera online/offline alarms as appropriate. The time period between checks is determined by
Offline Monitoring Interval.

Axis Video Servers ("Install/Video & Audio/Digital Video")

Introduction
Purpose of this Screen
You can use this screen to define the settings for an Axis video server. The screen is available Symmetry
camera license is installed.

Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.

Before Using this Screen


Before setting up the device in this screen:
 Install the latest version of the Axis Media Control. This can be found on the Symmetry installation
media (Setup\Packages\Axis\AMC_Embedded.msi) or on the Axis web site. If you do not do this,
the Configuration Settings may not display the video server's web interface.
 Define the IP address of the Axis video server using the utility supplied with the device.
Using this Screen
Setting up the video server in this screen may be as simple as specifying a name and entering its IP address.
However, other tabs and options are provided if you need to set up other features.
The Connect button is provided only if you want to access the video server's web interface in the Configuration
Settings tab.
If prompted, enter a user name and password when connecting to the Axis video server. The username and
password of the default administrator account are root and password respectively.

General Options
Description
Enter a unique name for the device.

296
Symmetry Software Reference Manual

Address
Enter the IP address or network (DNS) name of the device.
Username and Password
Enter the username and password of the default administrator account.
Connect
You can enter the IP address of the device and click Connect to access its web interface.
Owned by Company
Select the company that is to own the device.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the server (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
The status is Online only after entering an Axis Administrator username and password and clicking Connect.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Configuration Settings Tab
This tab displays the web interface of the device. The interface is displayed only if an Axis "Administrator"
username and password have been entered.
If this tab does not display the web interface, the Axis Media Control may be out of date. Please refer to "Before
Using this Screen" above.
Advanced Settings Tab
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
See Alarm/Event Messages for details of each message.

297
ONVIF Camera

Enable Offline Monitoring and Offline Monitoring Interval


Selecting Enable Offline Monitoring enables the Symmetry software to periodically check whether the
device is offline. Selecting the option enables Server Offline and Server Online alarms\events to be
generated. The time period between checks is determined by Offline Monitoring Interval.

ONVIF Camera

Introduction
Purpose of this Screen
This screen enables you to define the settings for an ONVIF camera.
Setting up a new Device
To set up a new device:
1. Attach the device to the network.
2. Define the IP address of the device using the supplied tool.
3. Click Discover.
All devices of the type you are adding that have not yet been defined in the Symmetry software are listed.
(Once you have saved the screen, the device will no longer be listed when you click Discover.)
If prompted, enter user name and password.
4. Select the device, then click OK.
Note: You may be prompted to install additional software when you add the first device. Choose to install the
software.
Note: Symmetry supports "Digest Authentication" for ONVIF cameras. This provides a more secure method of
authenticating with the camera over HTTP, and is configured in the camera's web page.

General Options
Description
Enter a name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new device, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface and view live video.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.

298
Symmetry Software Reference Manual

Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the device (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a device on the network of the type you are configuring. Please refer to "Setting up a
new Device" above. The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Media Tab
This tab displays a live image from the camera and provides the following options:
Media Profiles (Live/Recording)
Choose the video and audio quality for live viewing and recording. Click the button to the right of each
menu to action any change and see a live view of the result.
You can use the Media Profiles tab to create new profiles.
Streaming
Select Unicast or Multicast networking.
Using multicast can greatly reduce network traffic, but care must be taken to ensure that the network
switches are compatible with multicast before any change is made.
Multicasting works by placing the task of reproducing data on a switch rather than on the source camera.
When a second client requests video from a camera, the data is sent from a switch rather than from the
camera, which reduces load on the camera and vastly decreases network traffic between the camera and
switch. Multicasting works by the camera having an IP address that is in a specific range used for
multicasting.
You can specify the multicast settings in the Media Profiles tab (Video Encoder Settings sub-tab).
Audio
Live
Selecting this option enables users to listen to audio from the camera from the "Home/Video &
Audio/Virtual Matrix" screen.
Recording
When selected, audio is recorded by the Symmetry NVR.
Device Web Page
Click to open the camera web interface in a browser.
Time Zone Tab
Candidate Time Zone and Information
When you navigate to the tab, Symmetry reads the time zone information from the camera. The
Information box displays whether the camera is adequately synchronized with the Symmetry server
(within 10 seconds). Changing the time zone causes the Information box to report whether or not the time

299
ONVIF Camera

at the camera would be synchronized with the Symmetry server if the time zone were to be used at the
camera.
This setting does not affect any time zone setting in the web interface and is not saved.
Make sure that the time zone at the camera is set correctly to ensure the correct time of alarms and
events.
Refresh
Refreshes the information displayed.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Events Tab
You can choose whether to enable or disable each message that can be generated by the device.
The Recognized Events are those that are reported by the Symmetry software using the same message text
that you see in this screen. See Alarm/Event Messages for details of each message.
The Unrecognized Events are those that the camera is capable of sending, but which are reported as
"General Alarm".
Offline Monitoring Tab
Enable Offline Monitoring and Interval
The Enable Offline Monitoring option is relevant only if the device is assigned to a Symmetry NVR.
Selecting the option will cause the Symmetry NVR to periodically check whether the device is online and
generate camera online/offline alarms as appropriate. The time period between checks is determined by
Interval.
Media Profiles Tab
This tab allows you to create or edit profiles. Each profile is stored in the camera and specifies a set of video
and audio settings, such as frame rate, resolution and encoding format. Once you have created profiles, you
can use the Media tab of the ONVIF Camera screen to select the profiles to use for Symmetry live and
recorded video.
The Media Profiles tab contains several sub-tabs:
Profile Settings
Profile
Select an exiting profile to edit, or:

 Click to refresh the Profile menu so that it matches the profiles stored in the
camera.

 Click to delete the selected profile.

 Click to add a new profile. After clicking this button, enter the name of the profile
in the Profile field, select the video and audio configurations from the pull-down
menus, then click Send to Device.
Video - Encoder Configuration
Choose the video encoder configuration, as set up in the Video Encoder Settings tab. This
determines the frame rate, resolution, etc. used for video when the profile is used. To save changes,
click Send to Device.
Video - Source Configuration
Choose the hardware source for the video (if applicable).

300
Symmetry Software Reference Manual

Audio - Encoder Configuration


Choose the audio encoder configuration, as set up in the Audio Encoder Settings tab. This
determines the sample rate, encoding type, etc. used for audio when the profile is used. To save
changes, click Send to Device.
Audio - Source Configuration
Choose the hardware source for the audio (if, for example, the camera has two microphones).
Video Encoder Settings
Use this tab to select the video settings for the selected Video Encoder Configuration. To save changes,
click Send to Device.
The settings are consistent with the ONVIF standard and depend on the Encoding type. Please refer to
ONVIF documentation for full details of these settings.
Example settings:
Resolution
A higher resolution may improve picture quality but increases the amount of data to transmit and
network usage. Resolution is width by height.
Quality
This determines the level of quantization or compression of the video signal. Increasing quality may
improve picture quality, but is likely to increase the amount of data to transmit and network usage.
Session Timeout
Video streaming timeout.
Frame Rate
This determines the maximum frame rate in frames per second (applies if Encoding Interval is non-
zero). A higher frame rate may make faster scenes look smoother, but is likely to increase the
amount of data to transmit and network usage.
Bitrate
Bit rate is a measure of the transmission speed of binary data. This sets the maximum bit rate in
kbps (zero is no limit).
Encoding Interval
This determines the interval between I-Frames in the video signal.
Multicast
Selecting this option displays multicast settings. The actual mode used by Symmetry is specified in
the Media tab.
The IP Address is the multicast address.
Port is the RTP multicast destination port.
TTL is the Time to Live or Hop Limit.
Audio Encoder Settings
Use this tab to select the audio settings for the selected Audio Encoder Configuration. To save changes,
click Send to Device.
The settings are consistent with the ONVIF standard and depend on the Encoding type. Please refer to
ONVIF documentation for full details of these settings.
Example settings:
Sample Rate
The audio sample rate in kHz. A higher sample rate is likely to give better audio, but is likely to
increase the amount of data to transmit and network usage.

301
Panasonic IP Camera ("Install/Video & Audio/Digital Video")

Bitrate
The output bit rate in kbps.
Session Timeout
Audio streaming timeout.
Multicast
Selecting this option displays multicast settings. The actual mode used by Symmetry is specified in
the Media tab.
The IP Address is the multicast address.
Port is the RTP multicast destination port.
TTL is the Time to Live or Hop Limit.
Multimedia Settings
You can use this tab to change settings such as the brightness and contrast of video from the camera, if
the camera supports these changes.
Oncam/PTZ Tab
This tab is for ONCAM Grandeye cameras. It allows tours through PTZ positions.
Please refer to your AMAG support representative for further information.
PTZ Tours Tab
This tab is for ONCAM Grandeye cameras.
Please refer to your AMAG support representative for further information.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
The tab is not available for ONCAM Grandeye cameras.
See Using the Privacy Zones Tab.

Panasonic IP Camera ("Install/Video & Audio/Digital Video")

Introduction
Purpose of this Screen
You can use this screen to define the settings for a Panasonic IP camera. The screen is available only if a
Symmetry camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models supported.

Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.

Setting up a new Camera


To set up a new Panasonic IP camera:
1. Attach the camera to the network.
2. Define the IP address of the camera using the tool supplied with the camera. Refer to the camera's
documentation.
3. Click Discover.

302
Symmetry Software Reference Manual

All Panasonic IP cameras that have not yet been defined in the Symmetry software are listed. (Once you
have saved the camera definition, it will no longer be listed when you click Discover.)
If prompted, enter a camera user name and password. The username and password of the default
administrator account are admin and 12345 respectively.

Note: When the camera is connected to the network, it broadcasts a discovery message for 20 minutes.
If the camera has been connected to the network for a longer period, disconnect and reconnect it to
restart the discovery message.

4. Select the camera, then click OK.


Note: You may be prompted to install additional software when you add the first camera. Choose to install the
software.
Note: There are several ini file settings for Panasonic cameras, as documented in the Symmetry Software
Installation Manual.

General Options
Description
Enter a unique name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are admin and 12345 respectively.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new camera, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device , you can access its web interface, view live video, set up privacy
zones, etc.
Owned by Company
Select the company that is to own the device.
Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a Panasonic IP camera on the network. Please refer to "Setting up a new Camera"
above. The device must be on the same subnet as the computer you are using.

303
Panasonic IP Camera ("Install/Video & Audio/Digital Video")

Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Configuration Settings Tab
This tab displays the web interface of the device.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Advanced Tab
Live Video Format
This is not used. The video format must be MPEG4 (do not change it in the web interface).
Alarm Port
This specifies the port that the Symmetry software uses to receive motion and monitor point alarms. The
Panasonic Alarm Protocol port number specified in the camera's web interface must specify the same
number.
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
Note: The IP Camera Offline and IP Camera Online messages relate to messages sent directly from the
camera, which may appear only after the camera has returned to an online state. Using the Enable Offline
Monitoring option, a Symmetry NVR can independently monitor the online/offline status of the camera.
See Alarm/Event Messages for details of each message.
Enable Offline Monitoring and Offline Monitoring Interval
The Enable Offline Monitoring option is relevant only if the device is assigned to a Symmetry NVR.
Selecting the option will cause the Symmetry NVR to periodically check whether the device is online and
generate camera online/offline alarms as appropriate. The time period between checks is determined by
Offline Monitoring Interval.

304
Symmetry Software Reference Manual

Sony IP Camera ("Install/Video & Audio/Digital Video")

Introduction
Purpose of this Screen
You can use this screen to define the settings for a Sony IP camera. The screen is available only if a Symmetry
camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models supported.

Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.

Setting up a new Camera


To set up a new Sony IP camera:
1. Attach the camera to the network.
2. Define the IP address of the camera using the tool supplied with the camera. Refer to the camera's
documentation.
3. Click Discover.
All Sony IP cameras that have not yet been defined in the Symmetry software are listed. (Once you have
saved the camera definition, it will no longer be listed when you click Discover.)
If prompted, enter a camera user name and password. The username and password of the default
administrator account are admin and admin respectively.
4. Select the camera, then click OK.
Note: You may be prompted to install additional software when you add the first camera. Choose to install the
software.

General Options
Description
Enter a unique name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are admin and admin respectively.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new camera, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface, view live video, set up privacy
zones, etc.
Owned by Company
Select the company that is to own the device.

305
Sony IP Camera ("Install/Video & Audio/Digital Video")

Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Location
Click here for information about this option.
Category
Click here for information about this option.
Discover
Click this button to locate a Sony IP camera on the network. Please refer to "Setting up a new Camera" above.
The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Configuration Settings Tab
This tab displays the web interface of the device.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.
See Alarm/Event Messages for details of each message.
Enable Offline Monitoring and Offline Monitoring Interval
The Enable Offline Monitoring option is relevant only if the device is assigned to a Symmetry NVR.
Selecting the option will cause the Symmetry NVR to periodically check whether the device is online and
generate camera online/offline alarms as appropriate. The time period between checks is determined by
Offline Monitoring Interval.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.

306
Symmetry Software Reference Manual

Symmetry IP Camera ("Install/Video & Audio/Digital Video")

Introduction
Purpose of this Screen
You can use this screen to define the settings for a Symmetry IP camera. The screen is available only if a
Symmetry camera license is installed.
Please refer to your AMAG support representative for a list of IP camera models supported.

Note: It is essential to ensure that your PC has sufficient processing power and that the system is configured to
avoid excessive video data being sent to the Symmetry software. Please refer to the Software Installation
Manual for guidance.

Setting up a new Camera


To set up a new Symmetry IP camera:
1. Attach the camera to the network.
2. Define the IP address of the camera using the tool supplied with the camera. Refer to the camera's
documentation.
3. Click Discover.
All Symmetry IP cameras that have not yet been defined in the Symmetry software are listed. (Once you
have saved the camera definition, it will no longer be listed when you click Discover.)
If prompted, enter a camera user name and password. The username and password of the default
administrator account are root and pass respectively.
4. Select the camera, then click OK.
Note: You may be prompted to install additional software when you add the first camera. Choose to install the
software.

General Options
Description
Enter a unique name for the device.
Network Address
This displays the IP address of the device after you have used the Discover button.
If you know the IP address or network (DNS) name of the device, you can enter it here and click Connect to
access the device web interface and view live video.
Username and Password
Enter the username and password of the default administrator account.
The username and password of the default administrator account are root and pass respectively.
Connect
You can enter the IP address of the device and click Connect to connect to the device. If you are setting up a
new camera, you may want to use this button instead of Discover if you already know its IP address.
Once you have connected to the device, you can access its web interface, view live video, set up privacy
zones, etc.
Owned by Company
Select the company that is to own the device.

307
Symmetry IP Camera ("Install/Video & Audio/Digital Video")

Camera Number
Each camera requires a camera number. No other digital video camera can have the same camera number. If
you leave the field blank, a camera number is automatically allocated when you save the camera details.
Location
Click here for information about this option.
Category
Click here for information about this option.
Status
The current status of the camera (Online, Offline or Unknown) is displayed near the top-right corner of the
screen.
Discover
Click this button to locate a Symmetry IP camera on the network. Please refer to "Setting up a new Camera"
above. The device must be on the same subnet as the computer you are using.
Delete/Notes/Permissions/Save/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Tabs
Configuration Settings Tab
This tab displays the web interface of the device. Click PLAY to view live video.
Please refer to the documentation supplied with the device for details of the options in the web interface.
Advanced Tab
Live Video Format
This is not used. The video format must be MPEG4 (do not change it in the web interface).
Timezone
Select the time zone in which the device is located. This ensures that any alarm/event messages or
recordings displayed in the Symmetry software show a date and time that corresponds to the location
where the device is installed.
Any daylight-savings time changes are applied automatically. This means that the time shown against any
alarm/event messages or recordings in the Symmetry software is correct for any daylight-savings times
changes that may occur.
This setting does not affect any time zone setting in the web interface of the device. Check that the setting
in the device is set to the same time zone.
Pan/Tilt/Zoom Tab
You can use this tab to set up pan, tilt, zoom and preset controls, depending on the camera type.
See Using the Pan, Tilt, Zoom Tab.
Privacy Zones Tab
You can use this tab to black out or blur areas of the image.
See Using the Privacy Zones Tab.
Reporting Tab
Transaction Reporting
You can choose whether to enable or disable each message that can be generated by the device. The
Symmetry server reports each enabled message as an alarm or event, depending on the settings in the
"Operation/Alarms/Reporting" screen.

308
Symmetry Software Reference Manual

See Alarm/Event Messages for details of each message.


Enable Offline Monitoring and Offline Monitoring Interval
Selecting Enable Offline Monitoring enables the Symmetry software to periodically check whether the
device is offline. Selecting the option enables IP Camera Offline and IP Camera Online alarms\events to
be generated. The time period between checks is determined by Offline Monitoring Interval.

NVR Cameras Assignment Screen ("Install/Video & Audio/NVR


Cameras Assignment")

General
Overview of this screen
This screen allows you to assign digital video cameras to Symmetry Network Video Recorders (NVRs). You
can assign each camera to one or more NVRs.
You can access this screen in three different ways:
 By selecting "Install/Video & Audio/Digital Video/NVR Cameras Assignment" in the toolbar.
 By clicking Assign in the "Install/Video & Audio/Digital Video-NVR" screen. The name of the NVR is
automatically inserted in the NVR field of the Filters section, which by default, causes the screen
to list only the NVR you were defining.
 By clicking Assign Cameras in the "Camera not Assigned" dialog, which is displayed when saving a
camera that is not assigned to an NVR. The name of the camera is automatically inserted in the
Camera field of the Filters section, which causes the screen to list only the camera you were
defining.
The number of cameras currently not assigned to any NVR is displayed next to Unassigned Cameras. The
value displayed is not affected by the filter settings.
For an introduction to the Symmetry NVR and its web interface, please refer to About the Symmetry NVR.
Using this screen
About the Camera and NVR columns
If no filters are applied in the Filters section, the left column (labelled Camera) lists the names of all NVR-
compatible cameras (such as AXIS IP cameras). The camera name is displayed in orange if the camera is
not assigned to any NVR.
There is one additional column for each NVR defined using the "Install/Video & Audio/Digital Video-NVR"
screen.
Assigning cameras to NVRs
To assign the cameras to NVRs, simply select the appropriate checkboxes. You can assign the same
camera to more than one NVR if you wish.
You can assign/unassign multiple cameras at the same time using Assign Selected Cameras or
Unassign Selected Cameras (see below).
Using filters
You can use the fields and menus in the Filter section of the screen to choose the cameras and NVRs to
list in the screen. For example, entering text in the Camera field causes only those cameras names that
contain the text to be displayed.
For details of the filters, please refer to "Filter Options" below.
If you have accessed this screen from the "Install/Video & Audio/Digital Video-NVR" screen or from a
camera definition screen, the name of the NVR or camera is automatically inserted as a filter. This means
that by default, the screen lists only the NVR/camera you were defining.

309
Camera Views ("Install/Video & Audio/Camera Views")

Displaying statistics
Clicking the name of an NVR (or any cell in the NVR's column) displays statistics about that NVR in the
lower area of the screen. The statistics include the number of cameras assigned to the NVR, the date of
the oldest recording and the date of the oldest tagged recording. This information is retrieved each time
you open the screen.

Screen Options
Filter Options
Camera
Typing into this field automatically filters the list of cameras to show only those that contain the typed text.
NVR
Typing into this field automatically filters the list of NVRs to show only those that contain the typed text.
Location
The upper Location menu allows you to list only those cameras that have the selected location. The lower
Location menu allows you to list only those NVRs that have the selected location.
Category
The upper Category menu allows you to list only those cameras that have the selected category. The
lower Category menu allows you to list only those NVRs that have the selected category.
Show unassigned only
Select this option to list only those cameras that are not yet assigned to an NVR.
Clear filter
Click this button to clear all filters. All Symmetry NVRs and NVR-compatible cameras will be listed.
Assign Selected Cameras
You can select multiple cells (using the Ctrl and Shift keys in the normal way) and click Assign Selected
Cameras to assign the cameras to the NVRs.
Unassign Selected Cameras
You can select multiple cells (using the Ctrl and Shift keys in the normal way) and click Unassign Selected
Cameras to unassign the cameras.

Camera Views ("Install/Video & Audio/Camera Views")

General
Overview of this screen
This screen enables you to set up camera views.
For an overview of camera views and how to use them, please refer to "About Camera Views and Camera
Associations".
To create a new camera view, click New in the Selection screen, choose the camera you want to create the
camera view for, click > (or drag and drop or double-click the camera name), configure the View Type and
Preset as applicable, then click Save.

Note: If you are not able to access this screen, enable permissions to it using the "Maintenance/User &
Preferences/Roles" screen.
Note: Deleting a camera also deletes any camera views set up for that camera.

310
Symmetry Software Reference Manual

Selection Screen
Using the Selection screen
You can use the Selection screen to create a new camera view or to find an existing camera view to edit. Click
here for an overview of Selection screens and how to use them.
Only those camera views belonging to the currently-selected company are available.

Definition Screen Options


Description
This is the name of the camera view.
Filter Cameras
The Filter Cameras field affects the cameras listed. You can use the field to list only those cameras whose
name includes the text you enter. For example, the camera named "ABC123" is listed if you enter "C1", or "AB",
etc. Enter the text and click to action the filter.
Leave the Filter Cameras field empty if you do not want to use a filter.
You may want to use Filter Cameras if, for example, the number of cameras exceeds the maximum number
that can be listed, as set using Selection List Rows Limit in the "Maintenance/User & Preferences/Client
Preferences" screen (default 500).
Cameras
This box lists all of the digital video cameras that pass the specified filter and are owned by the currently
selected company.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message indicates when this limit has been
reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter Cameras field.
Camera Name
This read-only field shows the name of the camera you have selected.
View Type
If the camera supports different view types (e.g. standard, fisheye, virtual, pan360, pan180 or pan180x2),
choose the camera view you want to use.
Preset
If the camera has one or more presets defined in the "Install/Video & Audio/Digital Video" screen, you can
select a preset to use.
>/Copy/Delete/Notes/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

311
Camera Associations ("Install/Video & Audio/Camera Associations")

Camera Associations ("Install/Video & Audio/Camera


Associations")

General
Overview of this screen
This screen enables you to associate cameras (as set up in the "Install/Video & Audio/Digital Video" screen)
and camera views (as set up in the "Install/Video & Audio/Camera Views" screen) with a selected device such
as a reader.
Only those devices, cameras and camera views belonging to the currently-selected company are available.
For an overview of camera views and camera device associations, please refer to "About Camera Views and
Camera Associations".
Using the screen
To use this screen:
1. Select the device in the Selection screen, and click Open.
2. In the Definition screen, choose the cameras and/or camera views you want to associate with the
device and click > (or drag and drop or double-click the name of each camera and camera view).
3. Specify the priority order of the cameras and camera views. This determines:
 The order that cameras and camera views are displayed in cells of the "Home/Video &
Audio/Virtual Matrix" screen when viewing live video.
 The camera or camera view that is opened in the Video Playback screen when
viewing recorded video.
Reports
You can generate the following reports from the "Reports/Configuration/Reports" screen:
 Camera/camera view associations by device
 Device associations by camera/camera view
 Camera views

Note: If you are not able to access this screen, enable permissions to it using the "Maintenance/User &
Preferences/Roles" screen.
Note: Deleting a camera or camera view disassociates the camera or camera view from the device.

Selection Screen
Using the Selection screen
Use the Selection screen to select the device that you want to associate with one or more cameras and camera
views, and click Open.
Only those devices belonging to the currently-selected company are listed.
Filter by and Matching
You can use Filter by and the Matching field to reduce the number of items listed. For example, if you select
Location from Filter by, and enter "North" in the Matching field, only items whose location includes "North" are
listed.
After entering text in the Matching field, press Enter or click to action the filter.
Leaving the Matching field empty means "match all". So, if you select Location from the Filter by menu and
leave Matching empty, this will cause all items to be listed that have a location specified.
The following Filter by options are provided:

312
Symmetry Software Reference Manual

 Description - The device name.


 Location - The location of the device, as specified by the Location field in the device (e.g. reader)
definition.
 Category - The category of the device, as specified by the Category field in the device (e.g. reader)
definition.
Type
Choose the type of the device you want to associate with cameras.

Note: Click here for a general overview of Selection screens and how to use them.

Definition Screen Options


Select
Choose to list Cameras or Camera Views.
Filter by and Matching
You can use Filter by and the Matching field to reduce the number of items listed. For example, if you select
Location from Filter by, and enter "North" in the Matching field, only items whose location includes "North" are
listed.
After entering text in the Matching field, press Enter or click to action the filter.
Leaving the Matching field empty means "match all". So, if you select Location from the Filter by menu and
leave Matching empty, this will cause all items to be listed that have a location specified.
The following Filter by options are provided:
 Description - The name of the camera or camera view.
 Location - The location of a camera, as specified by the Location field in the camera definition. For
a camera view, the box will list all camera views that include a camera whose location includes the
Matching text.
 Category - The category of the camera, as specified by the Category field in the camera definition.
For a camera view, the box will list all camera views that include a camera whose category
includes the Matching text.
Description
This box lists all of the digital video cameras that pass the specified filter and are owned by the currently
selected company.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed (default 500). A message indicates when this limit has been
reached.
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Filter by and Matching.
Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

313
CCTV Switcher Definitions ("Install/Video & Audio/CCTV/Switcher")

CCTV Switcher Definitions ("Install/Video & Audio/CCTV/Switcher")

Introduction to this Screen


What is this screen used for?
Note: Symmetry does not currently support CCTV switchers, and therefore this screen.

This screen is applicable only if a license is installed. The screen allows you to specify the details of each
CCTV switcher being used.

About the Options


Switcher Description
Enter a unique name for the switcher.
Client Name
Select the PC that the switcher is connected to.
Port Name
Select the port that the switcher is connected to, as set up in the "Install/System/Client Ports" screen.
Switcher Type
Choose the type of switcher.
No of Cameras
Choose the number of CCTV cameras that the switcher supports.
The cameras can be set up using the "Install/Video & Audio/CCTV/Camera" screen.
No of Ancillaries
Choose the number of ancillary output relays per camera that the switcher supports.
Typically, a relay can operate a lamp, wiper or washer pump, which can be switched on or off using a
scheduled, trigger or manual command.
The ancillary devices can be set up using the "Install/Video & Audio/CCTV/Ancillary" screen.
No of Monitors
Choose the number of monitors that the switcher supports.
The monitors can be set up using the "Install/Video & Audio/CCTV/Monitor" screen.
No of Presets
Choose the number of preset camera positions that the CCTV switcher supports (this option is available only
for switchers that support present CCTV camera positions). Each camera can use up to two of these preset
positions (as set up in the "Install/Video & Audio/CCTV/Camera" screen). A preset position can be used by
more than one camera.
Communication Settings
Set up the communication settings to match the requirements of the CCTV switcher.

314
Symmetry Software Reference Manual

CCTV Camera Definitions ("Install/Video & Audio/CCTV/Camera")

Introduction to this Screen


What is this screen used for?
Note: Symmetry does not currently support CCTV switchers, and therefore this screen.

This screen is applicable only if a Digital Video Management license is installed. The screen allows you to
specify the details of each camera that is connected to a CCTV switcher.
See Overview of CCTV switching for further information.

About the Options


Camera Description
Specify a unique name for the camera.
Owned by this Company
Select the company that is to own the camera.
Switcher
Select the switcher, as set up in the "Install/Video & Audio/CCTV/Switcher" screen.
Camera
Select the camera number. Any camera number previously selected is not available in the list. The number of
cameras supported by the CCTV switcher unit is specified in the "Install/Video & Audio/CCTV/Switcher" screen.
It is possible to have up to eight slave switcher units connected to a master Ernitec switcher unit. (The Ernitec
switcher type is available only for selected Symmetry product types.) Cameras connected to the master
switcher have camera numbers in the range 0001 to 0032. If all video and communications is through the
master unit, cameras connected to the first slave switcher of an Ernitec switcher have camera numbers in the
range 1001 to 1032. This numbering convention continues up to the eighth slave switcher, whose cameras
have camera numbers in the range 8001 to 8032.
If you are using a slave Ernitec switcher in a multi-user Commend Controls system, and the slave unit connects
directly to the video and serial inputs of a client PC, the camera numbers should be in the range 0001 to 0032.
This is to display images directly from the slave unit in the "Home/Monitoring/Controls" screen of the client PC.
Alarm Number
Some makes of switcher unit support an alarm feature. If this feature is to be used, you should normally set
Alarm Number to the same number as the camera. If the feature is not going to be used, choose None.
When the switcher unit receives an alarm command, it performs some action programmed at the switcher unit.
For example, if an "alarm 1" command is received, the switcher unit may switch camera 1 to a bank of video
monitors. Here is how it works:
1. In the Trigger Commands screen the user selects the Activate Alarm or Reset Alarm command and a
camera name; for example, camera 1.
2. When the command is activated, Symmetry looks at the specified camera definition record to determine the
alarm number to send to the switcher unit.
3. The switcher unit then actions the specified command.
Pan/Tilt/Zoom/Focus
Choose the controls supported by the camera. The "Home/Video & Audio /CCTV Cameras" screen makes
available only those controls you select in this screen.

315
CCTV Ancillary Definitions ("Install/Video & Audio/CCTV/Ancillary")

Preset 1/2, Preset and Description


Enables you to specify whether or not the camera has preset positions. You can choose up to two preset
positions.
If you choose presets, they will be available as buttons to control the camera in the "Home/Video &
Audio/CCTV Cameras" and "Home/Monitoring/Controls" screens. Selecting a preset button in these screens
will cause the camera to move the preset position. Description fields are displayed, which you can use to
name the preset positions. The descriptions are displayed next to the buttons in the "Home/Video &
Audio/CCTV Cameras" and "Home/Monitoring/Controls" screens.
The "Install/Video & Audio/CCTV/Switcher" screen specifies the number of presets that a camera connected to
the switcher can have.

CCTV Ancillary Definitions ("Install/Video & Audio/CCTV/Ancillary")

Introduction to this Screen


What is this screen used for?
Note: Symmetry does not currently support CCTV switchers, and therefore this screen.

This screen is applicable only if the system is using an external CCTV switcher unit. The screen allows you to
name each camera's ancillary output relays. Typically, the relay operates a lamp, wiper or washer pump, which
can be switched on or off using:
 Scheduled, trigger or manual commands.
 The "Home/Video & Audio/CCTV Cameras" screen.
 The "Home/Monitoring/Graphics" screen.
It is possible to use ancillary output relays for other purposes, such as to control lights or other equipment for
the Controls license.

Note: ancillary devices connect to the switcher unit or camera. They are not driven from an auxiliary output at a
node.

For further information, see:


 Overview of CCTV switching or
 Overview of Setting Up a Commend Control System

About the Options


Ancillary Description
A unique name for the ancillary output relay. Use a name that describes the type of device being operated; for
example, "Lamp Camera One".
Owned by this Company
Select the company that is to own the ancillary definition.
For Camera
This is the camera that is associated with the ancillary output.
Output No
This is the number of the ancillary output for the selected camera, as specified at the CCTV switcher unit. Any
ancillary output number previously selected for the camera is not available in the list.

316
Symmetry Software Reference Manual

The "Install/Video & Audio/CCTV/Switcher" screen specifies the number of ancillary devices per camera the
switcher supports.
Pulse Time
If you specify a value other than zero, the ancillary output relay will energize only for the specified length of
time. After this time period, the ancillary output de-energizes, unless already de-energized from an action by a
user of Symmetry. For example, if the ancillary output is being used to control a lamp for the Controls license,
selecting an On button in the "Home/Monitoring/Controls" screen will de-energize the Off relay.

CCTV Monitor Definitions ("Install/Video & Audio/CCTV/Monitor")

Introduction to this Screen


What is this screen used for?
Note: Symmetry does not currently support CCTV switchers, and therefore this screen.

This screen is applicable only if the system is using an external CCTV switcher unit. The screen allows you to
name each monitor connected to a selected switcher unit.
For further information, see:
 Overview of CCTV switching or
 Overview of Setting Up a Commend Control System

About the Options


Monitor Description
A unique name for the monitor; for example, "Monitor One".
Owned by this Company
Select the company that is to own the monitor.
Switcher Name
Select the switcher, as set up in the "Install/Video & Audio/CCTV/Switcher" screen.
Monitor Number
This is the monitor number, as specified at the CCTV switcher unit. Any monitor number previously selected is
not available in the list.
The "Install/Video & Audio/CCTV/Switcher" screen specifies the number of monitors the switcher supports.

Note: for the Controls license, you must use monitor numbers 1, 2 and 3 only. These will be available for
selection in the "Operation/Controls/Control Groups" screen, irrespective of the current company selected.

CCTV Control Input Definitions ("Install/Video &


Audio/CCTV/Control Input")

Introduction to this Screen


What is this screen used for?
This screen is applicable only if the system is using a Commend Intercom System for the Controls license. The
screen allows you to name each control input connected to the Commend system that you wish to use.

317
CCTV Control Intercom Definitions ("Install/Video & Audio/CCTV/Control Intercom")

A control input could, for example, be used to detect whether a barrier is open or closed.

Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls and
Intercom System. New is grayed out if your system is set up with a Intercom System port definition.

See Overview of Setting Up a Commend Control System for further information.

About the Options


Control Input Description
Specify a unique name for the control input that reflects its use; for example, "Status of Entry Barrier- South
Gate".
Owned by this Company
Select the company that is to own the control input.
Call Number
This option is available only if the Commend 200/700 system hardware is being used, as specified by the
relevant parameter in the multimax.ini file.
Enter the address of the input at the Commend hardware (up to four characters).
Controller No.
This option is available only if the Commend 416 system hardware is being used, as specified by the relevant
parameter in the multimax.ini file.
Select the address of the I/O controller that the control input is connected to.
Control Input No.
This option is available only if the Commend 416 system hardware is being used, as specified by the relevant
parameter in the multimax.ini file.
Select the address of the control input on the I/O (controller) card. Control input addresses previously selected
are not available in the list.

CCTV Control Intercom Definitions ("Install/Video &


Audio/CCTV/Control Intercom")

Introduction to this Screen


What is this screen used for?
This screen is applicable only if the system is using a Commend Intercom System for the Controls license. The
screen allows you to name each intercom connected to the Commend system.
See Overview of Setting Up a Commend Control System for further information.

About the Options


Intercom Description
Specify unique name for the intercom; for example, "South Gate Intercom".
Owned by this Company
Select the company that is to own the intercom.
Intercom No.
Specify the address of the intercom input to the Commend system.

318
Symmetry Software Reference Manual

If Commend 200/700 system hardware is being used (as identified by the appropriate setting in multimax.ini),
enter the Commend address of the intercom input (up to four characters). Some addresses may be reserved by
the Commend hardware and therefore should not be used.
If Commend 416 system hardware is being used (as identified by the appropriate setting in multimax.ini), select
the address from the list. The intercom address is between 0004 and 9999, excluding 0096 to 0098 (0001 to
0003, and 0096 to 0098 are reserved for internal functions). The range of addresses in the list may be limited
by a separate setting in multimax.ini. Intercom addresses previously selected are not available in the list.
Client Name
If the intercom is to be sited next to a PC where the "Home/Controls" screen is used (that is, the intercom is to
be a guard's "master intercom"), choose the name of the client. If the intercom is not a master intercom, choose
None.
Call Request Setting
This option determines the operation of the audio link for Select Call mode in the "Home/Monitoring/Controls"
screen.
Select Duplex if you want the audio link between a caller's remote intercom and the guard's intercom to be
automatically opened when the caller generates a call request at a remote intercom.
Select Simplex if you want the audio link to be established only when the guard presses the intercom button in
the "Home/Monitoring/Controls" screen in response to the new call request.
Call Request from this Input
This option is relevant to Select Call mode in the "Home/Monitoring/Controls" screen.
If you select None, a caller can start a call by pressing a button at the remote intercom.
If the road contains a vehicle sensor to start the call automatically, select the input of the Commend system that
the sensor is connected to. This input must be set up in the "Install/Video & Audio/CCTV/Control Input" screen.

CCTV Control Output Definitions ("Install/Video &


Audio/CCTV/Control Output")

Introduction to this Screen


What is this screen used for?
This screen is applicable only if the system is using a Commend Intercom System for the Controls license. The
screen allows you to name each control output relay connected to the Commend system that you wish to use.
A control output relay could, for example, by used to switch on or off a barrier, stop/go light or lights in a car
park.

Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls and
Intercom System. New is grayed out if your system is set up with a Intercom System port definition.

See Overview of Setting Up a Commend Control System for further information.

About the Options


Control Output Description
Specify a unique name for the control output relay that reflects its use; for example, "Entry Barrier- South Gate".
Owned by this Company
Select the company that is to own the control output.

319
Client Definition ("Install/Video & Audio/Intercom/Clients")

Call Number
This option is available only if the Commend 200/700 system hardware is being used, as specified by the
relevant parameter in the multimax.ini file.
Enter the address of the output at the Commend hardware (up to four characters).
Controller No.
This option is available only if the Commend 416 system hardware is being used, as specified by the relevant
parameter in the multimax.ini file.
Select the address of the I/O controller that the control output relay is connected to.
Control Output No.
This option is available only if the Commend 416 system hardware is being used, as specified by the relevant
parameter in the multimax.ini file.
Select the address of the control output relay on the I/O (controller) card. Control output addresses previously
selected are not available in the list.
Pulse Time
If you specify a value other than zero, the control output relay will energize only for the specified length of time.
After this time period, the relay de-energizes, unless already de-energized from an action in the
"Home/Monitoring/Controls" screen (for example, selecting Open de-energizes the relay used to close the
barrier).

Client Definition ("Install/Video & Audio/Intercom/Clients")

Introduction to this Screen


Purpose of the Screen
This screen is used when setting up a Zenitel Pulse or Stentofon Alphacom intercom system.
Use the screen to specify the "intercom clients". That is, the Symmetry clients that will be used to manage and
communicate with intercoms. Each intercom client must be sited next to an intercom to enable the user to
communicate with callers.

Note: For a Zenitel Pulse system, there can be a maximum of two intercom clients per Pulse server.

An intercom client specified in this screen can:


 Use the "Home/Video & Audio/Intercom Control" screen (for Stentofon Alphacom) or "Home/Video &
Audio/Intercom" screen (for Zenitel Pulse) to manage intercom calls.
 Answer intercom call requests using the "Home/Monitoring/Graphics" and Acknowledge Alarm
screens.
(At other clients, the screen can be displayed, but no buttons will be enabled.)

Note: The same Symmetry system cannot be set up for both Commend Controls and intercoms.

For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.

About the Options


Description
Specify a unique name for the client.

320
Symmetry Software Reference Manual

Type
Specify the type of intercom system. You cannot change the type of an existing intercom client.
Owned by Company
Select the company that is to own this client definition.
Location
Click here for information about this option.
Category
Click here for information about this option.
General Tab:
Station Number
Enter the number known to the intercom control unit that identifies the intercom being used at the
Symmetry client (for example, F117). Each intercom port on the intercom control unit is identified by a
station number (known as the device ID or directory number in Zenitel Pulse system).
Show as a Call Station
Selecting this option causes the client's intercom to be used as an intercom call station, in a similar way as
intercoms defined in the "Install/Video & Audio/Intercom/Stations" screen.
A button will appear for the client's intercom in the "Home/Video & Audio/Intercom Control" screen (for
Stentofon Alphacom) or "Home/Video & Audio/Intercom" screen (for Zenitel Pulse), and you will be able to
add the client's intercom to graphics.
Selecting the option allows other intercom clients to make calls to this client, and allows you to set up
trigger commands triggered by calls from this client.
Client Name
Select the Symmetry client.
Extended Properties Tab:
This tab is used for any options that are specific to the selected type of intercom.
Network Address
For a Zenitel Pulse intercom system, specify the IP address or DNS name of the intercom that is being
used at the Symmetry client.

Call Station Definition ("Install/Video & Audio/Intercom/Stations")

Introduction to this Screen


Purpose of the Screen
This screen is used when setting up a Zenitel Pulse or Stentofon Alphacom intercom system.
Use the screen to specify the intercoms connected to the intercom system that are, for example, to be used by
visitors or other personnel to communicate with users who are answering calls from:
 "Home/Video & Audio/Intercom Control" (Stentofon Alphacom) or "Home/Video & Audio/Intercom"
(Zenitel Pulse)
 "Home/Monitoring/Graphics".
 Acknowledge Alarm screen.
Typically, the intercoms are located at entrances, delivery points, parking barriers, etc.
Intercoms sited next to Symmetry clients (for the purposes of responding to incoming calls), should not be
defined in this screen, since they are defined in the "Install/Video & Audio/Intercom/Clients" screen.

321
Call Station Definition ("Install/Video & Audio/Intercom/Stations")

For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.

About the Options


Description
Specify a name for the intercom. The name will appear in the button for the intercom in the "Home/Video &
Audio/Intercom Control" screen.
Type
Specify the type of intercom system. You cannot change the type of an existing call station.
Owned by Company
Select the company that is to own this call station definition.
Location
Click here for information about this option.
Category
Click here for information about this option.
General Tab:
Station Number
Enter the number known to the intercom control unit that identifies the intercom being used (for example,
F118). Each intercom port on the intercom control unit is identified by a station number (known as the
device ID or directory number in Zenitel Pulse system).
Call Request ID and Accept All Call Requests
When a call request is made from an intercom, a Call Request ID is associated with the call request and is
passed to the clients. If Accept All Call Requests is selected, a call request is accepted from the intercom
irrespective of the associated Call Request ID.
If you do not want all Call Request IDs to be accepted, deselect Accept All Call Requests and use the
Call Request ID field to specify the one-character Call Request ID to accept. All other call requests will be
ignored.
The intercom may have been set up to provide a specific Call Request ID, or the Call Request ID may be
dependent on the button pushed.

Tip: The Call Request ID of an intercom can be determined from the "Home/Monitoring/Activity" screen.

Intercom Command
You can choose a DAK or DTMF button. During a call from the intercom, pressing the specified button at
the Symmetry intercom client that is handling the call will cause Symmetry to issue the command specified
by the Command option.
The selected DAK/DTMF button must be configured correctly for each relevant intercom using the intercom
system's software, as documented in the Intercom Management Installation & User Guide.
Command
This enables you to associate a command with the intercom. There are two types of command:
 Pulse output - Switches on the auxiliary output selected in the menu to the right for a
predefined period of time (as specified by the installer), then switches it off. Only those
auxiliary outputs belonging to the currently selected company are available.
 Access Granted - Performs the same action as a valid access-control transaction at the
reader selected in the menu to the right (that is, it opens the door at the specified reader).
Only those readers belonging to the currently selected company are available.

322
Symmetry Software Reference Manual

The command can be issued using any of the following methods:


 By clicking the Command button in the "Home/Video & Audio/Intercom Control" screen
(Stentofon Alphacom) or "Home/Video & Audio/Intercom" screen (Zenitel Pulse), after
answering a call request from the intercom.
 By right-clicking on an intercom in a graphic and selecting Command.
 If a DAK or DTMF button is selected in Intercom Command, by pressing the DAK/DTMF
button during the call from the intercom at the Symmetry intercom client that is handling the
call.
Tag Video Command
You can choose a DAK or DTMF button. During a call from the intercom, pressing the specified button at
the Symmetry intercom client that is handling the call will cause Symmetry to tag video being recorded by
the cameras specified in the Associated Cameras tab. Tagged video can make it easier to located events
of interest in the "Home/Video & Audio/Video Playback" screen.
The selected DAK/DTMF button must be configured correctly for each relevant intercom using the intercom
system's software, as documented in the Intercom Management Installation & User Guide.
Associated Sound
If required, use the Browse button to select a sound ("wav") file for the intercom. The sound will be
generated when a call request is received from the intercom in the "Home/Video & Audio/Intercom Control"
screen (Stentofon Alphacom) or "Home/Video & Audio/Intercom" screen (Zenitel Pulse).
The option has no effect on the sound made for a Call Received alarm in the Acknowledge Alarm screen.
There are some useful "wav" files in the Program Data\Security Management System\Sounds folder.
The sound is stored in the database, but Symmetry also maintains a local copy in the Program
Data\Security Management System\Sounds folder, which it uses for performance benefits.
If a media wave file has already been selected, its filename is displayed in the Associated Sound field.
If a media wave file is not selected, a default sound ("bleep") will be used.
Associated Cameras Tab:
About this tab
Stentofon Alphacom: If you select a camera (by moving the camera from the left box to the right box),
video from the camera is automatically displayed in the "Home/Video & Audio/Intercom Control" screen
when a call is received from the intercom, or if a call request associated with the intercom is selected.
Select only one camera.
Zenitel Pulse: If you select one or more cameras (by moving the cameras from the left box to the right
box), video from the camera(s) is automatically displayed in the "Home/Video & Audio/Intercom" screen
when you answer a call from the intercom, or if you select the intercom's camera icon in the Intercom
screen.
Filter
You can use the Filter field to reduce the number of cameras listed in the left-hand box. For example, if
you enter "North" in the field, only cameras whose name includes "North" are listed.
After entering text, press Enter or click to action the filter.
Leaving the field empty means "match all".
Default View and PTZ Preset
You can select a camera in the right-hand box, and choose the default camera view and/or PTZ preset to
use for that camera.

Note: Default View is relevant for 360-degree cameras that support dewarping, such as CompleteView
cameras. Each dewarped view can have different presets, as configured in the camera definition screen
in Symmetry.

323
Network Video Recorder (NVR) ("Install/Video & Audio/Digital Video")

Symmetry uses the selected camera settings when video from the camera is displayed in the "Home/Video
& Audio/Intercom Control" screen (Stentofon Alphacom) or "Home/Video & Audio/Intercom" screen (Zenitel
Pulse).
Extended Properties Tab:
This tab is used for any options that are specific to the selected type of intercom.
Network Address
For a Zenitel Pulse intercom system, specify the IP address or DNS name of the intercom.

Network Video Recorder (NVR) ("Install/Video & Audio/Digital


Video")

Introduction
About this screen
You can use the NVR definition screen to set up a Symmetry NVR in the Symmetry software and access its
web interface. You need to set up the NVR in this screen before you can assign any cameras to it.
You may want to access the web interface to perform various management tasks, such as to add new
repositories (storage folders) or set up purge rules. Once you have connected to the NVR, the web interface is
displayed in the central part of this screen.
For an introduction to the Symmetry NVR and its web interface, please refer to About the Symmetry NVR.

General Options
Description
Enter a name for the Symmetry NVR. This is displayed in the Symmetry software and in the NVR's web
interface.
Notes Button
This option is common to many Definition screens. Click here for further information.
About the Previous and Next Buttons
When you are in the Definition screen, you can use the following icons located in the top-right corner of the
screen to display the previous or next record in the database:

If you have made any changes, you are prompted to save those changes before the previous or next record is
displayed.
Address
This specifies the IP address or name of the PC that runs the Symmetry NVR. Enter a machine name only if
your network uses a Domain Name Server (DNS).
Port
This specifies the http port used by the Symmetry software to communicate with the NVR. It must be the same
as specified when installing the NVR software (default 8080). It is the same port used to access the NVR web
interface. It is not used by cameras to access the NVR.
Connect
Click this button to connect to the NVR using the username and password provided. The NVR web interface
should be displayed in the central part of the screen if the connection is successful.

324
Symmetry Software Reference Manual

Status
The current status of the NVR (Online or Offline) is displayed near the top-right corner of the screen.
If the NVR is currently offline, any changes you make are automatically sent to the NVR when it is online.
Username and Password
Enter the username and password of an account defined in the web interface of the NVR. The account is used
to:
 Provide access to the web interface.
 Enable Symmetry to communicate with the NVR (such as to assign cameras and send commands).
It is mandatory to enter a valid username and password. The username and password of the default account
are installer and install respectively.

Note: NVR user credentials are local to each NVR. There is no sharing of user credentials between NVRs.
Note: The username and password used by the NVR to send alarms and events to the Symmetry software is
defined in the Digital Video tab of the "Maintenance/User & Preferences/System Preferences" screen.

Location
Click here for information about this option.
Category
Click here for information about this option.
Enable Offline Monitoring and Offline Monitoring Interval
Selecting Enable Offline Monitoring enables the Symmetry software to periodically check whether the NVR is
offline. Selecting the option enables Offline alarms\events to be generated for the NVR. The time period
between checks is determined by Offline Monitoring Interval.
Enabling or disabling this setting has no effect on whether the NVR reports camera online/offline alarms. Each
camera has a separateEnable Offline Monitoringsetting, which determines whether or not the camera is
monitored by the NVR for online/offline status.
Assign
Clicking this button displays the "Install/Video & Audio/NVR Cameras Assignment" screen, which allows you to
assign cameras to the NVR. The NVR is able to record video from only assigned cameras.
The current NVR will be automatically selected in the NVR Cameras Assignment screen.
Copy/Delete/Notes/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

Region Definition ("Install/Global/Region")

Introduction to this Screen


Purpose of the Screen
This screen is displayed only if you are using a Symmetry head office system (that is, a Symmetry Global
Edition Head Office license has been installed at the Symmetry system you are using).
Use this screen to set up each region of the Global Edition system. You do not need to add a region for the
head office (the system you are currently using).
Please refer to the Global Edition Installation and User Guide for an introduction to Global Edition.

325
Global Connection ("Install/Global/Global Connection")

About the Options


Region Name
Specify a name for the region.
The region name specified in the "Install/Global/Global Connection" screen at the region must match the name
you specify here.
The name is not case-sensitive.
Description
Enter a description of the region, such as its location (optional).
Enabled
Select this option if you want the region to participate in a Symmetry Global system.
If the option is not selected, Symmetry will ignore all communication from the region.
Password
Specify a password for the region.
The password specified in the "Install/Global/Global Connection" screen at the region must match the password
you specify here.
A strong password is recommended. The password is case-sensitive. Both alphanumeric and non-
alphanumeric characters can be used.
Enable Offline Monitoring and Offline Monitoring Interval
If Enable Offline Monitoring is selected (the default), Symmetry will generate a Region Offline alarm\event if
communications with the region are lost.
If Offline Monitoring Interval is set to zero, the message is generated as soon as Symmetry recognizes that
communications are lost. Otherwise, Symmetry waits for the specified length of time before generating the
message.
A Region Online alarm/event is generated when communications are reestablished if Enable Offline
Monitoring is selected.
Synchronize Threat Levels
If selected, the threat level at the region will kept in sync with the threat level set at the head office.
Please refer to the Global Edition Installation and User Guide for information about managing threat levels.

Global Connection ("Install/Global/Global Connection")

Introduction to this Screen


Purpose of the Screen
This screen is displayed only if a Symmetry Global Edition Region license has been installed at the Symmetry
system you are using.
Use this screen to set up the connection to the head office server. Please refer to the Global Edition Installation
and User Guide for an introduction to Global Edition.

About the Options


Head Office Server
Enter the name of the head office server and the port number (default is 80 for http and 443 for https).

Configuring Symmetry to use a Specific Port or https

326
Symmetry Software Reference Manual

If encrypted (https) communications and/or a specific port number are required, the following will need to be
carried out at the head office:
1. Open the Symmetry installation folder (by default, \Program Files\Security Management System).
2. Using Notepad, edit the file named G4T.Global.CommsService.exe.config.
3. In the file, search for http://*.
4. If you want to use a specific port:
a) Add a colon and the port number after the * in http://* (for example, http://*:8080/).
b) Add the TCP port to the Windows firewall exceptions.
5. If you want to use https, change http to https.
6. Save the changes.
7. Restart the service named Symmetry Global Communication Service at the head office.
Use SSL
Select this option if encrypted communication (https) is being used between the region and head office.
Online/Offline
The status indicator displays Online if your regional Symmetry server is communicating with the head office
server. Offline is displayed if this is not the case.
Region Name
The name you specify here must match the name of the region specified in the "Install/Global/Regions" screen
at the head office, otherwise your regional server will not be able to communicate with the head office server.
The name is not case-sensitive.
Password
The password you specify here must match the password specified in the "Install/Global/Regions" screen at the
head office, otherwise your regional server will not be able to communicate with the head office server.
The password is case-sensitive.
Test Connect
After entering the connection details, click this button to test whether your regional server can communicate
with the head office. If successful, the status indicator should show Online.
Please refer to the Global Edition Installation & User Guide for information about troubleshooting
communication problems.
Apply default card permissions from
The role you select here determines the permissions needed to access the details of any new card holders
created at the region via the head office.
If you open the selected role in the "Maintenance/User & Preferences/Roles" screen, and click Default
Permissions, you can choose the roles that will have access to any new card holders created.

327
Maintenance Menu

Set Password Screen ("Maintenance/User & Preferences/Set


Password")
Select the Set Password option in "Maintenance/User & Preferences" to change your login password.
1. Type your current password in the Enter Current Password box. (For security reasons, the password is
not displayed as you type it.)
2. Type your new password in the Enter New Password. It must be at least five characters long and is case-
sensitive.
If Strong Password is selected in the "Maintenance/User & Preferences/System Preferences" screen, the
password must have at least one lowercase character, one uppercase character, one numeric character
and one punctuation mark.
If Allow Use of Old Passwords is deselected in the "Maintenance/User & Preferences/System
Preferences" screen, the system will prevent you from reusing your current password.
3. To verify that you typed the new password correctly, type it again in the Retype New Password
box, then click OK.

Note: Your password may have been set up to expire a specified number of days after you have changed it.
This is set up in the "Maintenance/User & Preferences/Accounts" screen. You are warned that the password is
about to expire each time you log in during a warning period (normally 3 days) before the expiry date.

User Roles Screen ("Maintenance/User & Preferences/Roles")

General
Overview of this screen
Introduction
A user role defines a set of access permissions to menus, screens and options in the Symmetry software.
You can allow users view-only access, modify access, delete (full) access or no access at all.
Each user must be allocated a user role (in the "Maintenance/User & Preferences/Accounts" screen),
which then determines permissions that the user has to the menus, screens, tabs and options in the
Symmetry software. More than one user can have the same user role.
A user role also specifies a company group, which determines the companies that the user is able to
administer. Some users, such as installers, may be given a company group that allows access to all
companies in the system.
Notes:
 Any changes you make to a user role take effect when users who have the user role log in.
 If you create a new role (either by clicking New in the Selection screen, or by coping an
existing role), the new role will not have access to any commands in the
"Home/Monitoring/Command Center" or "Home/Monitoring/Graphics" screens until you
assign commands to the role using the "Maintenance/User & Preferences/Command Roles"
screen.

328
Symmetry Software Reference Manual

 You cannot delete the Visitor Management role. Please refer to the visitor management
overview (click here) for further details of the Visitor Management role.
 Give access to the User Roles screen only to high-ranking system administrators, since any
user who has access to the screen can create or modify privileges, which can exceed the
privileges they hold themselves (except for screens in the Install menu).
The Tree View
The User Roles Definition screen displays a tree view of settable permissions. You can expand or collapse
the branches of the tree to view their contents in the normal way.
You can set user access permissions for each entry listed in the tree.
Expanding the tree view reveals an entry for each menu, sub-menu and screen in the Symmetry software.
For some screens, such as "Home/Identity/Card Holders", there are also entries for tabs, options or
features of the screen.
At the bottom of the tree, there is an Options branch, which contains various permissions that are not
directly related to a specific screen.
Setting Permissions
You can set the permissions to a screen by selecting the entry in the tree, then the View, Modify, Delete
or None button (or the equivalent option from the right-click menu).
Selecting a menu or sub-menu then View, Modify, Delete or None sets the same privilege level for all
options in that menu. You may be warned that privileges cannot be set for chargeable options - this may
be displayed because you do not have a license for the option or because the option has not yet been set
up correctly.
If there is no access to a menu or feature, it will not be displayed to users who have the user role.
Entries for tabs and options in the tree view have a check box. Some have two states: checked (tab/option
will be displayed to users) or unchecked (tab/option will not be displayed). Others have three states:
checked (option will be displayed), unchecked (option will be greyed out) and red crossed (option will not
be displayed).
Colors
The color of any item in the tree indicates the permissions for that item:
 Black - This color is used only for menus. It indicates that the screens within the menu have
a mixture of different permissions.
 Orange - Indicates that the role has view-only access to the screen/feature (or to all screens
in the menu).
 Blue - Indicates that the role has modify access to the screen/feature (or to all screens in the
menu).
 Green - Indicates that the role has delete access to the screen/feature (or to all screens in
the menu).
 Red - Indicates that the role has no access to the screen/feature (or to all screens in the
menu). In this case, the screen/menu will not be displayed to users who have the role.
Using the Selection screen
The Selection screen is displayed when you select Roles from "Maintenance/User & Preferences". You can
use the Selection screen to create a new user role or to find an existing one to edit. Click here for an overview
of Selection screens and how to use them.
Special Permissions
The following are permissions that are perhaps not obvious:
Home Menu
"Home/Monitoring/Alarms"
Allow Alarm Masking

329
User Roles Screen ("Maintenance/User & Preferences/Roles")

Select this option if you want users who have the role to be able to mask alarms.
Show Masked Alarms
Select this option if you want the users to be able to see the Masked Alarms tab in the
"Home/Monitoring/Alarms" screen. Please refer to Masking Alarms for further information.
Show All Alarms Filter
This determines whether or not the All Alarms tab is displayed in the Alarms screen.
Restrict alarm counts to selected filters
With this option set, alarm counts, alarm sounds and other indications of alarm conditions will
change only for alarms that a user is currently able to view when opening the Alarms screen.
If the All Alarms tab is hidden in the Alarms screen (by deselecting Show All Alarms filter)
and activity filters are applied that cause the Alarms screen to display only certain alarms, then
only those alarms can affect alarms counts, etc.
If the option is not selected and the All Alarms tab is hidden, alarms counts and indicators may
include alarms that you are not able to see in the Alarms screen.
Note that alarms from active maintenance zones do not affect alarm counts and other alarm
indicators.
Note: If you click the Role Filters button in the Roles screen and select a filter for Alarm
filter, any alarm that is blocked by the filter cannot affect alarm counts or other indications of
alarms to the user, irrespective of the Restrict alarm counts to selected filters setting.
"Home/Monitoring/Graphics"
Select Send Predefined Commands Only if you want only predefined commands (as set up in
"Operation/Commands/Predefined") to be available in this screen.
If the user role has no access to "Home/Monitoring/Graphics", this does not disable the automatic
displaying of an alarm graphic when acknowledging an alarm.
"Home/Monitoring/Command Center"
This has Send Commands and/or Request Status permissions for each type of item that can be
displayed in the tree view of the Command Center. These permissions determine whether the users
will be able to send commands and/or view the status of the specified device type.
Deselecting Send Commands overrides any permissions for users to use commands, as set up in
the "Maintenance/User & Preferences/Command Roles" screen.
The Intrusion Systems section include:
 Allow Zone Bypass when Arming - Select this to enable users to bypass intrusion
zones that are in an active state using the Bypass Active Zones setting. This setting
is applicable to M2150 intrusion systems and intrusion systems supported by the Full
Intrusion Management interface. This setting does not affect the ability to bypass
zones individually.
 Allow Node Lock Out Command - Select this to enable users to switch on lock-out
mode.

Note: The Change Company option is always available in the "Home/Monitoring" menu if the user has
more than one company in his/her company group.

"Home/Video & Audio/Virtual Matrix"


The Create/Amend URL permission allows users to add or modify web pages in the Virtual Matrix
screen.
"Home/Identity/Card Holders", "Home/Identity/Visitors" and "Home/Identity/Bulk Card Amendments"
These can be expanded to reveal settable permissions for specific options or tabs.
The following require special mention:

330
Symmetry Software Reference Manual

 Card Holder Notes - This is available for the "Home/Identity/Card Holders" screen
and determines access to notes added using the following icon:

 Card Holder\VisitorShow PIN Code - Deselect this option if you want the PIN and
IDS code to be hidden in the screen. Deselecting the option also removes the PIN
Code and IDS Code options from the "Reports/Identity Reports/Cards" screen.
 The personal data options (for example, Card Holder Personal Data 11-20) affect the
personal data titles available in both the Selection and Definition screens.
 Card Holder\Visitor Print Button - The button to print a person's badge.
 Bulk Card Delete All - This enables the Delete All button in the "Home/Identity/Bulk
Card Amendments" screen.
Giving a user delete access to "Home/Identity/Visitors" enables the user to create visitor personal
data from the Visitors screen without the need to have permissions to the "Setup/Identity/Personal
Data/Visitor Data" screen.
Similarly, giving users delete access to the Card Holder or Bulk Card Amendments screen enables
them to create card personal data in those screens without having permissions to the Card Holder
Data screen.
These can be expanded to reveal settable permissions for specific options or tabs.
The following require special mention:
 Card Holder Notes - This is available for the "Home/Identity/Card Holders" screen
and determines access to notes added using the following icon:

 Card Holder\VisitorShow PIN Code - Deselect this option if you want the PIN and
IDS code to be hidden in the screen. Deselecting the option also removes the PIN
Code and IDS Code options from the "Reports/Identity Reports/Cards" screen.
 The personal data options (for example, Card Holder Personal Data 11-20) affect the
personal data titles available in both the Selection and Definition screens.
 Card Holder\VisitorPrint Button - The button to print a person's badge.
 Card Holder\VisitorCopy Button - The button to copy a card holder or visitor.
 Bulk Card Delete All - This enables the Delete All button in the "Home/Identity/Bulk
Card Amendments" screen.
Giving a user delete access to "Home/Identity/Visitors" enables the user to create visitor personal
data from the Visitors screen without the need to have permissions to the "Setup/Identity/Personal
Data/Visitor Data" screen.
Similarly, giving users delete access to the Card Holder or Bulk Card Amendments screen enables
them to create card personal data in those screens without having permissions to the Card Holder
Data screen.
"Home/Identity/Verification"
This provides the following permissions:
 Allow Temporary Cardholder Access Rights - Selecting this permission enables
users to grant access to a card holder located in the database, even if the card
holder's access rights do not allow access through the door.
Application Menu
Select Print Screen Button if you want the Print option to be available from the Symmetry button in the
top-left corner of the screen. The Print option prints the currently-active screen on the default Windows
printer.

331
User Roles Screen ("Maintenance/User & Preferences/Roles")

Options
Allow user to open files attached to notes - Select this if you want users to be able to open or delete
files attached to notes using the Notes button (available in most definition screens).
Record Video - Select to enable users to record video, such as from the "Home/Video & Audio/Virtual
Matrix" screen or by issuing commands.
Hide Privacy Zones - Selecting this option disables any privacy zones set up for cameras in the
"Install/Video & Audio/Digital Video" screen; that is, live or recorded video will be displayed to users without
areas being blurred or blacked out.
Export Video With Privacy Zones - Select to enable users to export video that contains privacy zones.
Video can be exported as an MPEG4 file when replaying it from, for example, the "Home/Video &
Audio/Video Playback" screen. Privacy zones are removed from any exported video clips.
Listen To Audio - Select to enable users to listen to audio from cameras in the "Home/Video &
Audio/Virtual Matrix" screen.
Allow external commands to be added to the Ribbon Bar - Select to allow users to add executable
programs to the ribbon bar using the Customize Quick Access Toolbar screen.
Allow local file browsing - This option applies only when using the Symmetry Remote Desktop Services
(RDS) Client Access software, as described in the RDS/Citrix Client Access Installation and User Guide.
Enabling this option enables users to browse files (such as card holder images) on RDS browser
machines.
Assign System Admin Privileges - Enabling this option gives System Admin privileges to any user who
has the role. With System Admin privileges, a user can, for example:
 Clear alarms that have not yet been reset (e.g. if an alarm sensor has not been reset).
 Circumvent any permissions set up using the Permissions button in screens.
 Use the Encrypt button in the "Install/Access Control/Client Ports" screen, or the
Encryption button in the "Install/Access Control/Nodes" screen.
 Use the Export NAC option in the "Maintenance/Access Control/Node Status" screen to
specify the nodes to upgrade using the Symmetry Upgrade Manager. When disabled, the file
browse location is restricted to the RDS web server.
Create Hyperlink - Select to allow hyperlinks to be inserted when defining alarm instructions in the
"Operation/Alarms/Alarm Instructions" screen.
Activate Hyperlink - Select to allow hyperlinks to be activated when defining alarm instructions in the
"Operation/Alarms/Alarm Instructions" screen or when viewing an alarm instruction in, for example, the
"Home/Monitoring/Alarms" screen.
128 Bit Badge Identity Editing - For engineering use only.

Definition Screen Options


User Role
This is the unique name of the user role.
Company Group
This specifies the companies associated with the role. Any user who has the user role will be able to administer
the specified companies.
The choice of company can, for example, determine the range of readers made available when setting up
access rights, since each reader belongs to a specified company.
Default Permissions
This button enables you to choose the default user role(s) to list in the Permissions screen, which is displayed
by clicking the Permissions button when setting up new items such as card holders.

332
Symmetry Software Reference Manual

Alarm Processing
Clicking this button displays the Alarm Processing screen, which allows you to categorize alarm types defined
in the "Operation/Alarms/Reporting" screen as "Acknowledge and Clear" (the default) or "Acknowledge Only"
for the role.
Alarms that belong to alarm types categorized as "Acknowledge Only" can be acknowledged but not cleared by
users who have the role.
Role Filters
You can use this button to choose "role filters"; that is, activity filters for the role. The filters are defined in the
"Setup/Configuration/Activity Filters" screen.
The purpose of selecting filters here is to limit the alarms and events that can be displayed in the
"Home/Monitoring/Alarms" and "Home/Monitoring/Activity" screens to users that have the role. You may, for
example, want users who have the role to be able to view only alarms that originate from selected readers (as
defined by the selected filter).
Alarm filter
If you select a filter, an alarm can appear in the "Home/Monitoring/Alarms" screen only if it passes the rules
defined by the filter. An alarm cannot appear in the Alarms screen (irrespective of the tabs and filters
selected in the Alarms screen) unless it passes the rules defined by the filter (or you choose <None>). The
message "Warning role filters are applied" appears near the top of the Alarms screen if Alarm filter is
active for the user. Any alarm that is blocked by Alarm filter cannot affect alarm counts or other
indications of alarms to any user that has the role.
Activity filter
An alarm or event can appear in the "Home/Monitoring/Activity" screen only if it passes the rules defined
by the selected filter. An alarm or event cannot appear in the Activity screen (irrespective filter selected in
the Activity screen) unless it passes the rules defined by the filter selected here.
Auto Logoff Time
Users who have the role are logged off automatically from Symmetry if there is no keyboard or mouse activity
after number of minutes specified by Auto Logoff Time. This is a security measure to prevent unauthorized
use of the system. If a user is logged off, alarms are displayed on the logon screen (if appropriate to the type of
client you are using.
If you specify a value other than zero (0), the setting in this screen takes priority over the same setting in the
"Maintenance/User & Preferences/Client Preferences" screen.
A value of zero (0) causes the value of Auto Logoff Time set in the "Maintenance/User & Preferences/Client
Preferences" screen to be used instead.
Expand
This button fully expands all contents of the currently-selected item in the tree view.
Collapse
This button fully collapses the currently-selected item in the tree view.
Hide
This button is available only for certain checkboxes, such as those in the "Home/Identity/Card Holders/Card
Details" branch. Selecting the button causes a red cross to be inserted into the checkbox to indicate that the
option will be hidden from users who have the role.
Disable
This button removes the check mark from a checkbox selected in the tree view.
Enable
This button adds a check mark to a selected checkbox in the tree view.

333
User Accounts Screen ("Maintenance/User & Preferences/Accounts")

View
Select this option if you want users with the user role to be able to have only view access to the information
displayed by the selected screen/menu.
Modify
Select this option if you want users with the user role to be able to have only view and modify access to the
information displayed by the selected screen/menu. This privilege will enable users to modify records, but not
delete them.
Delete
Select this option if you want users with the user role to be able to have full access to the information displayed
by the selected screen/menu. This privilege will enable users to view, modify and delete records.
None
Select this option if you want users with the user role to have no access to the selected screen (or to all screen
in the selected menu).
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.
Directory
This button is available only if a license for the "Directory/LDAP Authentication Module" is installed. Clicking the
button displays the Directory Settings screen.

User Accounts Screen ("Maintenance/User &


Preferences/Accounts")

General
Overview of this screen
A user is a person who is allowed to use Symmetry. Each user has a name, password and user role.
Before using this screen, make sure that the user roles have been set up in the "Maintenance/User &
Preferences/Roles" screen.

Note: Any changes you make to a user's settings take effect when the user next logs in.
Note: Certain options, such as User Name and Password are disabled if the user has been automatically
created by the "Directory/LDAP Authentication Module".

Selection Screen Options


About the Selection screen
The Selection screen is displayed when you select Accounts from "Maintenance/User & Preferences". You can
use the Selection screen to create a new user account or to find an existing one to edit. Click here for an
overview of Selection screens and how to use them.
The Selection screen displays a Logon Method column if a license for the "Directory/LDAP Authentication
Module" is installed. The column shows the last logon method used by the user, and is either Local or
Directory. A Local logon is one that used a standard Symmetry user account. A Directory logon is one that
used a Symmetry user account that was created automatically for a directory user.
The following option is specific to this Selection screen:
Include Visitor Management Users - User accounts created by Allow Visitor Management Login for this
Cardholder in the "Home/Identity/Card Holders" screen are visible only if this option is selected.

334
Symmetry Software Reference Manual

Include Visitor Management Users


Include Visitor Management Users - User accounts created by Allow Visitor Management Login for this
Cardholder in the "Home/Identity/Card Holders" screen are visible only if this option is selected.
Please refer to the visitor management overview (click here) for further details of the Visitor Management role.

Definition Screen Options


User Name
Enter a unique login username. Case is not important.
This setting is not available for a user account that has been automatically created by the "Directory/LDAP
Authentication Module".
Enabled
Select this option if you want the user to be able to log on and use the system. If the option is not selected, the
user will not be able to log on.
The option is automatically deselected if a user provides an incorrect password a specified number of times, as
determined by Limit Invalid Logon Attempts in the "Maintenance/User & Preferences/System Preferences"
screen.
User Role (or User Group)
Use this pull-down list to select the user's role, as set up in the "Maintenance/User & Preferences/Roles"
screen. This determines the privileges the user will have to the menu options.
This setting is not available for a user account that has been automatically created by the "Directory/LDAP
Authentication Module".
Password
Specify the login password. Click here for further information.
This setting is not available for a user account that has been automatically created by the "Directory/LDAP
Authentication Module".
Retype Password
This box allows you to confirm that the password entered in the Password box is correct. If they are different,
you will have to enter them again.
Enable Password Expiry
Select this option if you want the password to expire after the number of days specified in Duration. By default,
within three days prior to the expiry date, the user is informed at login that the password must be changed. If
this is not carried out, the user will not be able to log in again and will be removed from the system. The period
of three days can be changed by modifying a parameter in the Multimax.ini file.
This setting is not available for a user account that has been automatically created by the "Directory/LDAP
Authentication Module".
Options:
Language
If different Symmetry language packs are installed (as described in the Software Installation Manual), you
can select the language to use for the user. When the user logs in, the system will display text, such as in
menus and screens, in the selected language.
There is also a language setting in the "Maintenance/User & Preferences/System Preferences" screen.
This specifies the default language for all new users. It is also the language used in the Login screen and
for system messages, such as alarm/event messages displayed in the Alarms screen (if available) and in
reports.

335
User Accounts Screen ("Maintenance/User & Preferences/Accounts")

Home Screen
You can select a "Home Screen" defined in the "Maintenance/User & Preferences/Home Screens" screen.
The screens defined in the selected Home Screen will be displayed automatically when the user logs in.
Selecting Lock Position prevents the user from being able to close, adjust the size or change the position
of the home screens.
Task List Assignment
This option is relevant to task processing and assignment, such as in the "Home/Monitoring/Tasks" screen.
The option affects:
 The tasks the user is able to view and process. This is dependent on the user's role, the role
or user the task is assigned to, and the selected Task List Assignment setting:
 All Users - The user is able to view and process any task, irrespective of the user or
role it is assigned to.
 Same User Profile - The user is able to view and process any task assigned to the
user's own role, or any user who has that role.
 User Only - The user is able to view and process only tasks assigned to the user or to
the user's own role.
 The users and roles to which the user is able to assign tasks. This is dependent on the
user's role, and the selected Task List Assignment setting:
 All Users - The user is able to assign tasks to any user or role.
 Same User Profile - The user is able to assign tasks to the user's own role or to any
user who has that role.
 User Only - The user is able to assign tasks only to himself/herself.
Ignore/Bypass Permission Filters
Select this option if you want the user account to bypass any permissions set up in the Permissions screen
for items such as card holders, cameras, readers and reader groups.
Click here for further information.
Enable Permissions
Select this option if you want the Permissions button to be available in screens that the user will use.
Click here for further information.
Authorize Change of Threat Level
This option is applicable only for threat levels that have Requires Authentication set in the
"Setup/Configuration/Threat Levels" screen.
When changing a threat level (for example, in the "Home/Monitoring/Change Threat Level" screen), if the
level selected has Requires Authentication set, two users that have the Authorize Change of Threat
Level privilege must enter their usernames and passwords. The change of threat level is actioned only if
the usernames and passwords are correct.
This option is not available at Card Handler Clients.
Enable Clear All Alarms
Selecting this option will enable the user to use the Clear option in the "Home/Monitoring/Alarms" or
"Home/Video & Audio/Virtual Matrix" screen to clear all displayed or selected alarms, except those that
need a reset. The privilege takes effect at the user's next login.
To clear alarms that need a reset, the user's role requires Assign System Admin Privileges to be set in
the "Maintenance/User & Preferences/Roles" screen.
Instant Replay
This option specifies the maximum period of recorded video that can be reviewed in the Video Replay
screen, when accessed by selecting either of the following:

336
Symmetry Software Reference Manual

 Instant Replay in the "Home/Video & Audio/Virtual Matrix" screen. For further information,
refer to the help for the Video Replay screen.
 Associated Playback Video when replaying video associated with a device that is in alarm
or in a graphic. For further information, please refer to About Camera Views and Camera
Associations.
The option is available only if a Digital Video Management license is installed.

Only Show Badge From Alarm


Selecting this option causes the badge design preview to be displayed when the Card button is clicked in
the "Home/Monitoring/Alarms" screen. If the option is not selected, clicking the Card button opens the card
record.
Show Toolbar
Selecting this option enables the user to access the Intrusion Status toolbar after logging in.
Force Status Toolbar Visible
Selecting this option forces the Intrusion Status toolbar to remain visible while the user is logged in. This
option is available only if Show Toolbar is selected.
Enable Secure Logon
Select this option if the user is required to present a smart card or fingerprint to log on to Symmetry. Choose:
 Smartcard - If a smart card is used.
 Biometric - If a Bioscrypt orS81x fingerprint enrollment reader is used. Secure logons are not
available for Suprema BioLite N2 fingerprint readers.
Note that a fingerprint reader cannot be used for secure logons simply by presenting a card. If you are using a
fingerprint reader, only a fingerprint is used during a secure logon.
If you select Enable Secure Logon, the user's fingerprint, or the details on the smart card being used, must be
captured using the Capture button. Before using Capture, make sure that a fingerprint reader or smart card
encoder is connected to an RS232 port of your computer. The "Install/System/Client Ports" screen specifies the
port that the device is connected to.
When you select Capture, you will be prompted to present the fingerprint or the smart card to be used for the
user's secure logon.
To perform a secure logon, the user enters the username and password in the normal way, then presents the
fingerprint or smart card when prompted. The software compares the fingerprint or card details with those
stored in the "Maintenance/User & Preferences/Accounts" screen, and the logon is accepted if the two match.
A user who has System Admin privileges (as specified in the "Maintenance/User & Preferences/Roles" screen)
cannot use the secure logon option.
Secure logon cannot be used at RDS/Citrix Clients.
This setting is not available for a user account that has been automatically created by the "Directory/LDAP
Authentication Module".
Cardholder Fingerprint Enrollment Options
These settings determine the minimum acceptable quality, content and acceptance threshold when enrolling
fingerprints for S81x readers in the Fingerprint Enrollment screen (accessed from the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen).
About Quality
About Content
About the acceptance threshold
This setting is not available for a user account that has been automatically created by the "Directory/LDAP
Authentication Module".

337
Command Roles Screen ("Maintenance/User & Preferences/Command Roles")

Time of last Logon


This shows the time that the user last logged in.
Logon Method
This is displayed if a license for the "Directory/LDAP Authentication Module" is installed. The field shows the
last logon method used by the user, and is either Local or Directory. A Local logon is one that used a
standard Symmetry user account. A Directory logon is one that used a Symmetry user account that was
created automatically for a directory user.
Copy/Delete/OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

Command Roles Screen ("Maintenance/User &


Preferences/Command Roles")

General
Overview of this screen
You can use this screen to specify the commands that user roles, and therefore users, have access to as
manual commands within Symmetry. For example, you could specify that the "Card Only" command is available
only to the "System Manager" and "Installer" roles, which would prevent users with other user roles from being
able to use these commands in the "Home/Monitoring/Command Centre" and "Home/Monitoring/Graphics"
screens. The screen has no effect on the availability of commands within the
"Operation/Commands/Scheduled" or "Operation/Commands/Trigger" or "Operation/Commands/Predefined"
screens.
The "Assigned User Roles" box (in the User Roles tab) lists the user roles that have permission to use the
commands listed in the "Assigned Commands" box (in the Commands tab).
Users have access to all commands assigned to their user role, and this may be through more than one
command role, as the same user role can be in more than one command role.
The command roles listed in the Selection screen, and the user roles listed in the Definition screen, are not
dependent on the currently-selected company or your company group.
You can use the "Reports/Configuration/Reports" screen to list the commands assigned to each user role.
Using the Selection screen
The Selection screen is displayed when you select Command Roles from "Maintenance/User & Preferences".
You can use the Selection screen to create a new user role or to find an existing one to edit. Click here for an
overview of Selection screens and how to use them.
Using the screen
To specify the commands that selected user roles can use as manual commands:
1. In the User Roles tab, select the user roles by including them in the "Assigned User Roles" box.
2. In the Commands tab, select the commands that you want the selected user roles to be able to
use. You can do this by including the commands in the "Assigned Commands" box.
The Typical Usage column lists the typical usage of each command. Some commands have more than
one typical usage. For these, when commands are listed in alphabetical order, the Typical Usage column
shows the usages comma-separated; for example, "Camera, Intercom". Some commands have no typical
usage.

You can move roles from "Available User Roles" to "Assigned User Roles" as follows:
1. Select the user roles in the "Available User Roles" box. You can control-click or shift-click in the normal way
to select multiple items.

338
Symmetry Software Reference Manual

2. Click >, double-click or drag and drop to the "Assigned User Roles" box.
You can move roles from "Assigned User Roles" to "Available User Roles" as follows:
1. Select the user roles in the "Assigned User Roles" box. You can control-click or shift-click in the normal way
to select multiple items.
2. Click <, double-click or drag and drop to the "Available User Roles" box.
Available Commands
Click here for a description of each command.

Definition Screen Options


Description
This is the unique name of the command role.
Group by
You can use Group by in the Commands tab to group the commands in alphabetical order or by typical usage.
Copy/Delete/Apply/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

System Preferences Screen ("Maintenance/User &


Preferences/System Preferences")

General
This screen enables you to switch on/off various settings that affect all Symmetry clients.

Tabs
Settings
Route Holiday/Advance/Retard Checks to
Advance and Retard Check 7 Days Prior
Limit Invalid Logon Attempts
Allow Use of Old Passwords
Strong Password
Minimum Password Length
Filter by Company
Command Line Logon
Verbose Bulk Card Amendment Logging
Default Language Pack
Save User Screen Positions
Show Door Status on Graphics
Monitor Point Status on Graphics
No of Card Holder Activity Images
Email Notification of Visitor Signing in
Mandatory Intrusion Comments
Enable Comments on Graphic

339
System Preferences Screen ("Maintenance/User & Preferences/System Preferences")

Reason required for Scheduled Command Override


This option is used when a user sets up a scheduled command override in the
"Operation/Commands/Scheduled" screen. Selecting the option causes the Symmetry software to prompt
the user for a reason for the override when the changes are saved.
The reason, the date of the change and the user's name is recorded in the command's notes, which can be
viewed by clicking the Item Notes button in the "Operation/Commands/Scheduled" screen.
Remove Users from Intrusion Panels
This option is relevant Symmetry is being used to create and manage intrusion users at third-party
intrusion panels. The option controls what happens to user details at intrusion panels when a card holder
with intrusion access rights is deleted from Symmetry, or when intrusion access rights are removed from a
card holder in Symmetry.
Select one of the following:
Leave User in Panel - Leaves the user in the panel.
Prompt - Prompts the Symmetry user whether to delete the user from the panel.
Remove User from Panel - Deletes the user from the panel.
Report Auditing Directory
Selecting a folder for this field causes a copy of all reports generated by users of the Symmetry software to
be saved in the specified folder. A copy is saved, irrespective of whether the report is sent to a screen,
printer or file.
Each copy is given the file name "<YYMMDD> - <HH:MM:SS> - <User Who generated the Report> -
<Type of Report>.txt".
For a scheduled report, <User Who generated the Report> is "Scheduled Report".
The feature can be disabled by leaving the field empty.
Erase and Download Cards on Reconnecting Nodes
When enabled, the card holder database in nodes is erased and re-downloaded following a node timeout
(communications failure).
Alarm Settings
Purge Daily Logs After (Days)
Hard Disk Warning at (%)
Show with Alarm/Event
Show Card Number with Alarm/Event
Save Alarm Comments to Log
Enable Printing of Alarms/Events
Clear Alarm if Cleared on Intrusion Panel
Enable Alarm Statistics
Show Alarm Handling
Highlight Unacknowledged Alarms on Reset
Auto Clear Alarm on Reset
Intrusion Arm/Disarm Tolerance
Alarm masking requires second user
Allow area arming with active zones on exit route
Outgoing Communications Receiver
Card Settings
Auto Set Unused Cards Expired
Card Expiry Applies

340
Symmetry Software Reference Manual

Auto Delete Expired Cards


Card Issue Levels
Delay Cards to Dial-Up/LAN Chains
Unique Employee Reference
Approving Official is Mandatory
Card Holders by Company
Multiple Cards
Auto Card Number (Standard Card)
Auto Card Number (Visitor Card)
Inactivate Card When Copying
Maximum No. of Days/Visitor Maximum No. of Days
Prevent Consecutive PIN Digits
Visitor Escort is Mandatory
Disable Visitor Login Sign In/Out
Auto Unassign Expired Visitor Cards
Delete PIN Errors Globally
Default Card Format
Contact Number Personal Data Field
Visitor Management Login is Default
Inactive Time
Delete Inactive Or Expired Multiple Cards
Symmetry Intrusion Duress Mode
Use Access Control PIN as IDS Code
Standard PIN Code Length
IDS Code Length
Random Search Probability
Advanced Access Rights Additive
Imported Card Permissions Role
Prevent Duplicate Credential Encoding
Legacy Direct Badge Printing
This option is used for badge printing. When the option is deselected (the default), Symmetry uses the
"indirect" printing method to print transparent images on badges. This printing method is independent of
the printer driver.
When the option is selected, Symmetry uses the printer driver to print transparent images (known as the
"direct" printing method).
The setting can be overridden at each client by using the UseDirectBadgePrinting ini file parameter at the
client. Setting the parameter to 1 causes the direct printing method to be used. Setting the parameter to 0
causes the indirect printing method to be used.
Card Inhibition Period
Digital Video
HTTP
Camera Tour Time
Encoding
This tab is displayed if a license for the Card Encoding Module is installed.

341
Client Preferences Screen ("Maintenance/User & Preferences/Client Preferences")

Mifare Plus S Encoding


If you are using MIFARE Plus S Encoding, choose the encoding options.
MIFARE Plus S uses classic MIFARE operation, and supports optional AES SL1 authentication for
applicable readers. Therefore, if you are using MIFARE Plus S, Mifare Classic must be selected, but AES
Card Authorisation (SL1) is optional.
Mifare Plus X Encoding
The MIFARE Plus X encoding options give the same capability as MIFARE Plus S, but also provide SL2
authorization. You can choose:
 Mifare Classic only.
 Mifare Classic and AES Card Authorisation (SL1) (requires the reader to support AES
SL1).
 AES Sector Authorisation (SL2) only.
Suprema Biometric Encoding
These options are relevant only if you are using a Suprema BioLite N2 Biometric Reader. Full details of
this integration are provided in the Third-Party Access Devices Configuration and User Guide.
Encode PIN - This sets the default state of the same option in the Encode screen, which is displayed
when you click Encode in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen. You can
choose whether or not to encode the card holder's or visitor's PIN on the card.
Encode Fingerprint - This sets the default state of the same option in the Encode screen, which is
displayed when you click Encode in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
You can choose whether or not to encode the card holder's or visitor's fingerprint on the card.
Store Fingerprints in Symmetry - Select this option if you want to allow Symmetry to store fingerprints. If
this option is not selected, card holders will need to re-enrol their fingerprints if, for example, a new card
needs to be encoded.
Biometric Template Format - Select the biometric template that the reader has been configured to use.

Client Preferences Screen ("Maintenance/User &


Preferences/Client Preferences")

General
Overview of this screen

Tabs
Settings
Auto Logoff Time (Mins)
Enable Logon Cancel Button
Auto Display Graphic On Call Request
Enable Alarm Banner
Visitor Selection By Today
Show Background Image
Background Image File Name
Default Fingerprint Acceptance Threshold
Force Fingerprint Verification
Selection List Rows Limit

342
Symmetry Software Reference Manual

Filter by Company
Alarm Settings
Default Alarm Sound / Custom Default Alarm Sound File
You can use this menu to choose a default alarm sound for this client. The sound is used if an alarm is
displayed at the client and no alarm sound is selected in the "Operation/Alarms/Definitions" screen. If you
select Custom, you can choose a sound of your choice (media wave file) by clicking Find Sound. Custom
Default Alarm Sound File shows the media wave file you have selected using Find Sound. Select None
if you do not want a default sound.
There are some useful "wav" files in the Program Data\Security Management System\Sounds folder.
Show Chain Name with Alarms
Selecting this option causes a "Chain" column to be displayed in the "Home/Monitoring/Alarms" and
"Home/Video & Audio/Virtual Matrix" screens. The chain name is displayed if the alarm has originated from
a node located on a LAN, hardwired or dial-up chain.
The chain name is not displayed in the "Home/Monitoring/Activity" screen.
Auto Show Graphic on any Alarm
Select this option if you want the "Home/Monitoring/Graphics" screen to be automatically displayed when
an alarm occurs at any device that has a graphic.
If a graphic hierarchy has been defined, Display Lowest Graphic Level determines whether the highest-
level or lowest-level graphic containing the device is displayed.
A graphic is displayed only if the "Home/Monitoring/Alarms" screen is not open (if the
"Home/Monitoring/Alarms" screen is open, the software assumes that the user would prefer to continue to
use this screen).
Note: You can use Display Graphic on Alarm in the "Operation/Alarms/Definitions" or
"Operation/Alarms/Reporting" screen to display a graphic only when a selected device goes into alarm.
Selecting Auto Show Graphic on any Alarm applies to all devices and overrides Display Graphic on
Alarm.
Display Lowest Graphic Level
This option is relevant if Auto Show Graphic on any Alarm is selected above, or if Display Graphic on
Alarm is selected in the "Operation/Alarms/Definitions" or "Operation/Alarms/Reporting" screen. If the
option is selected, the lowest-level graphic containing the device will be displayed. If the option is not
selected, the highest-level graphic containing the device will be displayed.

Alarm Comments Mandatory


If you select this option, it will be mandatory to enter or choose a comment when acknowledging or
clearing an alarm in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen.
The Clear (clear all) option in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix"
screen requires only one comment to be entered or selected when Alarm Comments Mandatory is
selected.
Enable Multiple Alarm Selection
Selecting this option enables more than one alarm to be selected in the "Home/Monitoring/Alarms" or
"Home/Video & Audio/Virtual Matrix" screen. If the Alarms or Virtual Matrix screen is open, close and re-
open it to action a change to this option.
You may want to be able to select multiple alarms to clear them with one click.
This option is not available if Show Combined Alarm/Acknowledgement Screen is selected.
Display Alarm Statistics
Select this option to show alarm statistics in the "Home/Monitoring/Alarms" screen at the client.
This option is not available if Show Combined Alarm/Acknowledgement Screen is selected.

343
Client Preferences Screen ("Maintenance/User & Preferences/Client Preferences")

Note that this option only prevents the displaying of the statistics at the client computer. If you want to stop
the alarm statistics processing at the server to obtain performance benefits, deselect Enable Alarm
Statistics in the "Maintenance/User & Preferences/System Preferences" screen.
Reset Alarm Statistics
Sets Alarms received since last reset in the "Home/Monitoring/Alarms" screen to zero.
This option is not available if Show Combined Alarm/Acknowledgement Screen is selected.
Enable Simulated Transactions
Selecting this option enables a user who is logged into the Symmetry software at the client to simulate
alarms/events using keyboard shortcuts. For example, pressing CTRL and F1 simulates a Door Forced
transaction for the first reader (ID=1) attached to the first node (ID=1) defined in the database.
This option may be useful for demonstrating alarms and activity in the Symmetry software.

Note: For this feature to work, the readers and monitor points must connect to the first node that was set
up in the database (database ID=1). The feature will not work if you have deleted this node, even if you
delete all nodes and set up another.

The shortcuts are as follows.


Reset the following alarms - F12
Monitor Point 1 Alarm - F1
Monitor Point 2 Alarm - F2
Monitor Point 3 Alarm - F3
Monitor Point 4 Alarm - F4
Monitor Point 5 Alarm - F5
Monitor Point 6 Alarm - F6
Monitor Point 7 Alarm - F7
Monitor Point 8 Alarm - F8
Reader 1 Forced - Ctrl F1
Reader 2 Forced - Ctrl F2
Reader 3 Forced - Ctrl F3
Reader 4 Forced - Ctrl F4
Reader 5 Forced - Ctrl F5
Reader 6 Forced - Ctrl F6
Reader 7 Forced - Ctrl F7
Reader 8 Forced - Ctrl F8
Card 1 at Reader 1 - Ctrl 1
Card 2 at Reader 1 - Ctrl 2
Card 3 at Reader 1 - Ctrl 3
Card 4 at Reader 1 - Ctrl 4
Card 5 at Reader 1 - Ctrl 5
Card 6 at Reader 1 - Ctrl 6
Card 7 at Reader 1 - Ctrl 7
Card 8 at Reader 1 - Ctrl 8
Card 9 at Reader 1 - Ctrl 9
Card 1 at Reader 2 - Alt 1
Card 2 at Reader 2 - Alt 2
Card 3 at Reader 2 - Alt 3

344
Symmetry Software Reference Manual

Card 4 at Reader 2 - Alt 4


Card 5 at Reader 2 - Alt 5
Card 6 at Reader 2 - Alt 6
Card 7 at Reader 2 - Alt 7
Card 8 at Reader 2 - Alt 8
Card 9 at Reader 2 - Alt 9
Card 1 at Reader 8 - Ctrl Alt 1
Card 2 at Reader 8 - Ctrl Alt 2
Card 3 at Reader 8 - Ctrl Alt 3
Card 4 at Reader 8 - Ctrl Alt 4
Card 5 at Reader 8 - Ctrl Alt 5
Card 6 at Reader 8 - Ctrl Alt 6
Card 7 at Reader 8 - Ctrl Alt 7
Card 8 at Reader 8 - Ctrl Alt 8
Card 9 at Reader 8 - Ctrl Alt 9
Show Seconds for Transactions
Selecting this option causes the time of all alarms, events and other logged information shown in the
Symmetry software to include seconds. All multiNODE transactions have a 2-second resolution. Other
transactions are reported as accurately as possible.
Show Combined Alarm/Acknowledgement Screen
Selecting this option enables the combined alarm/acknowledgement appearance for the
"Home/Monitoring/Alarms" screen. Please click here for further information.
Alarm screen behaviour
This determines the alarm that is auto-selected when an alarm is received, acknowledged, cleared or
masked in the "Home/Monitoring/Alarms" screen.
Select Do nothing if you do not want an alarm to be auto-selected, Go to top alarm to select the alarm at
the top of the list, or Select next alarm to select the next alarm.
If the Alarms screen is open, close and re-open it to action any change.
Digital Video
Playback Searching
This option determines the default search option in the "Home/Video & Audio/Video Playback" screen. For
further information, see the help for "Search menu" in the Video Playback screen. Click here to go to the
help topic.
Show live video from graphics in
This option specifies whether to display live video in the Virtual Matrix or in a separate window when you
right-click a camera in the "Home/Monitoring/Graphics" screen and select Live Video.
Expand Cell On Double Click
This determines the effect of double-clicking a cell in the "Home/Video & Audio/Virtual Matrix" screen:
 If Expand Cell on Double Click is not selected, double-clicking swaps the image with the
image in the lowest-numbered cell that is physically larger than the one selected (for
example, cell 1). This feature can be used to switch the image in a small cell to larger "spot
monitor".
 If Expand Cell on Double Click is selected, double-clicking changes the layout to a single
cell and displays the image in that cell. Double-clicking again reverts to the previous layout.
This is the same as the right-click Expand Cell option.

345
Home Screens Definition ("Maintenance/User & Preferences/Home Screens")

CCTV Connections
This tab is displayed only if enabled in the "Maintenance/User & Preferences/Roles" screen. The tab allows you
to configure CCTV switchers.

Home Screens Definition ("Maintenance/User & Preferences/Home


Screens")

General
Introduction
You can use this screen to store the names and positions of the currently open screens. This information is
stored as a named "Home Screen". Note that a Home Screen can actually contain the names and positions of
more than one screen.
If a user is assigned a Home Screen in "Maintenance/User & Preferences/Accounts", the screens it contains
are automatically displayed when the user logs in. The user can also select Home in the Window menu to
display the screens (all other screens will be closed).

Screen Options
New
Clicking New stores the names and positions of the currently open screens, except "Maintenance/User &
Preferences/Home Screens". You are prompted to enter a name for the Home Screens definition.
Update
Clicking Update displays a dialog that enables you to change the name of the currently selected Home Screen,
and/or the screens it stores. Select Save current window layout for this Home Screen to change the Home
Screen definition to include only the names and positions of the currently open screens.
Delete
Click Delete to delete the currently selected Home Screen.
Close
Click Close to close this screen.

Download Cards Screen ("Maintenance/Download/Cards")

General
Use this screen to force card data to be downloaded to all nodes. A node is a 'black box' that controls and holds
data for one or more readers.
Use this screen prior to a service call if you find that one or more cards inexplicably do not function as expected.
The node may have become out of step with the data on the server (for example, due to a communications error),
and using this screen may cure the problem.

Screen Options
No Immediate Download
Select this option if you want to select OK to save the Automatic Download settings without causing an
immediate download by card number, company or chain name.

346
Symmetry Software Reference Manual

By Card Number, Start Card Number, End Card Number


Select this option if you want to download one or more cards by entering the card numbers. All card numbers
between Start Card Number and End Card Number (inclusive) are downloaded.
By Company, Select Company Name
Select this option if you want to download all cards belonging to a selected company. Select the company name
from the pull-down list.
By Chain Name
Select this option if you want to download all cards used at a selected chain of nodes. Select the chain name
from the pull-down list.
Automatic Download
The options in this box are ungrayed only if Delay Cards to Dial-Up/LAN Chains is selected in the
"Maintenance/User & Preferences/System Preferences" screen.
Selecting Scheduled Command Downloads Cards to All Dial-Up/LAN Chains has the effect of updating
ALL card details at every node on any dial-up or LAN chain at the times specified by Start Command, Stop
Command and Time Code.
If you choose a Start Command of Download Cards, the download will occur at every start time in the
selected time code. If you choose a Stop Command of Download Cards, the download will occur at every end
time in the selected time code.

Download a Node ("Maintenance/Download/Node")

Introduction to this Screen


Use this screen to download system configuration and/or card data to a selected node. Normally, this data is
downloaded automatically when a new node is connected to the system (unless the multimax.ini file specifies
otherwise). However, you may want to use this screen to perform a manual download if you suspect that the node's
data has become out of step with the data in the Symmetry databases.

About the Options


Chain Name
Select the chain that the node is connected to.
Node Description
Select the node.
System Data
System data includes how nodes, readers, monitor points and auxiliary outputs have been set up, details of
scheduled and trigger commands, time codes, etc.
Card Data Only
Card data includes:
 Data that has been set up in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
 Card-block data (except setblock data for system 3000 readers, as specified in the
"Setup/Identity/Card Blocks" screen; this must be downloaded using the
"Maintenance/Download/Chain" screen).
Card Data and System Data
Selecting this causes both system data and card data to be downloaded.

347
Download a Chain ("Maintenance/Download/Chain")

Download a Chain ("Maintenance/Download/Chain")

Introduction to this Screen


Use this screen to download system configuration and/or card data to all nodes on a specified chain. Normally, this
data is downloaded automatically when a new node is connected to the system (unless the multimax.ini file
specifies otherwise). However, you may want to use this screen to perform a manual download if you suspect that
the node data has become out of step with the data in the Symmetry databases.

About the Options


Chain Name
Select the chain.
System Data
System data includes how nodes, readers, monitor points and auxiliary outputs have been set up, details of
scheduled and trigger commands, time codes, etc.
Card Data Only
Card data includes data that has been set up in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen, plus card-block data (except setblock data for system 3000 readers, as specified in the
"Setup/Identity/Card Blocks" screen).
Card Data and System Data
Selecting this causes both system data and card data to be downloaded.
System 3000 Card Block Data
(multiNODE-2 and multiNODE-2+ only).Selecting this causes System 3000 setblock card-block data to be
downloaded, as set up in the "Setup/Identity/Card Blocks" screen.

Download a Video Server ("Maintenance/Download/Video Server")


You can use this screen to reset some makes of video server (originally used for ENVS), or to download the
configuration settings stored at the Symmetry database server.
You may want to download configuration settings if the video server has been offline and you want to be sure that
the configuration settings are the same as those stored in the Symmetry database.

Download Intrusion Users ("Maintenance/Download/Intrusion


Users")
You can use this screen to download intrusion user details to all intrusion panels or to a selected intrusion panel.
You may want to use this screen to perform a manual download if there is a doubt that the information held in the
Symmetry database is not the same as the information held in the intrusion panels.
Under normal circumstances, it should not be necessary to use this screen, since downloads are performed
automatically when you make changes to intrusion system access rights in the "Home/Identity/Card Holders"
screen.

348
Symmetry Software Reference Manual

Node Priority Screen ("Maintenance/Download/Node Priority")

Introduction to this Screen


You can use this screen to specify the order that you want Symmetry to download card and other data to nodes.
This screen may be useful for sites that have a very large number of nodes and cards. When there are significant
changes to access rights or other card data, Symmetry can take some time to download all data to all nodes. You
can use this screen to prioritize the order to ensure that nodes of greatest importance have their card details
updated first.

Using the Screen


To prioritize the download order:
1. In the Available Nodes box, select the nodes you want to prioritize. You can use the Control and Shift keys
in the normal way to select multiple nodes.
2. Click the ">" button or drag and drop the nodes to the Assigned Nodes box.
3. Use the up and down arrows to change the priority order, if required. The node at the top of the list has the
highest priority.
You can move nodes back to the Available Nodes box using the "<" button or drag and drop. Symmetry normally
downloads nodes listed in the Available Nodes box in the order that they were defined, meaning that the node
defined most recently is downloaded last.

About the Options


Filter by
You can use Filter by to reduce the number of items listed in the Available Nodes box. For example, if you
select Location from Filter by, and enter "North" in the Matching field, only items whose location includes
"North" are listed.
After entering text in the Matching field, press Enter or click to action the filter.
Leaving the field empty means "match all". So, if you select Location from the Filter by menu and leave the
field empty, this will cause all items to be listed that have a location specified.
The following Filter by options are provided:
 Node - The name of the node.
 Chain - The name of the chain that the node is connected to, as specified in the node definition. For
nodes that do not use a chain name created in the "Install/Access Control/Chains" screen, the
chain name is the same as the node name.
 Location - The location of the node, as specified by the Location field in the node definition.
 Category - The category of the node, as specified by the Category field in the node definition.
Group by
This menu allows you to group the nodes listed in the Available Nodes box:
 Chain - The nodes are grouped by chain name.
 Location - The nodes are grouped by their location, as specified by the Location field in the node
definition.
 Category - The nodes are grouped by their category, as specified by the Category field in the node
definition.

349
Door Timing Screen ("Maintenance/Access Control/Door Timing")

Door Timing Screen ("Maintenance/Access Control/Door Timing")

General
Overview of this screen
Use this screen to alter various door-related times, such as the length of time that a door is allowed to remain
open after access has been granted.
You are able to alter times only for the readers assigned to the currently selected company. The installer
defines the readers that are assigned to each company.
The door times specified in this screen override the settings made in the "Install/Access Control/Reader"
screen.
It is also possible for card holders to override the default door open time at Series 6xx and later readers,
providing the reader has a keypad. For further information, see About Card Commands.

Note: This screen cannot be used to change door timings for doors controlled by ASSA ABLOY DSR locks.

Screen Options
Reader Description
Use this pull-down list to choose the reader that controls the door.
Unlock Relay Times
Once a door is unlocked, this is the maximum amount of time that the person is given to open the door before it
is relocked. If the door is not opened within this amount of time, the person must present the card again.
Door Open Time and Door Pre-held Time
These times are intended to cases of when, for example, a door is jammed open. After the door has been
unlocked, if the door is open after the amount of time specified by Door Open Time, the reader's pre-held
sounder (if fitted) operates until the door is shut. The maximum length of time that the sounder operates is
specified by Door Pre-held Time (which could be zero). The sounder warns that the door should be closed. If
the door is still open at the end of the Door Pre-held Time, the reader generates a 'Door Held Open'
event/alarm.
It is possible for card holders to override the default Door Open Time at Series 6xx and later readers (providing
the reader has a keypad). For further information, see About Card Commands.
Extended Unlock Time
This is an alternative unlock relay time for people who have the Extended Door Times option set in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Extended Open Time and Extended Pre-held Time
These specify an alternative door open time and door pre-held time for people who have the Extended Door
Times option set in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Previous
Use this button to move alphabetically backwards through the readers.
If you do not select OK before selecting Previous, any changes you have made are lost.
Next
Use this button to move alphabetically forwards through the readers.
If you do not select OK before selecting Next, any changes you have made are lost.

350
Symmetry Software Reference Manual

Upload Screen ("Maintenance/Access Control/Upload")

General
You can use this screen to upload all events stored at nodes at a remote site; that is, in a "dial-up chain" or
periodically-accessed "LAN chain". The installer normally sets up your system to collect the data automatically at
regular intervals, but you may want to upload the data manually if you receive a Node Buffer >75% Full or Node
Buffer Overflow alarm, or if you need to produce a history report of recent activity at the site.
Click here for details of Node Buffer >75% Full.
Click here for details of Node Buffer Overflow.
Once you have started an upload, you can continue to use the system while the upload takes place.

Note: The upload can take some time. Before starting an upload, note that normal communications with other
chains that use the same PC port are suspended. For example, if you add new card holders or change their details,
this information is not sent to other chains that use the same PC port until the upload is complete. In addition, if the
other chains do not have access to a secondary dial-in modem, new alarms are not delivered until the upload is
complete.

The number of retries, time between retries and the maximum connect time are the same as for a scheduled call to
the site, as set up by the installer.

Screen Options
Dial-Up Site/LAN Chain Name - Choose the dial-up chain or LAN chain that is to have its events uploaded. Only
LAN chains that are set up for Periodic access in the "Install/Access Control/Chains/LAN" screen are included.

Node Status ("Maintenance/Access Control/Node Status")


Use this screen to find out the firmware version number of one or more selected nodes. Use Find to list the nodes,
select each node, then select Open.
You cannot select two or more nodes that are located at different remote sites but use the same dial-up modem
(the All button is grayed out in this case).
Export NAC
An Export NAC option is available at the bottom of the screen if Assign System Admin Privileges is enabled
in the Options tree of the "Maintenance/User & Preferences/Roles" screen.
Export NAC allows you to produce a NAC (Node Authorization Certificates) file for the Symmetry Upgrade
Manager. The file allows the Upgrade Manager to locate Symmetry nodes prior to upgrading their firmware.
The Upgrade Manager can locate nodes that use encrypted communications only by importing a NAC file.
Clicking Export NAC displays another screen that allows you to choose the Symmetry nodes to upgrade. Once
you have selected the nodes, click Export to produce the NAC file.
The Expiry field allows you to specify an expiry date for the NAC file. The file will not be able to be used after
the expiry date.
You can also enter a File Password to protect use of the NAC file. You will need to enter the specified
password when importing the NAC file into the Upgrade Manager.

351
Encode Cards Screen ("Maintenance/Access Control/Encode Cards")

Encode Cards Screen ("Maintenance/Access Control/Encode


Cards")

General
Overview of this screen
This screen enables you to encode a card number and other information onto a magstripe card. If required, you
can encode a range of cards.
The computer port used by the magstripe encoder is defined by the installer.
When you have selected or entered the required information in the screen, select OK to begin the encoding
process. Any existing encoded information on the card is overwritten.

Note: You can encode smart cards using the Encode button in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.

If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System


Preferences" screen, the same card credentials cannot be encoded onto more than one card. For further
details, please refer to the help for Prevent Duplicate Credential Encoding in the System Preference screen.
If you are encoding a range of cards with Prevent Duplicate Credential Encoding set, and one or more cards
has already been encoded, you are prompted to choose whether to continue or cancel encoding. If you choose
to continue, any previously encoded cards are not encoded.

Screen Options
Facility/Customer Code
Use this pull-down list to select the facility/customer code to encode on the card(s). Facility/customer codes are
defined in "Setup/Configuration/Facility/Customer Codes".
The customer codes allowed to be encoded on a card are specified in an encrypted file.
Select Format
Select the encoding format, track number (cards may have more than one magnetic track) and bpi (bits per
inch) setting. Micromax always uses 75bpi.
The formats are defined in the "Install/System/Default Settings/Reader/Card Formats" screen, but only certain
formats are supported for encoding.
The installer can set up the default track in an ini file.
Start Card Number
Specify the card number to encode on the first card.
End Card Number
Specify the card number to encode on the last card. If you want to encode just a single card, specify the
required card number in Start Card Number only.
Card Issue Number
Specify the card issue number if the card format requires an issue number. 0 is the first issue number 9 is the
maximum issue number.
The Card Issue Levels setting in the "Maintenance/User & Preferences/System Preferences" screen
determines whether or not an issue number is needed.
Instruction Messages
This box displays messages and prompts as the cards are being encoded.

352
Symmetry Software Reference Manual

OK
Click to start encoding.
Cancel
This takes you out of the Encode Cards screen without performing any encoding action. It also allows you to
abort an encoding session.

Read a Card Screen ("Maintenance/Access Control/Read a Card")

General
Overview of this screen
This screen enables you to use a magstripe encoder to read the card number and customer code (if applicable
to the card technology) that is encoded on a magstripe card. The computer port used by the reader is defined
by the installer.
Click OK to start the process.

Screen Options
Select Format
Select the encoding format and track number (some cards have more than one magnetic track). The installer
can set up the default track in an ini file.
Instruction Messages
This box displays messages and prompts during the process.
Data Read
The encoder unit reads the customer code and card number on the card.
If the customer code is known to the system, the corresponding name of the company is displayed.

Read a Smart Card Screen ("Maintenance/Access Control/Read a


Smart Card")

General
Overview of this screen
This screen enables you to read the encoded details of a smart card.
The computer you are using must be connected to a Smart Card Encoder, as selected in the
"Install/System/Client Ports" screen. The screen cannot be used to read cards presented to an S81x fingerprint
encoder, or 821/822 encoder.
Select OK to begin the process.

Screen Options
Select Sector to use
DES Fire Encoding
User PIN Active
Format
Site number
User PIN

353
System Time Screen ("Maintenance/Time/System Time")

Instruction Messages
Data Read

System Time Screen ("Maintenance/Time/System Time")

General
Overview of this screen
This screen enables you to view the current date and time and the daylight-saving adjustments that are set up
in Windows at this computer. The settings have been defined using Date/Time in the Windows Control Panel.
You can also use the screen to send the current date and time to all nodes in the system (not just those
connected or controlled by this computer).
The time at nodes connected by a permanent link to the controlling client PC is automatically updated
approximately every half hour. The time at nodes on dial-up chains is updated whenever the controlling client
PC connects to the chain. You can send the current time to all nodes on the system by selecting Send Time To
Controllers.
About the Advance/Retard Check dialog
A Clock Advance/Retard Check dialog is automatically displayed when a user logs in at any time during the 7-
day period prior to the advance/retard date. The dialog is displayed only when logging in at the client PC
specified by Route HolidayAdvance/Retard Checks to in the "Maintenance/User & Preferences/System
Preferences" screen.
The dialog enables the user to check that the advance/retard date is correct before it occurs. The dialog has
OK and Cancel buttons. Selecting OK prevents the message from being displayed again for the
advance/retard date (details of the user who selects OK are saved in the History log). Selecting Cancel causes
the message to be displayed again at the next login.

Screen Options
Current Time
This displays the current date and time, the computer's time zone and whether the computer is currently
running within standard or daylight-saving time.
Standard Time
This box shows information only if the computer's clock has been set up in Windows to adjust automatically for
daylight-savings time changes. The box shows the adjustment date, time and value to take the computer from
daylight-savings time to standard time.
The adjustment date, time and value are determined automatically within Windows from the selected time zone.
The displayed date is in the current year; this will automatically change at the beginning of the next year.
Daylight Saving Time
This box shows information only if the computer's clock has been set up in Windows to adjust automatically for
daylight-savings time changes. The box shows the adjustment date, time and value to take the computer from
standard time to daylight-savings time.
The adjustment date, time and value are determined automatically within Windows from the selected time zone.
The displayed date is in the current year; this will automatically change at the beginning of the next year.
Send Time To Controllers
Select this option if you want to update the date and time at all nodes in the system (not just those connected or
controlled by this computer) when you select OK.

354
Symmetry Software Reference Manual

Sync Scheduled Commands Now


When a system is first commissioned or the server is offline for a long period of time, there is a possibility that
scheduled commands defined in the database may not be in synchronization with the commands stored in
nodes.
Selecting Sync Scheduled Commands Now, then OK in the "Maintenance/Time/System Time" screen causes
all scheduled commands to be re-issued to all nodes. This may cause any previously sent manual commands
to be overridden.

Client Comms ("Maintenance/Communication/Client")

Introduction to this Window


Purpose of the Window
You can use this screen to view communication messages between this client PC and device connected to its
ports.
This window is intended for engineering support purposes only and reduces system performance. Therefore, it
should be displayed only when absolutely necessary.

Note: Some types of devices (such as fingerprint enrollment readers) are not able to be monitored.

Use the Find button in the Selection screen to find the port(s) to monitor. Select the port(s), then click OK. A
separate window is displayed for each port selected. You can use All or Clear in the Selection screen to
select/deselect all ports listed.

Note: If a node is disconnected then reconnected to the network, it may take a while for the node to accept
messages from Symmetry. A "connection refused" message appears repeatedly until the connection is
accepted.

About the Options


Current Chain
Each chain has a unique number that is automatically allocated. It does not necessarily correspond to the client
PC's COM port number. Initially, Current Chain may be blank for dial-up or dial-in chains.
Messages Sent
Displays the total number of messages sent to the nodes on the chain during the debug sessions.
Debug On/Off
Select this option to switch on or off the displaying of the communications between this client PC and the port.
Hold, View Held, View Free
Selecting this button freezes the messages in this window. You can then use the scroll bars to examine the
messages more closely. Selecting the button again unfreezes the window (messages received while the
window was frozen will not be displayed).
After clicking Hold, the button text toggles between View Held and View Free.
Filter On/Off
When switched on, only messages that are set up in the filter in multimax.ini are shown in the window.
Clear
This clears messages displayed in the window.

355
System Licenses ("Maintenance/Licensing/System Licenses")

Show Tests
For engineering use only.

System Licenses ("Maintenance/Licensing/System Licenses")

Overview
This "Maintenance/Licensing/System Licenses" screen enables you to install and register licenses for optional
software modules, or for packages that extend the capabilities of the Symmetry software.
The screen lists the licenses that are installed, their serial number and their status.
The "Reports/Configuration/System Configuration" screen shows the supported number of readers, clients,
cameras and other devices. This depends on the licenses purchased and the version of the Symmetry software that
is being used.

Registering an Installed Module


If the license status of an installed software module is Inactive, it was not registered at the time it was installed. You
need to register the module to use it.
To register a module:
1. Select the module in the list.
2. Click Register. A dialog is displayed.
Note: Register the main Symmetry software at the Symmetry server only. Close down the Symmetry
software at any other clients to enable the OK button and register the software.
3. You need to obtain an activation code to activate the Symmetry software. You can obtain the activation
code in one of the following ways:
 Automatically over the internet by selecting Activate your license via the Internet. Note: A
license can be activated online up to three times before needing to be reset by Customer
Support.
 By clicking the link. You will be prompted to log in and register your details. The login
username and password are provided on the Software License Certificate. You will need the
Serial Number and Registration Key displayed near the top of the dialog.
 By phone using one of the numbers displayed.
When you have the activation code, write it down in the space provided on the Software License
Certificate.
4. Click OK.
5. Restart the Symmetry software if the required options are not displayed. You may also need to restart the
Symmetry server.

Adding a License
If you want to add a license:
1. Click Add. A dialog is displayed.
2. Enter the serial number given to you when the license was purchased.
3. Follow steps 3, 4 and 5 above.

Deleting a License
You can delete an inactive license by selecting the license and clicking Delete.
If you need to delete an activated license, please contact your AMAG support representative.

356
Symmetry Software Reference Manual

Reassigning a Symmetry Client License to a different Machine


The Network Name column in the System Licenses screen is for Symmetry client licenses. The column shows the
Windows computer name of the client.
You can use the Release button in the "Install/System/Clients" screen to release a Symmetry Client license from a
machine. You can then install Symmetry on a different machine using the same license serial number that you used
previously.
Network Name displays "Unassigned" if the license is not yet assigned to a machine.

RDS/Citrix Client Licenses ("Maintenance/Licensing/RDS/Citrix


Client Licenses")

Introduction to this Screen


Purpose of this Screen
This screen enables you to install licenses for RDS/Citrix clients.
The Symmetry RDS/Citrix Client Access software enables you to monitor, control and administer Symmetry
using Microsoft Internet Explorer over the Internet or through your company's intranet.
You are supplied with a license code after purchasing the Symmetry RDS/Citrix Client Access software. Enter
this code in the New License Code field, then click Add.
For further details of the Symmetry RDS/Citrix Client Access software, please refer to the RDS/Citrix Client
Access Installation and User Guide.
Types of License
There are two types of RDS/Citrix Client license:
 Standard license - This allows the RDS/Citrix Client to access all Symmetry features supported
through a web server. The screens displayed depend on the user's privileges, as set up in the
"Maintenance/User & Preferences/Roles" screen.
 Visitor license - This gives access only to the options provided by the default Visitor Management
role. Note that changes to the Visitor Management role will have no effect on the options provided
at the client.
If both types of license are installed, a visitor license is granted if the user logs in with a Visitor Management
role. Otherwise, a standard license is granted.
How RDS/Citrix Client Licensing Works
Each RDS/Citrix Client requires a Symmetry license before a user at that client can use the Symmetry software.
When the RDS/Citrix Client Access module is purchased, a license code is supplied, which when entered into
the "Maintenance/Licensing/RDS/Citrix Client Licenses" screen, creates a pool of one or more RDS/Citrix Client
licenses. The licenses are listed in the "Maintenance/Licensing/Citrix Client Licenses" screen.
When a standard RDS/Citrix Client connects, a license is automatically allocated to that PC from the pool.
When the user logs out, the license is automatically released to the pool and is available for use by a user from
another PC.
When a visitor RDS/Citrix Client connects, a license is allocated to that PC from the pool. From that point
onwards, the license cannot be used by another PC (irrespective of whether or not the client is connected). It is,
however, possible to manually release a license back to the pool.
RDS/Citrix Client licenses are issued using unique license numbers. Each license number will be issued to you
on a secure license card. The software license holder is required to retain all license cards. Please contact your
authorized reseller if you have purchased a RDS/Citrix Client license and have not received a license card.

357
Maintenance Zones Screen ("Maintenance/Maintenance Zones/Maintenance Zones")

About the Options


New License Code
If you have received a new license code to provide additional RDS/Citrix Client licenses, enter the code and
click Add.
Licenses
Shows the number of RDS/Citrix Client licenses installed.

Column Headings
License Code
Shows the license code that was previously entered in the New License Code field to provide the license.
License Type
Indicates whether the license is a standard or visitor license.
Allocated Machine
Shows the network name of the machine that has been allocated the license.

Buttons
Add
Click this button after entering a new license code in New License Code.
If you have used Delete, you are not able to use Add for a period of 60 seconds.
Delete
Choose a license code in the list then click Delete if you want to delete all licenses added using that license
code. You can add the licenses again by entering the license code in New License Code and clicking Add.
Release
This is relevant only for visitor RDS/Citrix client licenses. You can select a license and click Release to release
the license from the allocated machine and return it to the pool of available licenses.
After using Release, the button is disabled for a period of 60 seconds.

Maintenance Zones Screen ("Maintenance/Maintenance


Zones/Maintenance Zones")

General
Overview of this screen
You can use this screen to define maintenance zones.
Using the Selection screen
The Selection screen is displayed when you select Maintenance Zoness from "Maintenance/Maintenance
Zones". You can use the Selection screen to create a new maintenance zone or to find an existing one to edit.
Click here for an overview of Selection screens and how to use them.

Definition Screen Options


Description
This is the unique name of the maintenance zone.

358
Symmetry Software Reference Manual

Active
Select this option if you want the maintenance zone to be active.
Available Nodes
This box lists the nodes that are not yet in the maintenance zone.
A node cannot be in more than one maintenance zone.
Selected Nodes
This box lists the nodes that are in the maintenance zone.
>>/<</Delete/Save/Close
These buttons are common to many Definition screens. Click here for details of these options.

359
Hyperlinked Main Topics

About Alarm and Output Controllers

Purpose of an Alarm/Output Controller


Alarm and output controllers can provide a cost-effective means of providing additional monitor points and auxiliary
outputs for multiNODE-2,M2100 and M2150 systems.
An alarm controller known as an "ACU" can be used with multiNODE-2100 nodes only and fits in the same cabinet
as the database unit.
The "ACR", "AC24/4" or "OC4/24" alarm controller connects to the database unit using an RS485 connection. The
ACR and AC24/4 have 24 monitor points and 4 auxiliary outputs. The OC4/24 output controller is available for
M2150 systems and has 4 monitor points and 24 auxiliary outputs.
In cases where you are considering using a door controller only to increase the available number of monitor points
and/or auxiliary outputs, it is likely that adding an alarm or output controller instead will be more cost effective.

Configurations
Alarm and output controllers can be used in the following configurations:
 In multiNODE-2 systems, a single ACR can be connected to a 2-reader node (MDU-2) that either
has no DCUs or only one 2-reader DCU (the ACR occupies the address space of 4 readers, and
therefore it is not possible to connect two ACRs to an MDU-2):

 In multiNODE-2 systems, a single ACR can be connected to a 4-reader node (MDU-4) that uses no
DCUs:

 In multiNODE-2100 systems, one ACU and an optional 4DCU, or two ACUs, can be fitted inside the
same cabinet with a DBU:

360
Symmetry Software Reference Manual

 In multiNODE-2100 systems, one or more alarm controllers can connect remotely to a multiNODE-
2100 DBU (refer to the M2100 Engineering Guide).
 In multiNODE-2150 systems, one or more alarm/output controllers can connect remotely to a
multiNODE-2150 database unit (refer to the M2150 Design Guide).

About Card Commands

Introduction
IfCommand Card Holder is selected in the "Home/Identity/Card Holders" screen, the card holder is recognized as
a command-card holder and is able to perform special operations at keypad readers (Series 6xx or later) that have
been defined as Card Command readers in the "Install/Access Control/Reader" screen.
The type of operation that can be performed depends on how the Command Mode option has been set up for the
reader in the "Install/Access Control/Reader" screen:
 If set to Card Commands, command-card holders are able to generate "Card Command"
alarm/event messages by pressing the star or tick key, entering a number in the range 1 to 99,
then making the access-control transaction (access rights permitting). The sequence *9, for
example, generates the Card Command 9 alarm/event without opening the door. The alarm/event
can be made use of by trigger commands, for example to arm or disarm an intruder alarm.
Some readers have an LED (light-emitting diode) marked with a switch symbol. This is intended to indicate
the current status of an intruder alarm or other device that has been switched on/off by a card command.
 If set to User Initiated PIN, command-card holders are able to change their PIN at the reader. The
new PIN must be the same length as the existing PIN. For a keycard, Symmetry disables keycard
functionality if the new PIN is invalid as a keycard PIN (e.g. 1111).
 If set to User Initiated Door Time, command-card holders are able to override the reader's
associated door open time while performing an access-control transaction at the reader. The
override applies only for the current transaction; the door reverts to the default door open time (as
defined in the "Maintenance/Access Control/Door Timing" screen) for the next normal access-
control transaction at the reader.

Note: Only readers connected to a node with the Node Supports User Initiated Door Times / PIN Changes
option set in the "Install/Access Control/Node" screen can be set up with User Initiated PIN or User Initiated
Door Time. Node Supports User Initiated Door Times / PIN Changes requires the node to be installed with
the appropriate firmware.

Card command mode can be enabled or disabled for a reader by using the Card Command Mode On and Card
Command Mode Off commands (such as from the "Home/Monitoring/Command Center" screen).

361
About the Directory/LDAP Authentication Module

Card commands cannot be executed at readers that are in Customer Code Only mode, or readers connected to
elevator nodes or Micronodes.

Checklist for Setting Up Card Commands


To set up card commands:
1. Select/deselect Node Supports User Initiated Door Times / PIN Changes in the "Install/Access
Control/Node" screen.
2. For each reader, select Card Commands, User Initiated PIN or User Initiated Door Time in the
Command Mode menu of the "Install/Access Control/Reader" screen.
3. Ensure that all card holders who need to be able to change their PIN or door open time have the
Command Card Holder option set in the "Home/Identity/Card Holders" screen.
4. Ensure that each reader is in Card Command On mode. This can be determined and set from the
"Home/Monitoring/Command Center" screen.

Changing a PIN at a Reader


A command card holder can change their PIN at a reader by using the following procedure:
1. Press the star (*) key at the reader.
2. Perform the access-control transaction.
3. Enter the current PIN when the PIN LED flashes. The green LED (access granted) LED is lit momentarily.
4. Enter the new PIN when the PIN LED flashes again. The reader beeps a few times and the green LED
(access granted) LED is lit for a short period.
The process does not open the door. The reader does not need to be in Card + PIN mode.

Changing a Door Open Time at a Reader


A command card holder can override the default door open time at a reader by using the following procedure:
1. Press the star (*) key at the reader.
2. Use the keypad to specify the number of minutes that the door is allowed to remain open before the pre-
held sounder operates (range 1 to 99 minutes).
3. Perform the access-control transaction.
4. Open the door.
A reader's default door open time is specified in the "Maintenance/Access Control/Door Timing" screen.

About the Directory/LDAP Authentication Module


The "Directory/LDAP Authentication Module" allows you to log on to the Symmetry software by entering a domain
username and password into the Symmetry Logon screen. To achieve this, the Symmetry Software first
authenticates the username and password with a supported directory server, such as an Active Directory server. If
authentication passes, the Directory Settings screen is used to check whether a Symmetry role is linked to one of
the user's directory groups. If there is a single linked role, a Symmetry user account is created automatically with
the privileges of that role, and the user is logged on. If the user belongs to two or more groups that link to different
roles, or a linked role is not found, an error message is displayed and the logon process finishes.
If set, the Auto logon using Directory Single Sign On option in the Directory Link screen enables the system to
attempt an automatic logon using the username of the person currently logged into Windows. If the username is
authenticated successfully by the directory server, a Symmetry user is created and logged on using the same
procedure as described above. If authentication fails, the directory server is unavailable or Auto logon using
Directory Single Sign On is not selected, the Logon screen is displayed for the user to enter the logon credentials
manually.
Note: A directory user name entered in the Logon screen must be in the format <domain>\<user name>. For
example, technology\alanc. Alternatively, enter a fully-qualified domain name, such [email protected].

362
Symmetry Software Reference Manual

The Directory Link screen also contains the Allow Local Symmetry User Authentication option. When the option
is set, it allows the Logon screen to be used to log on using the username and password of a user defined locally in
the Symmetry software.

Set up the Module


To set up the "Directory/LDAP Authentication Module":
1. Use the Directory Link screen to:
 Specify details of the directory server and authentication.
 Set Auto logon using Directory Single Sign On and Allow Local Symmetry User
Authentication to the required values.
2. Use the Directory Settings screen to:
 Link directory groups to Symmetry roles.
 Specify the default settings to use for any new Symmetry user account created automatically
by the module. Once the account has been created, you can use the Accounts screen to
change settings such as the language and Home screen.

About Maintenance Zones

What is a Maintenance Zone?


A maintenance zone is a group of one or more Symmetry nodes. You can set a maintenance zone to "active" to
indicate that maintenance work is being undertaken on the nodes and to prevent alarms originating from the nodes
from being displayed by default in the "Home/Monitoring/Alarms" screen.
You can create maintenance zones and set them to "active" using the "Maintenance/Maintenance
Zones/Maintenance Zones" screen. You can define more than one maintenance zone, but a node can belong to
only one.

What happens when a Maintenance Zone is Active?


When a maintenance zone is active, any alarms or events originating from nodes in the maintenance zone:
 Do not appear in the "All Alarms" tab of the "Home/Monitoring/Alarms" screen. Alarms such as "Door
Forced", "Monitor Point in Alarm" and "Wrong PIN" generated by readers or other devices
connected to one of the nodes will not be displayed in the "All Alarms" tab while maintenance work
is being carried out. The alarms can be displayed only by using filters (see below). Note that
maintenance zone alarms do not affect alarm counts and other alarm indicators (therefore an
alarm from a maintenance zone will not increase the alarm count).
 Are not, by default, included in the "Home/Monitoring/Activity" screen. The alarms and events can be
displayed by using filters (see below).
 Are not, by default, included in activity reports ("Reports/History/Activity" screen). You can display
historical maintenance zone alarms/events using the Maintenance Zone menu in the
"Reports/History/Activity" screen.
 Continue to trigger commands. Trigger commands will operate irrespective of whether or not nodes
are in any active maintenance zone.

Note: "Maintenance Mode" (which can be set in the "Install/Access Control/Node" screen for an M2150
intrusion node) causes alarms from an intrusion node to be sent as events. If an intrusion node is in
Maintenance Mode and is also in an active maintenance zone, Symmetry receives only events from the node
and processes them as described above.

363
About the Service Monitor

Using Filters to Display Alarms and Events from Maintenance Zones


Note: Maintenance zone filters are available only if you have at least "view" permission to the
"Maintenance/Maintenance Zones/Maintenance Zones" screen in your user role ("Maintenance/User &
Preferences/Roles" screen).

The following describes how to use filters to view alarms and/or activity from nodes in an active maintenance zone.
To view maintenance zone alarms in the "Home/Monitoring/Alarms" screen:
1. Click Select Filters.
2. Select the auto-generated filter that has the same name as the maintenance zone.
3. Move the filter to the Filters Shown box.
To view maintenance zone alarms and events in the "Home/Monitoring/Activity" screen:
1. From the Filter menu, select the auto-generated filter that has the same name as the maintenance zone.
Creating a Custom Filter for Maintenance Zones
You can define custom filters in the "Home/Monitoring/Alarms" to include maintenance zone(s). This allows you to,
for example, create a single filter that includes all maintenance zones, or a filter that includes maintenance zones
and other types of alarm.
To create a filter that includes a maintenance zone:
1. Click Filters in the "Home/Monitoring/Alarms" screen.
2. Click New, then:
a) Enter a filter name.
b) For Column Name, choose Where.
c) For Operator, choose Equal to.
d) For Value Type, choose Maintenance Zone.
e) In the Value field, select the maintenance zone.
f) Click Apply Rule.
g) Continue to define the filter (for example, repeat steps b) to e) for the second maintenance zone and
click Add AND.
3. Click OK, then Close.
4. Click Select Filters in the "Home/Monitoring/Alarms" screen.
5. Select the new filter.
6. Move the filter to the Filters Shown box and click OK.

About the Service Monitor


Symmetry uses several "services", including the following:
 Symmetry Client Service: The communications service, which runs on the server and each client.
 Symmetry Support Service: Responsible for initiating card and node synchronization, data import
and export, and inter-client communications.
 Symmetry Transaction Service (server only): Service for management and transaction
processing.
 Symmetry Integration Server (server only): Provides a common interface for transferring
transactions from digital video and intrusion devices into Symmetry
 Symmetry State Service: Maintains the status of doors for the "Home/Identity/Verification" screen.
 Symmetry Global Communication Service: Used at the head office of a Symmetry Global Edition
system. It is used to communicate with regions.
 Symmetry Http Server: Receives HTTP messages from devices and passes them to the
appropriate handler (either the Symmetry Transaction Parser or a specific plug-in).

364
Symmetry Software Reference Manual

 Symmetry Synchronization Service: Used at regions of a Symmetry Global Edition system. It is


used to communicate with the head office.
 Symmetry Transaction Parser Service (server only): Processes event messages from digital
video devices into transactions to be passed to the Symmetry Integration Server.
 SQL Server (server only): SQL services for database management and communication.
The services that run on the server are essential for system operation and must be running continuously.
It is possible to check that the services are running by using the Security Management Service Monitor (if installed).
The Service Monitor can be started by double-clicking the icon in the System Tray (normally in the bottom-right
corner of the display):

Note: The Service Monitor can be disabled by the installer (as described in the Software Installation Manual).

The green indicator in the top-left corner of the icon flashes red if any of the services used by Symmetry have
stopped.
Double-clicking the icon displays the following dialog, which shows the current status of the services:

The fields and options in the dialog have the following meanings:
 Network Name - The name of the PC on which the services are running.
 Polling Interval - This determines how often the Service Monitor refreshes the dialog (to reflect the
current status of the services).
 Stop - Stops the selected service.
 Start - Re-starts the selected service.
 Refresh - Refreshes the dialog straight away.
 Show All Services - When selected, all Windows services are listed. When unselected, only those
services relevant to Symmetry are listed.
 Close - Closes the dialog. This does not stop the services, and you will still be able display the
dialog again by double-clicking the icon in the System Tray.

365
About the Symmetry NVR

About the Symmetry NVR

Introduction
The Symmetry Network Video Recorder (NVR) is PC-based software that is able to record and store video in any
accessible folder (repository) on the network. The NVR records video from all digital video cameras that are
assigned to it. Typically, the repositories use separate network-attached storage, but it is allowable to use any local
or network-accessible disk.
The Symmetry NVR also stores sound provided with H.264 video streams, if supported by the camera and
Symmetry camera plug-in. The sound can be replayed in the Symmetry "Home/Video & Audio/Video Playback"
screen.
The following illustration shows one possible example of a Symmetry architecture that includes an NVR.

There can be multiple NVRs in the same system. Each requires a separate PC, which can be a Symmetry server,
client or any other suitable PC on the network. An NVR can be shared by more than one Symmetry company.
Video stored by an NVR can be replayed using the "Home/Video & Audio/Video Playback" screen.
Each NVR stores the details of the cameras that are assigned to it. Any changes in the Symmetry software are
automatically downloaded to the NVR.
The NVR is able to mark recordings as tagged, bookmarked, user and standard.

Tasks Carried Out by an NVR


Each NVR:
 Manages the storage of recordings for all cameras that are assigned to it.
 Determines the recording mode. An NVR can be set up to record on demand (as a result of user
actions in the Symmetry software or according to a specified schedule), continuously or never. The
default mode is "on demand".
 Retrieves video for playback. For example, for the "Home/Video & Audio/Video Playback" screen.
 Provides a web interface that allows you to configure and monitor the NVR (see below for further
details).
 Purges old video automatically, based on purging rules defined in the web interface.
 Communicates alarms and events to the Symmetry software.

Defining NVRs in the Symmetry Software


You can define NVRs in the Symmetry software using the "Install/Video & Audio/Digital Video-NVR" screen.
The screen also provides access to the NVR web interface.

366
Symmetry Software Reference Manual

Assigning Cameras in the Symmetry Software


You can assign cameras to NVRs using the "Install/Video & Audio/NVR Cameras Assignment" screen. The screen
allows the same camera to be assigned to more than one NVR, which enables a recording to be saved to different
locations.
By default, up to 128 cameras can be assigned to a single NVR, but this can be changed using the
NVRCameraLimit setting in multimax.ini.
Using the camera definition screen in the Symmetry software, it is possible to create the same camera more than
once. You can do this by creating two separate camera definitions, each using the same camera IP address, which
allows different streams from the same camera to be recorded simultaneously. You may want to do this to record
the same image at, for example, different resolutions.

About the Web Interface


You can use the web interface to perform various management tasks, including to:
 Specify the recording mode (never, on demand or always).
 View the current recording status.
 Add repositories (storage folders).
 View or specify recording schedules (such as every night).
 Specify video purge rules.
 Specify the NVR events to send to the Symmetry software.
 Manage NVR user accounts.
For further details of how to use the web interface, please open the separate help system from the web interface.

Alarm Reporting in Symmetry


The following alarm/event messages can be generated by an NVR and are configurable as alarms/events/ignore in
the "Operation/Alarms/Reporting" screen (Alarm Type of Digital Video Server or Digital Video Camera):
An NVR Device Plugin Failed To Load
NVR Device URL Missing
Recording Failed
Recording Restored
Recording Stopped, Insufficient Space
Video Purged Early, Check NVR Config
Note: Each camera has a separate Enable Offline Monitoring setting. When selected, any NVR that the camera
is assigned to will monitor the online/offline status of the camera and report a camera online/offline alarm as
appropriate. The NVR does not need to be set up to record any video from a camera to monitor its online/offline
status.

Recording Video
It is possible to record video to a Symmetry NVR using any of the following in the Symmetry software:
"Home/Monitoring/Command Centre"
"Home/Monitoring/Graphics"
"Home/Video & Audio/Virtual Matrix"
"Operation/Commands/Scheduled"
"Operation/Commands/Trigger"
"Operation/Commands/Predefined"
"Setup/Configuration/Threat Levels" (commands)
"Operation/Alarms/Commands"

367
Acknowledge Alarm Screen ("Home/Monitoring/Alarms")

Acknowledge Alarm Screen ("Home/Monitoring/Alarms")

General
Overview of this screen
Use the Acknowledge Alarm screen to:
 Find out the instructions you should follow when an alarm is generated.
 Add comments to record the actions you take.
 Acknowledge a new (default RED) alarm.
 Clear a previously-acknowledged (default GREEN) alarm. Depending on settings, an alarm that is
acknowledged but has not yet been reset (default BLUE) can clear automatically - see "Clear"
below.
The screen is displayed if you have:
1. Opened an alarm in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen.
2. Highlighted an alarm in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix" screen,
viewed an associated graphic in the Graphic screen, then selected the Acknowledge option in the
Graphic screen.
The system ensures that only one user can acknowledge or clear an alarm if it is displayed at more than one
client PC in the same Symmetry system at the same time - the system grays out the relevant options in the
Acknowledge Alarm screen if the alarm is currently being acknowledged or cleared at another client.
What do the alarm messages mean ("WHAT" column)?
See Alarm/Event Messages for details of each message.

Panels
Alarm Details
The Alarm Details panel displays details of the alarm and, if applicable, the image of the card holder or visitor
who caused the alarm. Refer to the help for the "Home/Monitoring/Alarms" screen for further information about
the alarm details.
This panel can be hidden by reducing the size of the screen.
Alarm Instructions
The Alarm Instructions panel displays the instructions you should follow when the alarm is generated. These
are defined in the "Operation/Alarms/Definitions" screen.
If the instructions include several different instructions, you can use the controls at the top and bottom of the
scroll bar to move between the previous/next alarm instruction. A splitter in the window separates each
instruction.
You can use the button to display the instructions in a separate window. This window provides a Zoom
option. The window retains its size, location and zoom state when you close it, so that it appears the same if
you open it again.
You can use the right-click menu to copy information into the clipboard.
Comments
The Comments box enables you to add a comment while acknowledging the alarm:
 Click Select Standard Comment to add a predefined comment (as configured in the
"Operation/Alarms/Comments" screen) at the cursor position. You can use the button

368
Symmetry Software Reference Manual

several times to add more than one comment. Alternatively, type comments directly into the
Comments box.
 It is mandatory to select or enter a comment before you can acknowledge or clear an alarm
if Alarm Comments Mandatory is selected in the "Maintenance/User & Preferences/Client
Preferences" screen.
 The system makes available comments belonging to the company that owns the device that
is in alarm, or if the alarm is not related to a company, all comments belonging to all
companies.
 You can use the right-click menu to cut, copy and paste text.
Previous Comments
The Previous Comments panel displays any previous comments you may have entered for the alarm.
Each comment is preceded by the name of the user who entered the comment, and the date and time the
comment was added.
You may see the following comment:
Client: failed to acknowledge alarm within <X> minutes
Alarm Escalated to Client: <PC Name><Time and Date>
This indicates that the alarm was not acknowledged within a specified period of time, and therefore was
redirected to the named client PC (<PC Name>). This feature is set up in the "Operation/Alarms/Routing"
screen.
You can use the button to display the comments in a separate window. This window provides a Zoom
option. The window retains its size, location and zoom state when you close it, so that it appears the same
if you open it again.
Command button
Clicking the Command button causes the system to execute the command associated with the selected alarm
(as set up in the Alarm Commands screen).
The command may, for example, cause the CCTV camera image at the alarm location to be displayed on a
CCTV monitor.
The Command button is grayed if the alarm has no command set up in the Alarm Commands screen. The
button is also grayed out if the alarm is a dial-in alarm.
Card button
This button is enabled if the selected alarm/event was caused by a person whose card is known to the system.
Click the button to display the card details in the "Home/Identity/Visitors" or "Home/Identity/Card Holders"
screen.
Replay button
This button is enabled if the selected alarm/event has a tagged video clip created using a Record Video
command. Click the button to replay the clip.
Graphic button
This button displays the highlighted alarm on a graphic. Normally, the graphic is a plan of the building, and can
be used to quickly identify the location of the alarm

Screen Buttons
Clear
Clears the alarm. Any new comments you have added are saved. Unless you have System Admin privileges
(as specified in the "Maintenance/User & Preferences/Roles" screen), you cannot clear an alarm that needs to
be reset first, such as an alarm from a monitor point.

369
Acknowledge Multiple Alarms Screen ("Home/Monitoring/Alarms")

If Auto Clear Alarm on Reset is selected in the "Maintenance/User & Preferences/System Preferences"
screen, an alarm that requires a reset can clear automatically after you have attempted to clear it manually.
For further information, please refer to "Auto Clear Alarm on Reset".
You cannot clear alarms that belong to an alarm type categorized as "Acknowledge Only" in the Alarm
Processing screen.
Mask
This button is available if the Allow Alarm Masking privilege is set in your user role ("Maintenance/User &
Preferences/Roles" screen) and you are acknowledging an unmasked alarm.
You can use the button to mask the selected alarm (without acknowledging it).
Please refer to Masking Alarms for further information.
Clear Mask
This button is available if you are acknowledging a masked alarm from the Masked Alarms tab.
You can use the button to clear the mask from the selected alarm (without acknowledging it).
Please refer to Masking Alarms for further information.
Connect/Disconnect
This button is enabled if a Call Request alarm has been generated from an intercom connected to a Stentofon
Alphacom Intercom System. You can use Connect to make an audio link between your intercom and the
intercom making the call request.
When you select Connect, the button changes to Disconnect, which allows you to disconnect the link. The link
is automatically disconnected when you close the Acknowledge Alarm screen.
The button is grayed out if the alarm is already being viewed in the Acknowledge Alarm screen at another
client.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.
Print
Prints details of the alarm to the default printer.
OK
Returns you to the previous screen, saves any new comments and acknowledges the alarm (if it is not already
acknowledged).
Cancel
This takes you out of the screen without performing any action.

Acknowledge Multiple Alarms Screen ("Home/Monitoring/Alarms")

General
Overview of this screen
The Acknowledge Multiple Alarms screen is displayed if you have highlighted more than one alarm, then
selected Open. You can highlight more then one alarm if Enable Multiple Alarm Selection is selected in the
"Maintenance/User & Preferences/Client Preferences" screen.
You can use the screen to:
 Acknowledge alarms. Any of the alarms selected that are new (default RED) are acknowledged
when you click OK.
 Clear a previously-acknowledged (default GREEN) alarm. Depending on settings, an alarm that is
acknowledged but has not yet been reset (default BLUE) can clear automatically - see "Clear"
below.

370
Symmetry Software Reference Manual

 Add comments to record the actions you take (for example, "Guard sent to investigate"). Comments
can be shown in history reports, which may need to be produced at a later stage.

Note: It is mandatory to select or enter a comment before selecting OK or Clear if Alarm Comments
Mandatory is selected in the "Maintenance/User & Preferences/Client Preferences" screen.

About the Options


Available Comments
Lists all comments defined in the "Operation/Alarms/Comments" screen belonging to the currently selected
company.
To add one of the listed comments, select the comment, then click Select. The comment is added to the New
Comments box at the cursor position. You can also type comments directly into the New Comments box.
Select
Adds the currently highlighted comment to the New Comments box. You can use the button several times to
add more than one pre-defined comment.
New Comments
Shows the comments you have selected, or have typed into the box.
Clear
Clears the selected alarms. Any new comments you have added are saved. Unless you have System Admin
privileges (as specified in the "Maintenance/User & Preferences/Roles" screen), you cannot clear an alarm that
needs to be reset first, such as an alarm from a monitor point.
If Auto Clear Alarm on Reset is selected in the "Maintenance/User & Preferences/System Preferences"
screen, an alarm that requires a reset can clear automatically after you have attempted to clear it manually.
For further information, please refer to "Auto Clear Alarm on Reset".
You cannot clear alarms that belong to an alarm type categorized as "Acknowledge Only" in the Alarm
Processing screen.
OK
Returns you to the previous screen, acknowledging any of the alarms that are not yet acknowledged. The
entered comments are saved for each alarm acknowledged.
Close
Takes you out of the screen without acknowledging or clearing the alarms, or saving new comments.

Activity History Screen ("Home/Monitoring/Activity")

General
Overview of this screen
This screen displays on a by-day basis, all alarms and events stored in the log.
By default, the screen displays alarms and events generated by a device or person associated with any
company in your company group. However, if Filter by Company in the "Maintenance/User &
Preferences/Client Preferences" screen is selected, only those alarms and events that belong to the currently-
selected company are displayed. In both cases, information that is not specific to a particular company is also
displayed.
By default, the screen shows the most recent record at the top of the screen. Items are displayed in reverse
order if the ActivityAndSystemReverseOrder ini file setting is set to "1".
You may see the following icon in the left-hand column:

371
Activity History Screen ("Home/Monitoring/Activity")

This indicates that the alarm has a tagged video clip created using a Record Video command. You can replay
the clip by clicking the Replay button.
Right-click menu
You can use the right-click Data option to choose the columns to display, and the Configure option to change
the column order.
What do the messages mean?
Adding comments to an alarm\event
Double-clicking an alarm\event message displays the Add Comment screen, which allows you to record
comments against the transaction.

About the Options


Display Card Holder Image
Selecting this option enables you to display the image of a card holder or visitor who made a card transaction.
Clicking the transaction displays the person's image (as defined in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen) at the top of the list of images on the left side of the screen.
By default, the screen displays up to 5 images. This can be increased using the No of Card Holder Activity
Images option in the "Maintenance/User & Preferences/System Preferences" screen.
Selecting an image automatically highlights all associated card transactions.
Date Selector
The pull-down menu at the top-right of the screen enables you to display the alarms and events for a specific
date.
Activity type
You can use the Activity type menu to choose the types of alarms and events to display.
Filter
You can use this menu to select one of the filters defined using the Filters button at the bottom of the screen.
Region
This is available only at the head office of a Symmetry Global Edition system. You can choose whether to
display all activity, or only activity from selected sources, such as from all regions or a selected region.
For further information about Global Edition, please refer to the Global Edition Installation and User Guide.
Oldest
Displays the alarms and events for the oldest date in the log. The number of days stored in the log is
determined by Purge Daily Logs After in the "Maintenance/User & Preferences/System Preferences" screen.
Previous
Displays the alarms and events for the previous date (up to the oldest date). For example, if the date currently
being viewed is 6th December, Previous causes the alarms and events for 5th December to be displayed.
Next
Displays the alarms and events for the next date (up to today's date).
Today
Displays the alarms and events for today's date.
Replay
This button is enabled if the selected alarm/event has a tagged video clip created using a Record Video
command. Click the button to replay the clip.

372
Symmetry Software Reference Manual

Filters
Selecting the button displays the Activity Filters screen, which you can use to define activity filters for the
Alarms, Activity and Virtual Matrix screens.
You can apply one of the filters to the Activity History screen using the Filter menu near the top-right corner of
the screen.
Cancel
This button is displayed when the system is searching the database. Select Cancel if you wish to cancel the
search.
Close

Add Comment Screen


You can use this screen to add comments to the selected transaction.
The screen is displayed by double-clicking an alarm\event transaction in the "Home\Monitoring\Activity" or
"Home\Identity\Verification" screen.
The screen contains the following areas:
 Standard Comments - This lists any predefined comments that have been set up in the
"Operation\Alarms\Comments" screen. To add one of these comments, select it from the list and
click the green arrow icon. The comment is inserted at the cursor position. You can reduce the
number of comments listed by typing into the filter box located immediately below the Standard
Comments header (for example, typing "A" lists all comments that start with the letter "A").
 Comments - This lists any comments you have added from Standard Comments. You can also
type any comment you wish directly into this area. You can use the right-click menu to cut, copy
and paste text.
 Previous Comments - This lists all comments you have previously saved for the transaction.

Adding and Editing Card Details


Adding Card Details
You can add the details of a new person by selecting New in the Selection screen. The new person will be
associated only with the currently selected company.
Selecting Multiple Cards in the "Maintenance/User & Preferences/System Preferences" screen allows you to
define up to ten cards per card holder in the "Home/Identity/Card Holders" screen. Each card can have a
different card number. One of the cards can be a "temporary card". For further information, please refer to
Using Multiple and Temporary Cards.
Prerequisites
Before setting up the details of a new person:
 Make sure that you know the person's required access rights to the building.
 Ensure that the facility/customer codes are defined ("Facility/Customer Codes" in
"Setup/Configuration").
 If required, set up the badge designs ("Setup/Identity/Badge Designer").
 If required, set up the personal data titles and predefined personal data using the screens in the
"Setup/Identity/Personal Data" menu.
 Ensure that the appropriate access codes, reader groups, floor groups, output groups and time
codes are set up in the following screens:
 Access Codes ("Operation/Times/Access Codes")
 Reader Groups ("Setup/Device Groups/Readers")

373
Adding and Editing Card Details

 Floor/Output Groups ("Setup/Device Groups/Floors")


 Time Codes ("Operation/Times")
 Shared Readers ("Setup/Device Groups/Shared/Shared Readers")
 Shared Floors ("Setup/Device Groups/Shared/Shared Floors/Outputs")
Viewing or Editing Card Details
To view or edit an existing person's details, use the Selection screen to find that person, then double-click on
the entry (or click on the entry and select Open) to display the Definition screen.

Note: You can also access a person's details from the "Home/Monitoring/Alarms", "Home/Video & Audio/Virtual
Matrix" or "Home/Monitoring/Activity" screen by selecting an alarm/event caused by that person and selecting
the Card option.

Clicking on a column header in the Selection screen sorts the entries by the heading selected. Clicking again
sorts in the opposite direction.

Note: The Card Holders By Company option in the "Maintenance/User & Preferences/System Preferences"
screen determines whether you can view only those card holders who belong to the currently-selected
company. For further information, refer to "Card Holders by Company".
Note: If a person's details are being edited by another user, you will be given view-only access only.
Note: The "Home/Identity/Bulk Card Amendments" screen can be used to make changes to several cards in
one operation.
Note: In a Symmetry Global Edition system, card holders can be created at the head office. Any card holder
created at the head office who is given access rights to a region is automatically created at the region. Most
fields and options for card holders created at the head office are grayed out at the regions. Please see the
Global Edition Installation and User Guide for further information.

Downloading Changed Details to the Access Control Nodes


Details of the person's access rights and other information is stored in the access-control nodes located around
the building. The nodes control access through doors and/or to elevator floors based on the access rights
assigned to the card presented to the access-control reader.
When you make changes to the card details, the data is, by default, sent to the relevant nodes when you
choose Close in the Selection screen. Communications take place at this point (rather than when you save the
details in the Definition screen) to minimize communications traffic and dial-up contact calls to remote sites. If
required, an ini file setting can be added to make changes download when you select Save in the Definition
screen.

Note: Card details may not be downloaded to nodes on dial-up or LAN chains depending on the Delay Cards
to Dial-Up/LAN Chains setting in the "Maintenance/User & Preferences/System Preferences" screen.

Capturing Card Details using a Card Encoder


You can populate the card number and other card details automatically by presenting a card to a smart-card
encoder. The encoder must be connected to the PC you are using and must have been set up in the
"Install/System/Client Ports" screen.
How to Capture Card Details
To use this feature, do one of the following:
 If you want to set up card details for a new person, click New in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" Selection screen, then present the card to the encoder.
The details are automatically displayed in the Definition screen.

374
Symmetry Software Reference Manual

 If you want to overwrite an existing person's card details, open the existing record from the
Selection screen, present the card to the encoder and press the Smart Card icon next to the
card number.
Save the captured details.
Details Captured
The system reads all appropriate data from the card, including the card number and customer/facility code.
The system attempts to read the card's encoded card number. If this is not present or cannot be read, the
system reads the card serial number.
If the card contains more than one set of card details, the system reads only the first record.
Importing Card Details from a Text File or Database Table
If the [BioEnrolment] section is included in multimax.ini (as documented in the Symmetry Software Installation
Manual), card details can be imported from a text file. The process is as follows:
1. Create a new card holder or visitor, or open an existing record.
2. Make sure that the text file contains the card details to import.
3. With the card holder or visitor record still open, save the text file. The card details from the file are
automatically imported. Symmetry deletes the file.
4. If necessary, make additional changes to the card details or settings.
5. Save the card details.
The required format of the file and other information is provided in the Symmetry Software Installation Manual.
Card details can also be imported from a CardTransfer table in the Symmetry database. For further information
about this method, please refer to your product support representative.

Note: The methods described above are not the same as standard Symmetry card imports as described in the
Data Connect Manual.

Alarm/Event Messages
Note: the installer is able to alter the alarm/event text displayed. Not all of the messages are selectable/viewable in
all screens.

Messages A-D
Messages E-M
Messages N-Z

Alarm/Event Messages A-D


Access Denied
Access Requested
AC Power Fail, AC Power Restored
Alarm: intrusion (online)
Alarm: tamper (online)
An NVR Device Plugin Failed to Load
Answered Call
Anti-Passback Hard, Anti-Passback Soft
Aperio Battery Flat

375
Alarm/Event Messages A-D

Aperio Battery Low


Aperio Battery OK
Aperio Bolt Position
Aperio Device Online
Aperio Device Offline
Aperio DIU Restarted
Aperio DIU Watchdog Reset
Aperio Door Position
Aperio Door Tamper
Aperio Handle Position
Aperio Radio Disturbance Cleared
Aperio Radio Disturbance Detected
Area Arm Time Changed
Area Armed
Area Armed Early
Area Disarmed
Area Disarmed Outside Schedule
Area Failed to Arm
Area In Alarm
Area Late to Arm
Area Late to Disarm
Area Reset
Arrived Too Early At Point
At Wrong Door
At Wrong Time
Audio Activity Alarm
Audio Activity Normal
Call Forwarded
Call Missed
Call on Hold
Call Request
Call Taken
Camera Restarted
Card Command 1 to 99
Card Data Request
Card Expired
Card Holder on Vacation
Cardholder Deactivated-Secondary Expiry
Card Suspended
Cardwatch
Client/Server Offline
Client/Server Online
Command Rejected - Node Locked Out
Communications Failure to SALTO Server
Configuration Changed
Configuration Error
Connected
Connecting
Connect Failed-Busy
Connect Request
Connect Successful
Controller Comms Failed
Controller Comms Restored
Create HI SEC Triggers
Deleted for PIN
Dial-In Alarm Received

376
Symmetry Software Reference Manual

Digital Input Alarm


Digital Input Normal
Disconnected
Door Alarm Reset
Door Closed
Door closed: <message text>
Door Forced
Door Held Open
Door Insecure
Door left opened (DLO)
Door Monitor Circuit Open
Door Monitor Circuit Shorted
Door most probably opened: key and PIN
Door Not Opened
Door Open
Door opened: <message text>
Door Pre-Held Timer Expires
Door Pre-Held Timer Start
Door programmed with spare key
Door Set To <nn> mins <card number>
(DSR) <message>
Duress

Alarm/Event Messages E-M


End of DLO (door left opened)
End of forced closing (online)
End of office mode
End of office mode (online)
End of privacy
Entry Timer Started
Entry Timer Stopped
Escort
Exit Button: Circuit Normal, Circuit Open, Circuit Shorted, In Alarm, Normal
Exit Timer Started
Exit Timer Stopped
Failed Connection
Floor Access
General Alarm
Granted Access
Granted Access (Extended Door Time)
Group Call
Hard Disk Full Warning
Host Access Request for Card
Host Clock Advanced (system alarm)
Host Clock Retarded (system alarm)
Hotel guest cancelled
Inactive
Infrared Alarm
Infrared Normal
Input Closed
Input Opened
Intercom Call
Intrusion Operation Warning
Intrusion Panel Restored

377
Alarm/Event Messages N-Z

Intrusion Panel Timed Out


IP Address Change
IP Camera Offline
IP Camera Online
Issue Level Exceeded
Key deleted (online)
Key has not been comp updated (online)
Key inserted (energy saving device)
Key removed (energy saving device)
Key updated (online)
Keycard Set IN, Keycard Set OUT
LAN Answered Call
LAN Connected
LAN Connecting
LAN Disconnected
LAN Error
LAN Failed Connection
LAN Retry
Least Used Card Deleted
License Registration Warning
Lock Monitor Open, Lock Monitor Secure
Lost Card
Low battery level
New renovation code
not allowed: <message text>
(M4000) <message text>
Maintenance Zone Activated
Maintenance Zone Deactivated
Modem Error
Monitor Point Activated
Monitor Point Changed
Monitor Point Deactivated
Monitor Point: Circuit Open, Circuit Shorted, In Alarm, Normal, Tamper Alarm, Tamper Normal
Motion Alarm
Motion Detection
Motion Normal

Alarm/Event Messages N-Z


Network Address Error
Network Loss
Network Restored
New hotel guest key
No Alarms
Node Back in Service
Node Buffer >75% Full
Node Buffer Overflow
Node Clock Advanced (node alarm)
Node Clock Retarded (node alarm)
Node Firmware Error
Node Firmware Version Changed
Node Hardware Error
Node Maintenance
Node Powered Down
Node Restored On Primary

378
Symmetry Software Reference Manual

Node Restored On Secondary


Node Tamper
Node Tamper Normal
Node Time Codes are 75% Full
Node Time Codes Full
Node Timed Out
Node Timed Out On Primary
Node Timed Out On Secondary
Not Yet Valid
NVR Device URL Missing
Offline
Online peripheral updated
Output On/Off/Pulse
Out of Sequence Now at Point
Overdue at Point
Password Changed
Patrol Tour Complete
Patrol Tour Held
Patrol Tour Reset
Patrol Tour Restarted
Patrol Tour Started
Playing Broadcast Message
PPD connection
Pre-arm Timer Started
Pre-arm Timer Stopped
PTZ Command
PTZ Preset Activated
PTZ Started
PTZ Stoped
Reader Tamper, Reader Tamper Normal
Recording Failed
Recording Restored
Recording Stopped, Insufficient Space
Region Offline/Online
Request Card File
Request Daylight Savings
Request Dial-Up File
Request Doors File
Request Holiday File
Request If/Then File
Request Logical Functions
Request Misc Files
Request Monitor Point File
Request Reader File
Request Scheduled Commands
Request Time Code File
Retry n
Room prepared (energy saving device)
Scheduled Operation
Script Alarm
Script Error
Script Event
Script Upload
Search Required
Serial Port Command
Server Offline

379
Alarm/Event Messages N-Z

Server Online
Server Restarted
SNTP Clock Adjusted
Start of forced closing (online)
Start of office mode
Start of office mode (online)
Start of privacy
Startup Transaction
Station Busy
Station Cleared
Station Fault
Station Free
Storage Media Check Failed
Storage Media Check OK with Errors
Storage Media Corrupted
Storage Media Hardware Failure
Storage Media Hardware Lifetime Warning
Storage Media Not Present
Storage Media Quota Reached
Successful Clock At Point
System Alarm
Task: <name>
Time modified (daylight saving time)
Too Many Login Failures
Transaction Log Running at Capacity
Trigger Operation
Unknown Card
Unknown Fingerprint
User Access Denied
User Access Granted
User Added
User Alarm
User Alarm Activated
User Alarm Deactivated
User Code Lockout
User Deleted
User Edited
User PIN Changed
Valid Card Transaction
VCA
Video Connected
Video Disconnected
Video Loss Detected
Video Lost
Video Picture Loss
Video Picture Restored
Video Purged Early, Check NVR Config
Video Reconnected
Video Server Restarted, Unexpected Error
Video Signal Loss
Video Signal Restored
Visitor Card Holder Deactivated
Warning Overwriting Standard Recordings
Warning Overwriting Tagged Recordings
Warning: Simulated Transactions Active
Wrong Hand Template

380
Symmetry Software Reference Manual

Wrong Issue Number


Wrong PIN
Zone Bypassed
Zone Circuit Open
Zone Circuit Shorted
Zone Disabled
Zone Enabled
Zone In Alarm
Zone In Fault
Zone In Tamper
Zone Normal
Zone Point Closed
Zone Point Open
Zone Reset
Zone Tamper Normal

Alarm Processing Screen ("Maintenance/User &


Preferences/Roles")
This screen is displayed by clicking Alarm Processing in the Maintenance/User & Preferences/Roles screen.
The screen displays only those alarm types that have Alarm Type in the "Operation/Alarms/Reporting" screen set
to a value other than the default of General Alarm.
The screen allows you to categorize alarm types defined in the "Operation/Alarms/Reporting" screen as
"Acknowledge and Clear" or "Acknowledge Only" for the role. By default, all alarm types are "Acknowledge and
Clear" for every role.
Alarms that belong to alarm types categorized as "Acknowledge Only" can be acknowledged but not cleared by
users who have the role.
Alarms that belong to alarm types categorized as "Acknowledge and Clear" can be acknowledged and cleared.
You can use Add >> and Remove >> to move selected alarm types into either category.

Note: A Clear button is displayed in the "Home/Monitoring/Alarms" screen if you have System Admin privileges
(as specified in the "Maintenance/User & Preferences/Roles" screen) or have permission to clear all alarms (as
specified in the "Maintenance/User & Preferences/Accounts" screen). This button is not affected by the settings
in this screen; the button can still be used to clear all alarms, even if some have an alarm type categorized as
"Acknowledge Only".

Appearance of the Alarms Screen ("Home/Monitoring/Alarms")


You can change the appearance of the Alarms screen using the Show Combined Alarm/Acknowledgement
Screen option in the "Maintenance/User & Preferences/Client Preferences" screen. There are two possible
appearances: default and combined alarm/acknowledgement, as described next.

Default Appearance
If Show Combined Alarm/Acknowledgement Screen is not selected, the Alarms screen shows an alarms list
and, optionally, a graphical area that contains alarm statistics:

381
Appearance of the Alarms Screen ("Home/Monitoring/Alarms")

The default appearance has the following features:


 You can acknowledge an alarm, view alarm instructions, enter new comments and review previous
comments by double-clicking the alarm. A separate screen is displayed.
 You are able to select more than one alarm, providing Enable Multiple Alarm Selection is selected
in the "Maintenance/User & Preferences/Client Preferences" screen. You can use this feature to
perform actions such as to acknowledge or mask multiple alarms at the same time. Use Shift-click
or Ctrl-click to select the alarms, then click the required option, such as Open to acknowledge the
alarms.
 The screen is able to display graphical alarm statistics. The statistics are displayed if both Enable
Alarm Statistics is displayed in the "Maintenance/User & Preferences/System Preferences"
screen, and Display Alarm Statistics is selected in the "Maintenance/User & Preferences/Client
Preferences" screen.

Combined Alarm/Acknowledgement Appearance


If Show Combined Alarm/Acknowledgement Screen is selected, the Alarms screen displays an Acknowledge
button and for all but task alarms, areas for alarm instructions and comments:

The combined alarm/acknowledgement appearance has the following features:

382
Symmetry Software Reference Manual

 Alarms are easier to acknowledge. Selecting an alarm and clicking the Acknowledge button
acknowledges the alarm.
 Alarm instructions are easier to view. Selecting an alarm immediately displays the instructions for
that alarm.
 Comments are easier to enter and review. You can enter new comments for an alarm by selecting
the alarm and entering the new comments in the Comments box. All previously-entered
comments are displayed in the Previous Comments box.
For task alarms, the lower area of the screen presents similar information to that available from the
"Home/Monitoring/Tasks" screen:

Assign Access Rights Screen

General
This screen allows you to assign access rights, and view the current access rights already assigned. The screen is
displayed when you choose to assign access rights from the "Home/Identity/Card Holders",
"Home/Identity/Visitors", "Home/Identity/Bulk Card Amendments" or "Setup/Identity/Badge Designer" screen.
Access rights can be used, for example, to specify the readers and times that card holders are allowed to gain
access. Access rights can include any number of the following access right types:
Access Codes
Reader Groups
Readers
Floor Groups
Intrusion Areas
Intrusion Users
Global Access Codes
Disconnected Doors
Disconnected Door Groups

Note: You can set up access rights for an output group by right-clicking on the controlling reader. The reader must
be attached to a Card Relays node. The output group contains the auxiliary outputs to enable when the card holder
is granted access from the reader. Click here for further information.

383
Assign Access Rights Screen

Using the Screen


To assign access rights:
1. Select the relevant access-right type you want to add from the Select menu. The default option selected
depends on the access right type you selected in the previously-displayed screen. For example, if you
selected Readers in the "Home/Identity/Card Holders" screen, the Select menu defaults to Readers.
2. If required, use Filter by to filter the items listed (see below).
3. Use the top-left box to choose the items you want to assign to the access rights. You can control-click or
shift-click in the normal way to select multiple items. See below for an overview of the screen content.
4. If applicable, use the bottom-left box to choose the time code to use, or account details for an intrusion
user. You can select only one time code, but you can add the same reader (for example) more than once
with different time codes (in this case, Symmetry sums the access times).
5. Click >, double-click or drag and drop to the top-right box.
To remove access rights:
1. Select the access right in the top-left box. You can control-click or shift-click in the normal way to select
multiple items.
2. Click >, double-click or drag and drop to the top-left box.

Note: Access codes that are currently inactive are shown grayed out. An access code can be made inactive by
using Force Access Code Inactive or the Schedule tab in the "Operation/Times/Access Codes" screen.

Select
Use this menu to select the type of access right to add.
Filter by and Matching
You can use Filter by and the Matching field to reduce the number of items listed. For example, if you select
Location from Filter by, and enter "North" in the Matching field, only items whose location includes "North" are
listed.
After entering text in the Matching field, press Enter or click to action the filter.
Leaving the Matching field empty means "match all". So, if you select Location from the Filter by menu and
leave Matching empty, this will cause all items to be listed that have a location specified.
The following Filter by options are provided (depending on the option selected from the Select menu):
 Description - The name of the items, as listed in the top-left box. For example, if you have selected
Reader Groups from the Select menu, Description refers to the name of the reader groups.
 Location - The location of the device, as specified by the Location field in the device (e.g. reader)
definition. For an item such as a reader group that can not have a location defined, the top-left box
will list all (e.g. reader groups) that include an item (e.g. reader) whose location includes the
Matching text.
 Category - The category of the device, as specified by the Category field in the device (e.g. reader)
definition. For an item such as a reader group that can not have a category defined, the top-left
box will list all (e.g. reader groups) that include an item (e.g. reader) whose category includes the
Matching text.
 Readers - The name of a reader. If, for example, you select Reader Groups from the Select menu,
the top-left box will list all reader groups that include a reader whose name includes the Matching
text.
 Floors - The name of a floor. If, for example, you select Floor Groups from the Select menu, the
top-left box will list all floor groups that include a floor whose name includes the Matching text.
 Reader Groups/Floor Groups/Intrusion Areas - These are available (in addition to the above) if
you select Access Codes from the Select menu. If, for example, you select Floor Groups, the
top-left box will list all access codes that include a floor group whose name includes the Matching
text.

384
Symmetry Software Reference Manual

Hide Assigned...
Select this checkbox if you want to exclude from the top-left box (Available items) all items that have already
been assigned to the access rights, as displayed in the top-right box.
Group by
This menu allows you to group the assigned access rights listed in the top-right box:
 None - The access rights are listed separately in order of their name that appeared in the top-left
box (Available item). The type of each access right is given.
 Time Code/Intrusion User - The access rights are grouped by their time code or intrusion user.
 Type - The access rights are grouped by their type.

Overview of Screen Content


The screen is divided into four main boxes and the content can depend on the type of access right selected from
the Select menu:
Top-left box (Available items)
The top-left box lists items that are available to you to add to the access rights. Only items of the selected type
are listed. For example, if you have chosen Readers from the Select menu, the box lists Available Readers. If
Hide Assigned Readers is selected, only those readers that are not already in the access rights are listed,
otherwise all readers you have access to are listed.
For reader and floor groups, the box lists the reader or floor groups belonging to the currently selected
company, and any groups that other companies have shared with the currently-selected company.
When assigning intrusion user access rights, you can select multiple panels, providing they are all the same
type.

Note: The list may not include all items of the selected type, depending on your permissions and the
permissions assigned to the items (using the Permissions button) when they were defined.
Note:Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of items listed. A message at a bottom of the list indicates when there are
unlisted items available that match the specified Filter by filter.

Type sub filter here


You can use this field to list only those items whose name includes the text you enter.
Type sub filter here operates only on the results of the Matching filter.
Top-right box (Assigned Access Rights)
The top-right box lists all currently assigned access rights of the type available from the Select menu.
The Group By menu allows you to group access rights in the box (see above).
Type sub filter here
You can use this field to list only those items whose name includes the text you enter.
Bottom-left box (Time Codes or Account Details, if displayed)
The bottom-left box (if displayed) lists:
 Time codes, when the selected type is Reader Groups, Readers, Floor Groups, Disconnected
Door Groups or Disconnected Doors. A time code limits access to specific times of the day and
week.
Selection List Rows Limit specified in the "Maintenance/User & Preferences/Client Preferences" screen
determines the maximum number of time codes listed. A message at a bottom of the list indicates when
there are unlisted time codes available that match the Filter Time Codes field.

385
Assign Access Rights Screen

Filter Time Codes


You can use the Filter Time Codes field to list only those time codes whose name includes the text
you enter. For example, the time code named "ABC123" is listed if you enter "C1", or "AB", etc. After
entering the text, press Enter or click to action the filter.
Leave the Filter Time Codes box empty if you do not want to use a filter.
The Filter Time Codes field appears only if the number of time codes exceeds the value of
Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen.
Type sub filter here
You can use this field to list only those time codes whose name includes the text you enter.
If Filter Time Codes is also displayed, Type sub filter here operates only on the results of the
Filter Time Codes filter.
 Account details, when the selected type is Intrusion Users.
Note: When you add the access rights, the account details are checked, and if valid, the panels and
account details are listed in the top-right box. If you want to change the account details for a panel that is
already in the access rights, remove the panel and add it again with the changed details.

User Number
Each user defined in an intrusion panel requires a user number, which uniquely identifies that user.
The default user number displayed is the next free user number across all panels selected. If no
users have been defined in the selected intrusion panels, the default is 2.
When you add the access right, Symmetry checks whether the user number already exists. Each
selected panel is checked in turn to determine whether the user number already exists, and if it
does, you are prompted whether to overwrite the existing user details in that panel.
Use Cardholder PIN Code
Selecting this option:
 Copies the card holder's PIN to the User Code/Pass Code field.
 Causes the user code (pass code) to be automatically updated at the selected
panel(s) whenever the card holder PIN is changed in the Card Details tab.
You can edit the User Code/Pass Code field with this option set. If you do this, you will be prompted
whether or not to change the card holder's PIN when you add the access right.
Note: if the user has rights to more than one panel, the user code (pass code) must be the same
across all panels that have Use Cardholder PIN Code set. Symmetry checks this condition when
you add the access right. The reason for this condition is to enable the user code (pass code) to be
automatically updated across all panels if the card holder's PIN is changed in the Card Details tab.
If you change the PIN in the Card Details tab, but the new PIN is not usable as a user code (pass
code) at a panel, you are prompted whether to remove the link between the card holder PIN and
user code (pass code). If you choose to remove the link, Use Cardholder PIN Code is automatically
deselected for that panel.
If Card Holder Show PIN Code is not selected in your user permissions ("Maintenance/User &
Preferences/Roles" screen), the PIN is not displayed (for security reasons).
If you perform an upload and the user code (pass code) of an intrusion user has changed, Symmetry
checks whether that user has Use Cardholder PIN Code set. If this is the case, the option is
automatically deselected, since the user code (pass code) and card holder PIN are no longer the
same.
Use Cardholder IDS Code
Selecting this option:
 Copies the card holder's IDS Code to the User Code/Pass Code field.

386
Symmetry Software Reference Manual

 Causes the user code (pass code) to be automatically updated at the selected
panel(s) whenever the card holder IDS Code is changed in the Card Details tab.
You can edit the User Code/Pass Code field with this option set. If you do this, you will be prompted
whether or not to change the card holder's IDS Code when you add the access right.
Note: if the user has rights to more than one panel, the user code (pass code) must be the same
across all panels that have Use Cardholder IDS Code set. Symmetry checks this condition when
you add the access right. The reason for this condition is to enable the user code (pass code) to be
automatically updated across all panels if the card holder's IDS Code is changed in the Card Details
tab.
If you change the IDS Code in the Card Details tab, but the new IDS Code is not usable as a user
code (pass code) at a panel, you are prompted whether to remove the link between the card holder
IDS Code and user code (pass code). If you choose to remove the link, Use Cardholder IDS Code
is automatically deselected for that panel.
If Card Holder Show PIN Code is not selected in your user permissions ("Maintenance/User &
Preferences/Roles" screen), the IDS Code is not displayed (for security reasons).
If you perform an upload and the user code (pass code) of an intrusion user has changed, Symmetry
checks whether that user has Use Cardholder IDS Code set. If this is the case, the option is
automatically deselected, since the user code (pass code) and card holder PIN are no longer the
same.
User/Pass Code
Each intrusion user requires a user code (pass code for Bosch panels), which is the code that the
user enters to access the intrusion options at the selected panel(s).
No two users can have the same user code (pass code) at the same panel - Symmetry checks this
condition when you add the access right. It is possible for a user to have different codes at different
panels if Use Cardholder PIN Code is not selected.
For DMP panels, the user code must be between 3 and 6 characters long. It must not start with a 0,
and if it is a 3-character code, it must not start with 98.
For ThorGuard panels, the user code is 6 characters long.
For Bosch B9512G panels, the pass code must not be within a value of 2 of any other pass code.
This is a requirement for Bosch duress, even if duress is not used. Symmetry checks this condition
when you add the access right.
User Name
Each intrusion user requires a user name.
The default name is the last name and first initial of the card holder.
Profile
Each user in the intrusion system requires a user profile number, which determines the options that
are made available at the panels. You can assign only one of the uploaded profile IDs.
This field is not available for Bosch B9512G panels.
Default Area Authority
This field is available only for Bosch B9512G intrusion panels.
Each user in the intrusion system requires an area authority level (1-14), which determines the
options that are made available at the panels. The authority level will apply to all areas for the user.
Note: When you upload users from the panel to Symmetry (using the
"Install/Intrusion/Intrusion/System Configuration" screen), any user configured at the panel with an
Authority Level of zero will not be uploaded.

387
Assign Card Relay Output Group Screen

Bottom-right box (Time Code graphic, if displayed)


The bottom-right box (if displayed) provides a graphical representation of the time intervals in the selected time
code. This may be a time code you have selected in the bottom-left box, or the time code in an access right you
have selected in the top-right box.
The box also contains the following buttons:
Modify (displayed only if you have sufficient permissions) - Allows you to edit the selected time code.
View (displayed only if Modify is not displayed) - Allows you to view the selected time code.
New - Allows you to create a new time code.

Assign Card Relay Output Group Screen

General
This screen enables you to associate an output group with the selected reader. The selected reader is attached to a
Card Relays node.

Note: You may not be able to select certain reader groups, depending on the permissions assigned when they
were defined (using the Permissions button).

Click here for an introduction to output groups.

Screen Options
Available Card Relay Output Groups
Add >>
Adds the selected output group to the access rights.
<< Remove
Removes the selected output group to the access rights.
Assigned
This area lists the output group currently selected.

Assign Holiday Type Screen("Operation/Times/Holiday")


Use this screen to choose the holiday types you want to assign to the dates you have selected in the Holiday
screen.
The screen indicates any holiday types already allocated to the dates. You can deselect these, if required.
If a checkbox is already selected and grayed out, it indicates that one or more of the dates you have selected does
not contain that holiday type. If you want to deselect this holiday type from dates, make sure that all the dates you
select include this holiday type.
You can use Holiday Title to assign an optional title to the holiday dates. For example, you may have selected the
"Statutory Holiday" holiday type, but may want to use Holiday Title to clarify the holiday as "XMAS HOLIDAY". The
field is grayed out if you have chosen dates that already have different holiday titles assigned.

388
Symmetry Software Reference Manual

Available Unassigned (Network Discovery of Digital Video Device)

General
This screen lists all devices of the selected type that have been detected on the network, but which have not yet
been configured in the Symmetry software. That is, the IP address of each device listed does not correspond to a
device in the Symmetry database.
Select the device you want to configure, then click OK.
Depending on the device type, you may be prompted whether to use the existing configuration settings stored in the
device, or the default settings for a new device.
The details displayed include the Media Access Control (MAC) address of the device. This is defined at time of
manufacture and cannot be changed. The MAC address is printed on a label attached to the device.

Badge Design Rule Screen ("Setup/Identity/Badge Designer")

Introduction
This screen enables you to set up a rule for hiding or showing the selected object on displayed or printed badges.
The object is hidden or shown, depending on the value of one or more personal data titles in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen. For example, the rule can specify that a logo
should be displayed if the value of a personal data title matches specified text.
Any object in the Badge Designer that has a rule, is marked with a red dot in its bottom-right corner.

Display or Print Item if this rule is valid


Select Display or Print Item if this rule is valid if you want the object to be displayed only if the rule conditions are
met. Deselect the option if you want the object to be hidden only if the rule conditions are met.

Using the Screen


To use this screen:
1. Select a personal data title from the Data Type menu. If the badge is a visitor badge (that is, Visitor Badge
is selected in the Badge Designer), the menu contains personal data titles set up in the
"Setup/Identity/Personal Data/Visitor Titles" screen. Otherwise, the personal data titles set up in the
"Setup/Identity/Personal Data/Card Holder Titles" screen are displayed.
2. Select an Operator.
3. Enter appropriate personal data text in the Value field.
4. Click Apply. The condition is displayed in the Conditions box.
5. If you want to add another condition to the rule, click And or Or, then repeat steps 1 to 4 above. The text
under the box shows how the conditions are processed.
You can use Remove to remove a selected condition.
Move Up and Move Down enable you to rearrange the order of the conditions. The order of the conditions can
affect the outcome of the rule.

Badge Preview Screen

General
Overview of this screen
This screen enables you to preview a badge before printing it on the badge printer.

389
Blocked Cards Caused by PIN-Entry Errors

If the printer has an in-built encoder, you can also encode the card number, customer code and issue number
onto the badge.
If you are using a Card Handler Client, the customer code is obtained from the ENX\SMX file.

Note: The card details are stored in the database when you select the Badge button in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen.

If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System


Preferences" screen, the same card credentials cannot be encoded onto more than one card. For further
details, please refer to the help for Prevent Duplicate Credential Encoding in the System Preference screen.
You can print a series of badges in one operation by using the "Home/Identity/Print Badges" screen. If you
intend to use this method, it's a good idea first to specify the each person's default badge design (Card Details
tab) and encoding format before using the "Home/Identity/Print Badges" screen.

Screen Options
Setup
Click this button to set up the printer options. Click here for details.
Print
Select this button if you want to print (and optionally encode) the card.
You may not have access to this button, depending on your user permissions, as set up in the
"Maintenance/User & Preferences/Roles" screen.
Badge Design
This displays the badge design selected in the Card Details tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. The design determines the appearance of the badge, and is set up using the
"Setup/Identity/Badge Designer" screen.
Encoder Format
If the badge printer allows you to encode a magstripe card, select the encoding format using this pull-down
menu. The formats are defined in the "Install/System/Default Settings/Reader/Card Formats" screen.
Track
This is relevant only for magstripe cards. If the badge printer allows you to encode the card, select the track
number to use (cards may have more than one magnetic track).
The installer can set up the default track in an ini file.
bpi
This is relevant only for magstripe cards. If the badge printer allows you to encode the card, select the bpi (bits
per inch) setting. Micromax always uses 75bpi.
Smartcard Format
DES Fire Encoding
User PIN Active
Select Sector to use
Site number
User PIN

Blocked Cards Caused by PIN-Entry Errors


The system can be set up to prevent a card from being used if the person enters an incorrect PIN a specified
number of times.

390
Symmetry Software Reference Manual

Setting Up Card Blocking for Readers


Card blocking can be configured using PIN Code Errors in the Modes tab of the "Install/Access Control/Reader"
screen. This contains several settings:
 Number of Attempts - This determines the maximum number of attempts a card holder is given to
enter a correct PIN before their card is blocked.
 Inactivate Card on PIN Error - The card is made inactive and a "Deleted for PIN" alarm is
generated if the card holder enters their PIN incorrectly the specified number of times.
 Inhibit Card on PIN Error - The card is temporarily suspended and a "Card Suspended" alarm is
generated if the card holder enters their PIN incorrectly the specified number of times. The period
of suspension can be configured using Card Inhibition Period in the "Maintenance/User &
Preferences/System Preferences" screen. Note that Inhibit Card on PIN Error requires specific
firmware in nodes - please contact your local support representative for details.
Only those readers that have PIN Code Errors set can cause a card to become blocked as a result of incorrect PIN
entries.

Extent of Blocking
The extent of the blocking depends on the setting of Delete PIN Errors Globally in the "Maintenance/User &
Preferences/System Preferences" screen:
 If Delete PIN Errors Globally is selected, the card is blocked at any reader. A card made inactive
can be re-activated by changing its status to "Active" in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
 If Delete PIN Errors Globally is not selected, the card is blocked at the reader where the PIN was
entered incorrectly, and at all other readers connected to that reader's node. The card will continue
to be able to be used at readers connected to other nodes, and the status of the card will be
"Active". A blocked card can be un-blocked at the affected node by downloading the card using the
"Maintenance/Download/Cards" screen.

Incorrect PIN Attempts that Count Towards Blocking


When the reader is connected to a multiNODE-2 or later node, the card is blocked, even if the incorrect PINs are
entered in different card transactions, provided no other card has been used between the incorrect PIN entries. If a
card is presented and no attempt is made to enter a PIN, a Wrong PIN alarm/event is generated, but this does not
count as one of the attempts.

Camera Tour Period


This dialog is displayed by selecting Camera Tour Time from the right-click menu in the "Home/Video &
Audio/Virtual Matrix" screen.
The dialog allows you to change the length of time that each camera image is displayed during a camera tour.
Camera Group
This displays the name of the camera group that the selected cell contains.
Enable Custom Tour Time
Select this option to change the default camera tour time.
Tour Time Period
Enter the length of time to display each camera image during a camera tour. The default camera tour time is
configured in the "Maintenance/User & Preferences/System Preferences" screen.

391
Card Layout Screen

Card Layout Screen


Card - Specify the size of the badge. You can choose one of the standard sizes, enter a Custom size, or select it
from the Predefined list.
If you select Print Card Front 180º Rotated, the front side of the badge will be printed 180 degrees rotated. So, an
object you see on the front of the badge in the top-left corner of the design on the screen will be printed upside
down in the bottom-right corner of the badge. Print Card Front 180º Rotated does not affect the printing on the
rear side.
Examples of Print Card Front 180º Rotated

Note: It is assumed that you switch between the front and rear views by flipping the badge over along its
horizontal axis (hold the badge's right-hand edge and flip to the left).

EXAMPLE 1: Badge with a magstripe on the rear side (side 2) along the top.
Badge design as displayed on the screen:

Badge design as printed, with 180 degree rotation selected:

EXAMPLE 2: Badge with a magstripe on the rear side (side 2) along the bottom.
Badge design as displayed on the screen:

Badge design as printed, with 180 degree rotation selected:

EXAMPLE 3: Badge with a chip on side 1 on the left.

Note: For a smart card, the front is assumed to be the non-chip side.

392
Symmetry Software Reference Manual

Badge design as displayed on the screen:

Badge design as printed, with 180 degree rotation selected:

Grid - Select Show Grid to display the grid points on the screen. Choose Snap To Grid if you want the ends or
corners of the objects you draw or move to snap to the grid points. In the Grid Spacing box, enter the distance
between grid points.
OK - Applies the changes you have made.
Cancel - Exits without applying any changes.

Card Number
The card number is the card's unique number for the selected customer/facility code. The card number is often
printed on the front of the card.
There can be several different codes on a card used for access control:
 The card number.
 The card's issue number, if defined in the Card Details tab. Not all card technologies enable an issue
number to be included on the card.
 The customer code, which identifies the company that the card belongs to. Not all card technologies
enable the additional security of a customer code to be included on the card.
If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System Preferences"
screen, the unique combination of card number, customer code and card issue level cannot be the same as for any
other card that was previously encoded.

Auto Card Number


If Auto Card Number is selected in the System Preferences screen and you leave Card Number empty, a card
number is generated automatically when you select Save.
If Auto Card Number is not selected and you leave the card number empty for any type of card, a card number of
zero is saved.
For card holders (not visitors), if Multiple Cards is selected in the System Preferences screen, a card number of
zero automatically sets Force Card Inactive. If Multiple Cards is not selected, or for visitors, a card number of
zero sets Force Card Holder Inactive. The Multiple Cards setting is not relevant for visitors.

Multiple and Temporary Card Buttons


The following are displayed to the right of Card Number if a card holder can have multiple cards (not applicable to
visitors). For details of the icons, please refer to Using Multiple and Temporary Cards.

393
Commands

Symmetry Blue Enrolment Button


The following button is displayed next to Card Number if a Symmetry Blue enrollment reader is connected to your
computer:

Click the button to begin enrollment of the person's mobile device. The device must be Bluetooth-enabled and must
have the Symmetry Blue mobile app installed. Once enrolled, the device ID allocated by the app is shown in the
Card Number field.
If the device is not available, you can enter the device ID directly into the Card Number field.
Once the mobile device is enrolled, you can click Encode to encode the card holder's details to the mobile device.

Reading a Smart Card


A Smart Card button is displayed next to the card number if you have opened an existing card holder and a card
encoder is connected to the computer. You can use button to replace the existing card details with those encoded
on the card. Please click here for further information about using an encoder.

Commands
Note:
 The commands available depend on the screen you are using.
 The Send Commands permission in your user role ("Maintenance/User & Preferences/Roles"
screen) determines the types of commands you can send from the "Home/Monitoring/Command
Center" screen.
 The "Maintenance/User & Preferences/Command Roles" screen specifies the commands you can
use as manual commands through the "Home/Monitoring/Graphics" and
"Home/Monitoring/Command Centre" screens.

Auxiliary Outputs / Auxiliary Output Groups


Output Off
Output On
Output Pulse
Return to Schedule

Clients
Return to Schedule
Switch Matrix View

Digital Video Cameras / Digital Video Camera Groups


Disable Motion Detection
Disable Picture Loss (Processing)
Enable Motion Detection
Enable Picture Loss (Processing)
Live Video
Modify Video Settings
PTZ Preset
Record Video
Return to Schedule
Start Recording
Stop Recording
Switch Live Video
Video Instant Replay

394
Symmetry Software Reference Manual

Doors / Door Groups


Disable/Enable: All Door Alarms, Door Alarm Resets, Door Forced Alarms and Door Held Alarms

Elevator Floors / Elevator Floor Groups


Free Access
Grant Access
Return to Schedule
Secure Access

Intercom Commands (From Graphics only)


Clear Call
Send Command
Connect
Disconnect

Intrusion Systems
The following commands are available for M2150 intrusion systems and intrusion systems supported by the Full
Intrusion Management interface:
Outputs
Output Off [Bosch B9512G, Siemens (Vanderbilt), DSC, DMP and ThorGuard systems only]
Switches off the output.
Arms all areas.
Output On [Bosch B9512G, Siemens (Vanderbilt), DSC, DMP and ThorGuard systems only]
Switches on the output.
Arms all areas.
Return to Schedule [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Arms all areas.
Panels
Arm Area [Bosch B9512G systems only]
Arms all areas.
Disarm Area [Bosch B9512G systems only]
Disarms all areas.
Lock Out Node [M2150 systems only]
Causes the M2150 intrusion node to go into lock-out mode.
Set Clock [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Sets the date and time at the panel to be the same as at the PC.
Set Service Mode [CU30 and ThorGuard only]
Enables an installer to log into the panel from a keypad.
Unset Service Mode [CU30 and ThorGuard only]
Unsets service mode.
Silence Alarm [Siemens (Vanderbilt), ThorGuard and CU30 systems only]
Silences alarm sounds.

395
Commands

Restore Alarms [Siemens (Vanderbilt) only]


Restores (resets) all alerts at the panel. An alert can only be restored after the zone(s) or fault(s) that
triggered the alert have been restored to their normal operating state. Please refer to the Siemens
(Vanderbilt) documentation for further information.
Reset Sensors [Bosch B9512G only]
Restores (resets) all alerts at the panel. An alert can only be restored after the zone(s) or fault(s) that
triggered the alert have been restored to their normal operating state. Please refer to the Bosch
documentation for further information.
Return to Schedule [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Areas
Arm Area
Arms the area. For all but Bosch B9512G panels, this command arms the area immediately without
starting the exit timer.
For Bosch B9512G panels, three additional parameters are available for this command when issued from
the "Home/Monitoring/Command Center" or "Home/Monitoring/CGraphics" screen:
 Force Arm - Select to force-arm the area if sensors are active.
 Part Arm - Select to part-set the area.
 Instant Arm - Select to set the area without an exit delay.
Note: Permissions to arm an area are definable using the Permissions button in the
"Install/Intrusion/Intrusion/Device Configuration" screen.
Bypass Active Zones
A Bypass Active Zones option is displayed in the "Home/Monitoring/Command Center" screen if
Allow Zone Bypass when Arming is selected in your user role. This option is available for
scheduled and trigger commands, irrespective of the setting in your role.
Selecting Bypass Active Zones causes any zones that are in an active state to be automatically
bypassed before the area is armed. This includes zones that are in a tamper state. An area cannot
be armed if there is a zone that is in an active state that has not been bypassed.
Cancel Auto Arm [DMP systems only]
Cancels auto arming until the next day.
Change Auto Arm [M2150 systems only]
Allows you to change the time of the next auto-arm of the area.
Delay Autoarm [CU30, ThorGuard and DSC systems only]
Delays automatic arming of the area. The delay period is specified at the intrusion system.
Disarm Area
Disarms the area.
Note: Permissions to disarm an area are definable using the Permissions button in the
"Install/Intrusion/Intrusion/Device Configuration" screen.
If you are sending the command from the "Home/Monitoring/Command Center" or
"Home/Monitoring/Graphics" screen, you can use a displayed Action Taken prompt to specify the reason
why you are sending the command. This prompt is always displayed in the Command Center, but is
displayed in the Graphics screen only if Enable Comments on Graphic is selected in the
"Maintenance/User & Preferences/System Preferences" screen. The Mandatory Intrusion Comments
option in the "Maintenance/User & Preferences/System Preferences" screen determines whether the
information is mandatory.

396
Symmetry Software Reference Manual

Part Arm A [Siemens (Vanderbilt) only]


Places the panel into "Partset A" mode. Please refer to the Siemens (Vanderbilt) documentation for further
information.
Part Arm B [Siemens (Vanderbilt) only]
Places the panel into "Partset B" mode. Please refer to the Siemens (Vanderbilt) documentation for further
information.
Return to Schedule [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Reset Area to Normal [M2150 systems only]
This command is intended to be used by users at control centers. It resets an area alarm condition. This
silences the alarm that is activated by Area in Alarm in the "Setup/Device Groups/Intrusion Areas" screen,
without disarming the area. However, before the command can be used, the zone that caused the alarm
condition must be in its normal state and the zone alarm must be acknowledged in the
"Home/Monitoring/Alarms" screen.
Note: An area alarm can be cleared from the "Home/Monitoring/Alarms" screen only after disarming the
area, or by sending this command if the area is still armed.
Reset Sensors [Bosch B9512G only]
Restores (resets) all alerts in the area. An alert can only be restored after the zone(s) or fault(s) that
triggered the alert have been restored to their normal operating state. Please refer to the Bosch
documentation for further information.
Silence Alarm [Bosch B9512G and DSC systems only]
Silences an alarm caused by a zone in the area.
Start Pre-arm Timer [M2150 systems only]
Starts the pre-arm period for an auto-arm of the area. The area arms at the next scheduled auto-arm time.
Stop Pre-arm Timer [M2150 systems only]
Ends the pre-arm period for an auto-arm of the area. This does not cancel the auto-arm; it merely stops
the actions that take place during the pre-arm period.
Zones
Bypass
Prevents the zone from generating alarms. The bypass is cancelled when the area is next disarmed.
You may want to bypass a zone if, for example, the zone is protecting a part of the building that will be
occupied while the remaining zones in the building are armed.
Note: Some intrusion systems (not M2150) require the zone to have bypassing/isolation allowed before
this command can be used.
If you are sending the command from the "Home/Monitoring/Command Center" or
"Home/Monitoring/Graphics" screen, you can use a displayed Action Taken prompt to specify the reason
why you are sending the command. This prompt is always displayed in the Command Center, but is
displayed in the Graphics screen only if Enable Comments on Graphic is selected in the
"Maintenance/User & Preferences/System Preferences" screen. The Mandatory Intrusion Comments
option in the "Maintenance/User & Preferences/System Preferences" screen determines whether the
information is mandatory.
Disable [Siemens (Vanderbilt), M2150, DSC and ThorGuard systems only]
Disables the zone until re-enabled.
You may want to disable a zone if, for example, you suspect that the sensor is faulty.
If you are sending the command from the "Home/Monitoring/Command Center" or
"Home/Monitoring/Graphics" screen, you can use a displayed Action Taken prompt to specify the reason
why you are sending the command. This prompt is always displayed in the Command Center, but is

397
Commands

displayed in the Graphics screen only if Enable Comments on Graphic is selected in the
"Maintenance/User & Preferences/System Preferences" screen. The Mandatory Intrusion Comments
option in the "Maintenance/User & Preferences/System Preferences" screen determines whether the
information is mandatory.
Enable
This cancels the effect of Disable. For all but Siemens (Vanderbilt) panels, it also cancels the effect of
Bypass.
Silence Alarm [DMP systems only]
Silences an alarm caused by the zone.
Return to Schedule [Siemens (Vanderbilt), DSC, DMP, HISEC and ThorGuard systems only]
Un-bypass [Siemens (Vanderbilt) only]
This cancels the effect Bypass.
Zone Groups
Arm Zone Group [ThorGuard and CU30 systems only]
Arms the zone group.
Disarm Zone Group [ThorGuard and CU30 systems only]
Disarms the zone group.
If you are sending the command from the "Home/Monitoring/Command Center" or
"Home/Monitoring/Graphics" screen, you can use a displayed Action Taken prompt to specify the reason
why you are sending the command. This prompt is always displayed in the Command Center, but is
displayed in the Graphics screen only if Enable Comments on Graphic is selected in the
"Maintenance/User & Preferences/System Preferences" screen. The Mandatory Intrusion Comments
option in the "Maintenance/User & Preferences/System Preferences" screen determines whether the
information is mandatory.
Return to Schedule [DSC, DMP, HISEC and ThorGuard systems only]

Monitor Points / Monitor Point Groups


Disable (Monitor Point)
Enable (Monitor Point)
Return to Schedule

Passback/Anti-Passback
Set All Cards to Neutral
Set All Cards to a Specific APB Zone

Patrol Tours
Patrol Hold
Patrol Reset
Patrol Start

Predefined Commands
Activate

Readers / Reader Groups


Automatic Door Control Enabled
Card Command Mode Off
Card Command Mode On

398
Symmetry Software Reference Manual

Card Only
Card+PIN
Customer Code Only
Customer Code Only-No Store
Disable Fingerprint Mode
Disable (Reader)
Disable Push Button
Enable (Reader)
Enable Push Button
Grant Access
Keycard In
Keycard Mode Off
Keycard Mode On
Keycard Out
Lock Door
Manual Door Control Enabled
Office Mode Off
Office Mode On
Random Search On/Off
Re-enable Stopped Cards
Remove IDS Block
Return to Schedule
Single Fingerprint Mode
S600 Alarm LED Flash/Off/On/Pulse
S600 Reader Buzzer Off/On/Pulse
S600 Switch LED Flash/Off/On/Pulse
Toggle Mode Activate\Deactivate
Two Fingerprints Mode
Unlock Door
User Code + PIN
User Code Disable
User Code Only
IDS Code + PIN
IDS Code Disable
IDS Code Only

Serial Devices
Message name
Return to Schedule

Server
Run Command Line
Change Threat Level

Switcher Alarm (Trigger Commands)


Activate Alarm
Reset Alarm

Switcher (Analog CCTV) Video


Camera/Monitor Name

399
Create Bookmark Screen

Switcher (Analog CCTV) Ancillary


Ancillary Off
Ancillary On
Return to Schedule

ThorGuard
Activate Input
Activates the ThorGuard virtual input that has the specified address.
Deactivate Input
Deactivates the ThorGuard virtual input that has the specified address.

Create Bookmark Screen

General
Overview of this screen
This screen enables you to bookmark a recording, so that it can be easily found and replayed in the
"Home/Video & Audio/Video Playback" screen.

Note: You are prompted to confirm the bookmark if the settings will cause it to extend beyond the beginning
and/or end of the clip you are viewing.

About the Options


Description
Camera
From Current Playback Position
From Start of Video Selection
By Date and Time

Data Import Maintenance ("Operation/Data/Data Import")

General
Overview of this screen
This screen enables you to maintain the import database, which is used as a data interface between the source
database and Symmetry's live databases.

Screen Options
Import Database Password
This is optional. If you enter a password, when the data is being imported from the import database to
Symmetry's live databases, the system checks that the encrypted password in each record is the same as this.
If the match is not successful, the record is not imported into the live databases.
The purpose of entering a password is to prevent unauthorized records in the database from being imported.
This password is saved when you select OK; there is no need to re-enter the password each time you enter the
screen.

400
Symmetry Software Reference Manual

Delete Imported Records


You can use this option to delete records from the import database. The deletions take place when you select
OK.
None - No records are deleted from the database.
All Imported Records - All records that have been successfully imported are deleted when you select OK.
All Records - All records are deleted when you select OK.
Deleting records from the import database does not affect the data held in the source database.

Date Range

General
This screen enables you to define the date range during which advanced access rights apply. It is displayed when
you assign the first of a set of rights to an advanced access rights section (such as Advanced 1). Subsequent
assignments in the same section use the existing date range defined.
You can also access this screen to change the date range by selecting the relevant advanced rights title in the
Access Rights card tree view then selecting the Dates button.

Screen Options
From/To
Specify the date range over which the advanced access rights apply. You can enter the date range, or choose
the date using the Calendar button.

Default Badge Access Rights Screen ("Setup/Identity/Badge


Designer")

General
About the Default Badge Access Rights Screen
The Default Badge Access Rights screen enables you to associate a set of normal access rights with the badge
design. When a person is assigned the badge design in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen, the access rights defined for the badge design are automatically assigned to
the person's normal access rights.
The access rights are displayed in a graphical tree view. You can expand the branches of the tree to view their
contents in the normal way.
Access rights determine the doors or elevator floors that the person has access to, and the times that access is
allowed. The access rights can contain any number of the following access right types:
Access Codes
Global Access Codes
Reader Groups
Readers
Floor Groups
Disconnected Door Access Rights (Doors and Door Groups)

Note: You can set up access rights for an output group by right-clicking on the controlling reader. Click here for
further information.

401
Default Permissions Screen

Assigning Access Rights


You can assign default access rights to the badge design as follows:
1. In the tree view, select the required branch, such as Readers.
2. Click the Assign button, or select the Assign option from the right-click menu.
3. Specify the required access rights in the screen displayed.
Removing Access Rights
You can remove an individual access right or any group of rights as follows:
1. Select the individual access right or the whole branch to be removed. For example, to remove all reader
group access rights, select Reader Groups.
2. Select the Remove button, or select the Remove option from the right-click menu.
Prerequisites
Before defining access rights, make sure that the items necessary to define the required access rights have
been set up. For example:
 Reader Groups ("Setup/Device Groups/Readers")
 Readers ("Install/Access Control/Reader")
 Floor Groups ("Setup/Device Groups//Floors")
 Access Codes ("Operation/Times/Access Codes")

Screen Options
Page View/Normal View
Expand
Collapse
Assign
Remove
Threat
Reset
OK
Cancel

Default Permissions Screen


This screen enables you to choose the default user role(s) selected in the Permissions screen when setting up new
items such as card holders, cameras, readers and reader groups.
Click here for further information.

Definition Screens

Introduction
About Definition screens
Many options display two screens - the Selection screen (for example, the Card Holder Selection screen) and
the Definition screen (for example, the Card Holder Definition screen). The Definition screen is the screen that
is displayed when you choose to edit an existing item listed in the Selection screen, or create a new one.
This topic describes options that are common to many of the Definition screens.

402
Symmetry Software Reference Manual

Common Options
>
Use this button to add to the list.
1. Select the items to add (from the left-hand side of the screen).
2. Click >. Double-clicking or using drag an drop may have the same effect.
<
Use this button to remove items from the list.
1. Select the items to remove in the box on the right-hand side of the screen.
2. Click <.Double-clicking or using drag an drop may have the same effect.
Copy
If you have selected an existing entry from the Selection screen, you can use this button to copy the details to
create a new entry. After selecting Copy, enter the new details, then select OK/Save.
Delete
If you have selected an existing entry from the Selection screen, you can use this button to delete the entry.
You are not normally able to delete an item if it is being used in another item (for example, you cannot delete a
reader if it is used in a reader group).
Notes
The Notes button opens a Notes screen, which allows you to record or read any notes relating to the screen
you are currently using.
Notes icon
The icon has a different use from the Notes button. Selecting the icon enables you to write a note for the
individual record you are editing. For example, if you are using the Card Holders Definition screen, you can
select the icon to write a note about the individual card holder you are editing. If you select the Notes button
in the same screen, you can write a note that is displayed no matter which card holder you are editing.
The icon changes to if a note already exists.
Permissions
You can use the Permissions button to select the user roles (as defined in the "Maintenance/User &
Preferences/Roles" screen) that will have access to use the item you are defining. The Permissions button is
available if Enable Permissions is selected in your user permissions ("Maintenance/User &
Preferences/Accounts" screen).
A user who have System Admin privileges (as specified in the "Maintenance/User & Preferences/Roles" screen
) is not subject to these permissions.
Click here for further information about setting permissions.
Apply
Saves the changes without exiting the screen.
OK/Save
This takes you out of the screen and saves changes.
Cancel/Close
This takes you out of the screen without saving any changes.

403
Directory Settings Screen ("Maintenance/User & Preferences/Roles")

Directory Settings Screen ("Maintenance/User &


Preferences/Roles")

General
Introduction
This screen is available only if a license for the "Directory/LDAP Authentication Module" is installed. The screen
is displayed by clicking the Directory button in the "Maintenance/User & Preferences/Roles" screen.
The screen allows you to:
 Link a directory group to the Symmetry role.
 Specify default settings for any new Symmetry account that is created with this role.
The settings in this screen are used when Symmetry creates a new Symmetry user account for a directory
user, which occurs when a directory user who is new to Symmetry starts or logs in to Symmetry (depending on
the configuration in the Directory Link screen).
For further details of how Symmetry user accounts are created, please refer to "About the Directory/LDAP
Authentication Module".

Screen Options
Filter
You can use this box to filter the directory groups listed in the screen. You can use wildcards in the fields.
Group selection box
This box lists the directory groups on the directory server (in excess of 1000) that match the Filter settings.
Select a directory group. This links the group to the Symmetry role.
A directory group can be linked to only one role. When you save the details, Symmetry checks that the directory
group is not already linked to another role.
Directory Logon
If you have permissions to browse the Active Directory, the screen should automatically display a list of
directory groups. If you do not have permissions, you can enter the username and password of a directory user
that does.
The username must be in the format <domain>\<username>. For example, technology\alanc. Alternatively,
enter a User Principal Name (UPN), such [email protected].
Options
The Options area defines the default settings for any new Symmetry user account created by the
Directory/LDAP Authentication Module for the selected role.
For details of these options, please refer to the help for the "Maintenance/User & Preferences/Accounts"
screen.
OK/Cancel
These buttons are common to many Definition screens. Click here for details of these options.

404
Symmetry Software Reference Manual

Disabling or Enabling Door Alarms

Introduction
You can set up scheduled commands to disable or enable Door Alarm Reset, Door Forced and Door Held Open
alarms. You need to select Door or Door Group in the Device menu of the "Operating/Commands/Scheduled"
screen to set up these commands.
You may want to disable door alarms at times of the day where such alarms do not need to be reported.
The following Disable commands are available:
 Disable All Door Alarms - suppresses Door Alarm Reset, Door Forced and Door Held Open
messages.
 Disable Door Alarm Resets - suppresses Door Alarm Reset messages
 Disable Door Forced Alarms - suppresses Door Forced messages.
 Disable Door Held Alarms - suppresses Door Held Open messages.
If a Disable command is executed at the Symmetry server, and the condition (e.g. Door Forced) is set up to be
reported as an alarm, it is reported as an event instead. If a Disable command is executed at a node, the condition
is not reported as either an alarm or event. The Options tab of the "Operating/Commands/Scheduled" screen shows
where the command will be executed.
A corresponding Enable command is available for each Disable command. Note that if a door is open when an
Enable command is actioned, no Door Forced or Door Held Open message is issued to indicate that the door is still
open.

Node Configuration
Door and Door Group are in the Device menu of the "Operating/Commands/Scheduled" screen only if there are
nodes that have Node Supports Disabling of Door Alarms set in the "Install/Access Control/Nodes" screen.
You will find that a reader is not listed in the Location menu if the node that controls the reader does not have
Node Supports Disabling of Door Alarms set.
When set up for a single reader, the command can be executed at the node, and the node definition
("Install/Access Control/Node" screen) must specify that the node supports the feature.

Bypassed Door Alarms Report


You can use the "Reports/Configuration/Reports" screen to produce a Bypassed Door Alarms report. The report
lists doors that have door alarms that are disabled or demoted to events.
To produce the report, select Bypassed Door Alarms from the Listing Type menu in the
"Reports/Configuration/Reports" screen. A dialog is displayed that contains two menus:
 Device - Choose All if you want to include all doors (readers) in the report. Alternatively, choose
Door or Door Group to include only a specified reader or reader group.
 Location - This is enabled if you choose Door or Door Group from the Device menu. Choose the
reader or reader group.
The report includes the following:
 Near the top of the report, the current threat level is given.
 Under the threat level, the report shows whether any of the following messages have been set to
Event or Ignore in the "Operation/Alarms/Reporting" screen: Door Forced, Door Held Open, Door
Insecure or At Wrong Door.
 The report lists any door that has either of the following set up:
 Door Forced, Door Held Open, Door Insecure or At Wrong Door set to Event or Ignore in
the "Operation/Alarms/Definitions" screen.
 A schedule command set up to disable or enable door alarms today. The report shows the
name of the schedule command, its start and stop commands, and the start and stop times
of the time code. If the stop command disables alarm(s), the times and date of when the
command last ran are also given (if applicable). The report does not include scheduled

405
Email Tab ("Operation/Alarms/Definitions" and "Operation/Alarms/Reporting")

commands that are inactive, have a validity period that does not include the current date, or
are inactive due to the current threat level.

Disconnected Door Access Rights


This section is available in the access rights if a Disconnected Doors license is installed, as described in the
Disconnected Doors Installation and User Guide.
Selecting Doors allows you to set up access rights to individual SALTO doors.
Selecting Door Groups allows you to set up access rights to a group of doors if zones have been set up in the
SALTO software.

Email Tab ("Operation/Alarms/Definitions" and


"Operation/Alarms/Reporting")

Introduction
Purpose of the Tab
Use this tab if you want details of the alarm to be sent by email.
The Email tab in the "Operation/Alarms/Definitions" screen displays any default entries set up in the
"Operation/Alarms/Reporting" screen.

Note: Email details for node and system alarms must be defined in the "Operation/Alarms/Reporting" screen,
since they cannot be defined in the "Operation/Alarms/Definitions" screen.
Note: To enable email alarms, you must set up alarm routing to the E-Mail Alarms client in the
"Operation/Alarms/Routing" screen. The "Operation/Alarms/Routing" screen prevents/allows email alarms from
being generated based on time of day and day of week.

Information in the Email


The information sent in the email includes the following:
 "Who", "what" and "where" details.
 Alarm instructions.
 Date and time.
 Priority.
 Any alarm escalation details.

Options
Email Profile
Choose an email profile set up in the "Setup/Configuration/Email Profiles" screen. This specifies the recipient's
email address and the settings necessary to connect to the email server.

Encode Screen

General
Overview of this screen
This screen is accessed by clicking Encode in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen and enables you to encode the card details to a smart card, or to a mobile device (installed with the

406
Symmetry Software Reference Manual

Symmetry Blue app, or the mobile app for use with the Suprema BioLite N2 integration) that is being used as a
pseudo-card. Note that a mobile app for use with the Suprema BioLite N2 integration is not widely released.
The information encoded can include the card number and customer code, and any biometric data captured.
The computer port used by the encoder is defined in the "Install/System/Client Ports" screen.
When you have selected or entered the required information in the screen, select OK to begin the encoding
process. Any existing encoded information on the card or mobile device is overwritten. Progress messages are
displayed in the screen.
The customer codes you are allowed to encode are determined by the supplied "enx" and "smx" files.

Screen Options
Encoder Type
Select Sector to use
DES Fire Encoding
User PIN Active
Format
Site number
User PIN
Encode PIN
Encode Fingerprint
Encoding Onto
Instruction Messages

Screen Buttons
Format
Erase

Filter By
Overview
The Filter by options enable you to choose which card-based alarms/events to include in the report. You can,
for example, use Filter by to choose to include only alarm/event records belonging to a specific person, or card
holders with a specified Last Name.
Note that although an alarm/event message may pass your Filter by selection, other filter options in this screen
may prevent the alarm/event message from being included in the report.
Certain alarms/events such as "Door Forced" are not associated with a specific card. These types of
alarm/event records are not affected by the Filter by selection, except when Visitor Last Name is selected (in
this case, such alarms and events are not included in the report).
If you do not want to filter out certain cards, select Last Name and leave the field blank.
You can use wildcards in any box where you can type text. This allows a range of records that meet the
wildcard criteria to be included in the report.

Filter By Options
Card Data Title
This is available only if a company is selected, or your company group has only one company.
If you select the option, the report will include only those card-based records that have information defined for
the selected Card Data Title. If you also type information in the Card Data box, only records that have
matching personal data for the Card Data Title are included in the report. Visitors are excluded from the report.

407
Filter Selection Screen

Card Number
If you choose this option and leave Card NumberandFacility/Customer Code blank, the report will include all
records that match the other filters specified on this screen. The report will include both visitors and standard
card holders.
If you enter a card number in the box, any card-based record must match the number specified here to be
included in the report.
If you select Card Number, you can, if required, also select a facility/customer code. You can also select a
facility/customer code without having to enter a card number; in this case, only people who have the selected
facility/customer code will be included in the report.
Employee Reference
If you choose this option and enter an employee reference number in the box, only records that are related to
the specified employee reference will be included in the report. Visitors will be excluded from the report.
Last Name
If you choose this option and enter a card holder's last name in the box, only records that are related to the
specified card holder will be included in the report. Visitors will be excluded from the report.
Transaction Name
This filter is applicable only if the Disconnected Doors license is installed, as described in the Disconnected
Doors Installation and User Guide.
Select this filter to include only specified SALTO event message(s). Choose the event from the Transaction
Name menu, or type a wildcard expression in the field.
Visitor Data Title
This is available only if a company is selected, or your company group has only one company.
If you select the option, the report will include only those visitor cards that have information defined for the
selected Visitor Data Title. If you also type information in the Visitor Data box, only records that have
matching personal data for the Visitor Data Title are included in the report.
Visitor Last Name
Select this option if you want the report to include only alarms/events relating to visitor cards. If you choose this
option and enter a visitor's last name in the box, the report will include only those visitor records that match the
specified name. The report will not include non-card-based records such as "Door Forced".

Filter Selection Screen


This screen is displayed by clicking Select Filters in the "Home/Monitoring/Alarms" screen. The screen allows you
to choose the filters (and therefore alarms tabs) to display in the Alarms screen.
The screen includes activity filters created using the Activity Filters screen and filters automatically created for
active maintenance zones.
Your user role must include permissions to the "Maintenance/Maintenance Zones/Maintenance Zones" screen for
the menu to include any maintenance zones.
Filters Available
This lists the filters that are available, but do not yet have a tab in the "Home/Monitoring/Alarms" screen.
If you do not want the selected filter to be displayed, you may want to move a filter to Filters Available, rather
than deleting the filter.
Filters Shown
A separate tab is displayed in the "Home/Monitoring/Alarms" screen for each filter listed in this box. You can
use the >> and << buttons to move a selected filter from Filters Available to Filters Shown, or vice versa.

408
Symmetry Software Reference Manual

Move Up and Move Down


You can use these buttons to change the order of the filter tabs displayed in the "Home/Monitoring/Alarms"
screen. Select a filter in Filters Shown, then click Move Up or Move Down as appropriate. The filter at the top
of the list is displayed to the left of all others in the "Home/Monitoring/Alarms" screen.

Find a Card Holder/Visitor Escort Screen

General
This screen is displayed by clicking in the "Home/Identity/Verification" screen, or in the "Home/Identity/Visitors"
screen (next to the Visitor Escort option). You can use this screen to select a card holder.

Selecting the Card Holders to Find


The Filter and Options areas at the top of this screen enable you to be selective about the card holders listed
when you click Find.
Filter By
(other options are displayed below Filter By, depending on the option you choose.)
Card Data Title
Card Name
Card Number
Employee Reference
Active and Inactive Date
Select By Status
(other filter options on the screen may affect the number of card holders listed when you select Find.)
Active
All
Expired
Force Card Inactive
Forced Cardholder Inactive
Inactive
Lost
Not Issued
Not Yet Valid
Stopped

Other Fields and Buttons


Entries Found
Find
Open

409
Fingerprint Enrollment Acceptance Thresholds

Fingerprint Enrollment Acceptance Thresholds

Purpose of Acceptance Thresholds


When a fingerprint is presented to an S81x fingerprint reader during an access-control transaction, it is compared
against the fingerprint on the card and a score is produced. The closer the match, the higher the score. To gain
entry, the score calculated by the reader must be greater than or equal to the acceptance threshold.
Too high an acceptance threshold may result in a reader not being able to confirm that the fingerprint presented is
the same as the fingerprint on the card, particularly if the finger is very dry or not centered properly on the finger
pad.

Specifying the Acceptance Threshold During Fingerprint Enrollment


When enrolling a fingerprint from the Fingerprint Enrollment screen, you specify the required acceptance threshold,
and this is stored on the card during encoding. The default acceptance threshold is specified by the Default
Fingerprint Acceptance Threshold setting in the Preferences screen.
If you select Custom Threshold in the Fingerprint Enrollment screen, you can change the acceptance threshold,
but you cannot change it to be less than the minimum allowed setting in your user privileges ("Maintenance/User &
Preferences/Accounts").

Reader-Level Acceptance Threshold


In high-security areas, a low acceptance threshold may not be acceptable. Therefore, the card-level acceptance
threshold can be overridden by the reader by selecting Use Reader Acceptance Threshold and a threshold value
in the "Install/Access Control/Reader" screen.

Graphics Icons
The following icons appear in graphics:
Door. If Show Door Status on Graphics is selected in the "Maintenance/User & Preferences/System
Preferences", this icon is displayed on a graphic when a door is closed.
Door open. If Show Door Status on Graphics is selected in the "Maintenance/User &
Preferences/System Preferences", this icon is displayed on a graphic when a door is open.
Reader

Monitor Point. If Monitor Point Status on Graphics is selected in the "Maintenance/User &
Preferences/System Preferences" screen, this icon is displayed on a graphic when a monitor point is not
in alarm.
Monitor Point. If Monitor Point Status on Graphics is selected in the "Maintenance/User &
Preferences/System Preferences" screen, this icon is displayed on a graphic when a monitor point is in
alarm.
Auxiliary Output, such as an auxiliary output from an access-control controller, or an output from an
intrusion panel.
Camera

Camera Group

Reader Group

410
Symmetry Software Reference Manual

CCTV Ancillary Device

Intrusion Zone. For all intrusion systems, the icon border (green, red or blue) indicates whether the
zone is in the alarm state. Other status information (disabled, bypassed, force armed, fault and tamper)
is displayed only for intrusion systems supported by Full Intrusion Management.
Note: The following shows the default border colors; the colors can be changed in the
"Install/Intrusion/Intrusion/Status Color Configuration" screen. Please refer to the
"Install/Intrusion/Intrusion/Status Color Configuration" screen for details of all possible border colors and
their meaning. The border may also be set up to flash, depending on the state.
Enabled (click here for details). The small indicator is blue when the zone is enabled (not
bypassed or disabled).
Disabled (click here for details). The small indicator is green and the icon is grayed out.

Bypassed. The small indicator is green and the icon is grayed out, with a large cross.

Force Armed (click here for details).

Zone is normal (icon not selected).

Zone has unacknowledged alarm (solid, default red border). Double-clicking the icon
enables you to acknowledge and clear the alarm.
Zone has an acknowledged alarm, but the detector is still activated (solid blue
border).
Zone has acknowledged alarm that is not cleared (solid green border when the icon is
not selected).
Dashed border - This indicates that the zone has Fault or Tamper condition. Click here
for details. The color depends on the acknowledged/cleared status (as above).
Corners highlighted - This indicates that the zone has a Tamper condition. Click here for
details. The color depends on the acknowledged/cleared status (as above).
Intrusion Area or Zone Group. Double-clicking the icon displays an associated graphic, if configured in
the "Install/Intrusion/Intrusion/Device Configuration" or "Setup/Device Groups/Intrusion Areas" screen, as
appropriate. By default, the border of the icon is red when there is an unacknowledged alarm in the
"Home/Monitoring/Alarms" screen (click theAcknowledgebutton in the "Home/Monitoring/Graphics"
screen to acknowledge the alarm.
The color of the background indicates its status (available only for M2150 intrusion systems and intrusion
systems supported by Full Intrusion Management).
Note: The background and border colors are configured in the "Install/Intrusion/Intrusion/Status Color
Configuration" screen. Please refer to this screen for the color meanings, as the colors used vary
between intrusion systems. The border may also be set up to flash, depending on the state.
Intrusion Panel (available only for Galaxy and intrusion systems supported by Full Intrusion
Management).
Intrusion Transaction. This icon is used to display the status of an intrusion transaction alarm, as set up
in the "Install/Intrusion/Intrusion/Device Configuration" screen.
Intercom Call Station. The following border colors have special meaning:
 Pale blue (icon flashing) - Call request received from intercom.
 Orange (icon flashing) - Successful connection to intercom.
 Olive (icon flashing) - Waiting to connect to intercom (for example, handset needs to be

411
Introduction to Serial Messages and Devices

picked up).
Monitor Point Group

Floor Group

Auxiliary Output Group

Serial Device.
An icon is available for any port set up for serial messages in the "Install/System/Serial Devices/Port
Settings" screen. Users can right-click the icon in the "Home/Monitoring/Graphics" screen and choose a
command to send to the device.
Predefined Commands
To send a predefined command from the "Home/Monitoring/Graphics" screen, right-click on the
predefined commands icon and choose Send Command (or double-click). If you double-click, the icon
border flashes once (in red) to confirm the command has been sent. You can add more than one of the
same predefined command to a graphic in the "Setup/Graphics/Setup" screen.
Threat Level.
Changes the threat level to that shown in the tooltip.
Elevator Floor

Host Access Request for Card


Generated if a card is presented when the card has a usage limit (as specified using Usage Remaining in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen), and the Node Supports Card Usage Remaining
option is set in the "Install/Access Control/Node" screen. The message indicates that the node is waiting for a
decision from the Symmetry software as to whether or not the usage limit has been reached.

Integrated System Activity


If a Symmetry camera license is installed, you can select the makes/models of Digital Video Recorders to include in
the report.
If the ASSA ABLOY DSR Lock license is installed, you can select Assa Abloy DSR to include alarms and events
from ASSA ABLOY locks and the DSR.

Introduction to Serial Messages and Devices

Introduction
Serial messages are used to provide an interface between Symmetry and any other device that accepts ASCII-
based text messages. The interface could, for example, be used to set or unset a third-party system.
Each text message can include up to 200 characters and can be sent to the external device via a manual,
scheduled or trigger command. If required, manual commands can be sent from the "Home/Monitoring/Graphics"
screen.
The external device can be connected to a Symmetry client PC, or to a serial port of a Symmetry node (controller).

Intrusion Systems
DMP XR200 and DSC PC4020 intrusion systems allow the Symmetry software to download commands containing
user-definable messages. The commands can, for example, be sent as Symmetry manual, scheduled or trigger
commands. The messages are definable in a text format and could be used to perform actions such as arming and

412
Symmetry Software Reference Manual

disarming areas or displaying messages at keypads. The commands are sent to the intrusion system via the same
serial or network link used to transfer transactions from the intrusion system to the Symmetry software.

Setting up the System


Note: If you are interfacing to an intrusion system, please refer to the Intrusion Management Installation and User
Guide instead of the following.

Use the following procedure to set up the system for serial messages.
1. If the external device is to be connected to the serial port of a Symmetry client PC, set up a "Serial Device"
port definition in the "Install/System/Client Ports" screen.
2. Use the "Install/System/Serial Devices/Messages" screen to specify the text message(s) that are to be sent
to the external device.
3. Use the "Install/System/Serial Devices/Port Settings" screen to name the serial device and set up the port
that it is connected to - this may be a serial port of a Symmetry client PC (as specified in step 1), or the
serial port of an RS232/NIC module in a node.

Note: If you choose a node in the "Install/System/Serial Devices/Port Settings" screen, fallback dial-up
communications is not available if the node is equipped with only one serial port.

4. Send the serial messages to the device by issuing manual commands (for example, from the
"Home/Monitoring/Command Center" screen or from graphics), or by setting up scheduled or trigger commands
("Operation/Commands/Scheduled" or "Operation/Commands/Trigger").

Note: If the external equipment is connected to a node, scheduled or trigger commands are supported
only for multiNODE-2 SMD, M2100 and M2150 nodes.

Intrusion Areas Report

General
Overview of this screen
You can generate an Intrusion Areas report by selecting the Report button in the "Setup/Device
Groups/Intrusion Areas" screen.
The report displays all alarms, events, changes and commands that have affected the selected area between
specified dates.

About the Options


Date and Time
Filter Each Day to Include
Options:
Source
Destination
Run
Close

413
Intrusion Status Toolbar

Intrusion Status Toolbar


This provides status information about M2150 intrusion systems or those supported by the Full Intrusion
Management interface. The toolbar can be displayed by selecting Show Toolbar in the "Maintenance/User &
Preferences/Accounts" screen.
The icons on the toolbar have the following meaning.

Note: Clicking any button except Acknowledge Alarms opens the "Home/Monitoring/Command Center" screen,
with only the relevant objects displayed according to the button clicked.

Acknowledge Alarm - Total number of unacknowledged alarms (from any source), excluding masked and
task alarms. The background is red when there is at least one unacknowledged alarm. Clicking the button
displays the "Home/Monitoring/Alarms" screen.
Area Alarms - Total number of areas that are currently in an alarm. An area alarm is counted only if the
area is armed.
All Problems - Total number of alarm, tamper, fault, panel offline, zone group with problem and area with
problem conditions.
Areas Armed - Total number of areas that are currently armed.

Areas Security Reduced - Indicates the number of armed areas with security reduced (click here for
details).
Areas Disarmed - Total number of areas that are currently disarmed.

Zone Alarms - Total number of zones that are currently in an alarm condition.

Zone Tampers - Total number of zones in a tamper condition (click here for details).

Zone Faults - Total number of zones that are currently in a fault or tamper condition.

Zones Disabled - Total number of zones that are currently disabled (click here for details).

Zones Bypassed - Total number of zones that are currently bypassed.

Zones Force Armed - Total number of zones that have been force armed by the intrusion system (click
here for details).

License Activation
This screen is displayed if the Symmetry client license has not been activated. The screen allows you to activate
the software.
To activate the software:
1. Enter the Serial Number of the license, as provided on the Software License Certificate. A Registration
Key is displayed when you have entered a valid serial number.
2. Obtain an activation code in one of the following ways:

414
Symmetry Software Reference Manual

 Automatically over the internet by selecting Activate your license via the Internet. Note: A
license can be activated online up to three times before needing to be reset by Customer
Support.
 By clicking the link. You will be prompted to log in and register your details. The login
username and password are provided on the Software License Certificate. You will need the
Serial Number and Registration Key displayed near the top of the dialog.
 By phone using one of the numbers displayed.
When you have the activation code, write it down in the space provided on the Software License
Certificate.
3. Click OK.

License Screen ("Maintenance/Licensing/System Licenses")


Click the link in the dialog, or call the telephone number. You will be asked for the serial number and registration
key. In return, an activation code will be given to you. Enter the activation code in the space provided, then click
OK.

Lock-Out Mode
Lock-out mode is available if M2150 intrusion nodes are being used.
Lock-out mode locks selected configuration data at a specified node, and prevents the node from accepting any
changes to that data in the Symmetry software, although the changes remain in the database. For example, you
can use lock-out mode to prevent a node from accepting any new card holders, or changes to existing card holders.
You may want to prevent configuration changes for security reasons.
You can choose the types of configuration changes to lock using the Lock Out button in the "Install/Access
Control/Node" screen.
The node generates a "Command Rejected - Node Locked Out" alarm/event message if a change to locked data is
attempted.

Actioning Lock-Out Mode


A lock of the selected data is actioned only by sending a Lock Out Node command from the
"Home/Monitoring/Command Center" screen or by selecting the New Lockout option at an M2150 intrusion reader
connected to the node.
The command is available in the Command Center only if Allow Node Lock Out Command is selected in your
user role ("Maintenance/User & Preferences/Roles" screen).
When you action lock-out mode:
 You are prompted to specify a Lock Out Code, which you must specify when you want to switch off
lock-out mode. For security reasons, this code is stored only in the node.
 You cannot make further changes to the set of data that is locked in the node definition. "Locked
Out" is displayed next to the Lock Out button.

Switching Off Lock-Out Mode


You can switch off lock-out mode only by using the Enter Lockout option at an intrusion reader connected to the
node. When prompted, specify the lock-out code.

415
Lucent and Avaya Data Import Screen ("Operation/Data/Data Import")

Lucent and Avaya Data Import Screen ("Operation/Data/Data


Import")

General
Overview of Lucent\Avaya Import
This Data Import option enables data held in a Lucent\Avaya database to be imported into Symmetry's
database. The remote database on the Lucent\Avaya server holds the details of all card holders and
modifications to the details of existing card holders.
The import process makes a dial-up connection to the remote Lucent\Avaya database, then downloads the
required information to a Microsoft SQL Server import database. The import database is the standard
"gateway" for data import into Symmetry. Symmetry then imports the data from the import database and
creates or modifies the card holder records as appropriate.
You do not need to start dial-up networking yourself; the Data Import process does it for you automatically. You
may find it useful to display the Dial-Up Networking Monitor (from the Control Panel) while communications are
taking place.

Note: The import process can overwrite existing card-holder records in Symmetry. This occurs if the card
number of a card being imported already exists for the selected company in Symmetry.

Field Mapping
The following table shows how fields in the Lucent\Avaya database map to fields in Symmetry:

Lucent\Avaya Field Meaning Security


Name Management
System Field Name
LASTNAME + ' ' + Individual's last name, plus Last Name
SUFFIX suffix for last name (for
example, 'JR' for Junior).
FIRSTNAME + ' ' + Individual's last name plus First Name
MIDDLENAME middle initial or name.
PROXCARDNUMBER The proximity card number. Card Number (Note
1)
HRID HRID number of employee. Employee Reference
LOCATIONCODE01 Employee's location code 1. Personal Data Field 1
LOCATIONCODE02 Employee's location code 2. Personal Data Field 2
LOCATIONCODE03 Employee's location code 3. Personal Data Field 3
ACCESSSTATUS G = Granted; D = Denied (see Personal Data Field 4
Note 1).
REASONISSUED Reason for new card (for Personal Data Field 5
example, 'LOST', etc.)
IDTYPE Badge type. Personal Data Field 6
CS = Consultant.
CT = Contractor.
E = Employee.
R = Resident.

416
Symmetry Software Reference Manual

MODIFYDATE Date that the data record was Personal Data Field 7
last modified.
CREATEDATE Date that the data record was Personal Data Field 8
created.
STATUS Current employee status. A = Personal Data Field 9
Active. I = Inactive (see Note
2).
TRANSACTIONTYPE Transaction type (see Note 3). Personal Data Field
10
Note 1: If an Immediate All Cards import is started and the ACCESSSTATUS is "D" (Denied), the selected
reader group and time code are NOT given to the card holder.
Note 2: This automatically sets/unsets the Active/Inactive status in the "Home/Identity/Card Holders" screen.
Note 3: The transaction type codes that can be displayed in Personal Data Field 10 are:
 INSERT - New personnel record inserted.
 MODADD - Location code modified.
 MODIFY - Some change was made to the personnel record, other than a location code.

Screen Options
DBase
Company
Facility/Customer Code
Reader Group
Time Code
Select Region for Employees
Include Executives
Include Contractors By Location Code
Immediate All Changes
Timed All Changes
Immediate All Cards
Start/End Date
OK
Cancel

Masking Alarms
Introduction
The "Home/Monitoring/Alarms" and "Acknowledge Alarms" screens contain a Mask button, which allows you to
mask a selected alarm for a specified length of time. Masking an alarm removes it from the All Alarms tab and
from any filter tabs, and moves it to the Masked Alarms tab. Masked alarms are also not displayed in the
"Home/Video & Audio/Virtual Matrix" screen.
Masking an alarm can be useful if, for example, you want to remove from view an alarm that cannot be cleared.
This can occur if a device is faulty and cannot be reset to its normal state.
Masking an alarm does not affect its status, as indicated by the red/green/blue color.
Masked alarms can be opened, acknowledged and cleared in the same way as unmasked alarms. Masked
alarms are included in activity reports, but are not included in the total number of unacknowledged alarms.
Alarm forwarding, as set up in the "Operation/Alarms/Routing" screen is disabled for masked alarms.
Masked alarms are not displayed in graphics.
The person who masked an alarm can be determined from the comments information in the alarm details.

417
Muster Reset

Privileges required
The Masked Alarms tab is displayed only if you have the Show Masked Alarms privilege in the
"Maintenance/User & Preferences/Roles" screen.
The Allow Alarm Masking privilege is required to mask an alarm.
How to mask an alarm or clear the mask
You can mask an alarm by selecting an alarm in the All Alarms tab or in a filter tab and clicking Mask.
Alternatively, click Mask after opening an alarm that has not already been masked.
A Clear Mask button is available in the Masked Alarms tab or after opening a masked alarm. This button clears
the mask and returns the alarm to the All Alarms tab.
About the Mask Alarm dialog
Selecting Mask displays a dialog that allows you to specify:
 The duration of the mask. The alarm returns to the All Alarms tab when the specified period expires.
 The Username and Password of a second user. These are enabled if Alarm masking requires
second user is selected in the "Maintenance/User & Preferences/System Preferences" screen. If
switched on, this feature requires both the logged-in user and another user to authorize an alarm
mask.
Note: Both the logged-in user and second user require the Allow Alarm Masking privilege set in the
"Maintenance/User & Preferences/Roles" screen.

Muster Reset
This dialog is displayed if you have clicked Reset in the "Home/Identity/Muster" screen, there are still people in the
area, and the Allow selected Cards from Muster Area during Muster Reset checkbox is selected in the muster
definition. The dialog lists everyone who is still in the area, and their card number.
The dialog allows you to select people to remove from the muster. If you reset the muster and re-run it immediately,
any person you have chosen to remove will not be included in the new muster report (unless they have re-entered
the area using a card transaction).
You can use the checkbox in the header to select or deselect everyone listed.
Clicking OK resets the muster.
Clicking Cancel exits the dialog without resetting the muster.

Notes Screen

General
This screen allows you to record or read any notes relating to the screen you are using or the item you are editing.

Note: All options in the Edit menu are available when using the Notes screen.

Click here for further information.

Screen Options
Files Tab
This tab shows the names of any files attached to the note. The tab also contains:
 Add File - Allows you to add a new file to the list.
 Delete File - Allows you to delete a selected file.
 Open File - Opens the selected file.

418
Symmetry Software Reference Manual

Delete File and Open File are grayed out if Allow user to open file attached to notes is deselected in your
user permissions (as set in "Maintenance/User & Preferences/Roles").
Delete
This button deletes the displayed note.
Print
This button prints the displayed note.

Open Screen
Use this screen to open the required file.

Note: This is a standard Windows dialog box. If you need further help, click on the question-mark at the top-
right corner of the dialog, then on the area of interest in the dialog.

Look in - Use this pull-down list and the box in the center of the dialog to navigate to the file you want to open. For
example, if the file is located in C:\Program Data\Security Management System\, you can select the C: from the
Look in pull-down list, then double-click on "Program Files", followed by "Security Management System" to
navigate to the correct folder.
The buttons to the right of theLook inpull-down list enable you to move up one position in the folder hierarchy,
create a new folder and view information in the dialog box as a list or with full details.
File name - You can use this field to type the name of the file you want to open.
List files of type - Select the type of file you want to open.
Open - This opens the selected file.
Cancel - This takes you out of the screen without performing any action.
Open as read-only - Not relevant.

Overview of the Access Rights Tab


Purpose of the Access Rights Tab
You can use the Access Rights tab to view, assign or modify the access rights of the card. Access rights can,
for example, determine the doors or elevator floors that the card owner has access to, and the times that
access is allowed.
If you have accessed the tab from the "Home/Identity/Bulk Card Amendments" screen, you can view, assign or
modify the access rights of a group of selected cards in one operation.

Note: You might not have access to the Access Rights tab, depending on your user permissions, as set up in
the "Maintenance/User & Preferences/Roles" screen.

Normal and Advanced Access Rights


About Normal and Advanced Access Rights
A card's Assigned Access Rights can comprise Normal Rights and Advanced Rights, displayed in a
graphical tree view.
You can expand the normal and advanced rights branches of the tree to view their contents in the normal way.
Normal Rights
Normal rights are the standard access rights assigned to the card owner. The top level of this branch is
always displayed in the tree view.

419
Overview of the Access Rights Tab

Note: If you select a badge design, any access rights assigned to the badge design in the
"Setup/Identity/Badge Designer" screen are automatically shown in the Normal Rights branch of the tree
view. Any changes you make in the Access Rights tab override the access rights defined for the badge
design.

Advanced Rights

Note: When you first select the Access Rights tab, the top level of the advanced rights branch is
displayed only if advanced rights are assigned to the card owner. If no advanced rights are set, select the
Show All button to set up the advanced rights.

Advanced access rights allow you to change the normal access rights over a specified period of dates. For
example, to allow access to a different area of the building during a temporary assignment.
There can be up to 16 advanced access rights. When you add an advanced access right, you specify the
date period over which it is to run. The date ranges may overlap, in which case the access rights are
additive for the duration of the overlap period.
The effect of advanced access rights is dependent on the setting of the Advanced Access Rights
Additive option in the "Maintenance/User & Preferences/System Preferences" screen. If the option is set,
any defined advanced rights add to the normal access rights. If the option is not set, any defined advanced
rights completely override the normal access rights during the date period.
The default titles for advanced rights are Advanced 1 to Advanced 16. You can change these titles using
the "Setup/Configuration/Advanced Access Titles" screen.
Advanced access rights are not normally used to define access rights for holidays, since holiday access
rights are normally defined as part of the time codes ("Operation/Times/Time Codes").
Normal/Advanced Access Right Types
The Normal Rights branch and each of the 16 Advanced Rights branches of the tree view are divided into the
following access right types:
Access Codes
Global Access Codes
Reader Groups
Readers
Floor Groups
Areas
You can expand these to see any access definitions present.
Enabling or Disabling Normal/Advanced Access Rights
You can individually enable or disable the entire Normal Rights section or any of the 16 advanced rights
sections. To do this:
1. In the tree view, select Normal Rights or an advanced access rights section.
2. Select Enable/Disable in the right-click menu.
Whenever you disable an access rights section, its door icon is displayed in red with a black cross, and the
associated contents are shown grayed.
Copying Access Rights to Another Branch of the Tree View
You can copy existing access rights from one branch of the tree view to another compatible branch. For
example, you can copy all the existing normal access rights to an advanced access rights section (you may
want to do this if it's easier to copy and then modify existing access rights, rather than creating the access rights
from scratch).
To copy access rights:
1. In the tree view, select the assigned rights branch to be copied.

420
Symmetry Software Reference Manual

2. Select Copy in the right-click menu.


3. In the tree view, select the destination branch.
Note: the copy/paste operation does not replace any existing rights in this branch.

4. Select Paste in the right-click menu.


The Paste option is not available unless you select a valid destination. For example, if you copy a "Reader
Group" section, you cannot paste it to a "Readers" section.
If you paste advanced rights into the normal rights, an alert is given to remind you that the advanced rights
dates do not apply to normal rights.
Changing Advanced Access Right Date Periods
Advanced access rights are always associated with a date period, during which the rights apply. You can easily
change this period from the tree view as follows:
1. In the tree view, select the required advanced rights title (such as Advanced 1).
2. Select the Dates button or select the Dates option in the right-click menu.
3. Change the dates in the Date Range screen displayed.
Assigning Overlapping Access Rights to a Reader
Symmetry allows different time codes that define access to a reader to overlap. In these cases, Symmetry
sums the access times to the reader.
Example 1:
The access rights are defined as:
"Reader 1 @ Time Code 1" and
"Reader 1 @ Time Code 2".
Time Code 1 is 09:00 to 14:00.
Time Code 2 is 13:00 to 17:00.
Result: Access will be granted from 09:00 to 17:00
Example 2:
The access rights are defined as:
"Reader 1 @ Time Code 1" and
"Reader 1 in Reader Group A @ Time Code 2".
"Reader 1 in Reader Group B @ Time Code 3".
Time Code 1 is 01:00 to 12:00.
Time Code 2 is 06:00 to 07:00.
Time Code 3 is 10:00 to 22:00.
Result: Access will be granted from 01:00 to 22:00
Example 3:
The access rights are defined as:
"Reader 1 @ Time Code 1" and
"Reader 1 @ Time Code 2".
Time Code 1 is 09:00 to 17:00.
Time Code 2 is 11:00 to 13:00.
Result: Access will be granted from 09:00 to 17:00
Assigning Access Rights to Card-Relay Output Groups
You can set up access rights to an output group by right-clicking on the controlling reader. Click here for further
information.

421
Overview of the Access Rights Tab

Disconnected Door Access Rights


About Disconnected Door Access Rights
A Disconnected Door Access Rights section is available if a Disconnected Doors license is installed, as
described in the Disconnected Doors Installation and User Guide.
Selecting Doors allows you to set up access rights to individual SALTO doors.
Selecting Door Groups allows you to set up access rights to a group of doors if zones have been set up in the
SALTO software.

Intrusion System Users Access Rights


About Intrusion System Users
The Intrusion System Users section in the Access Rights tab of the "Home/Identity/Card Holders" screen is
relevant if an Intrusion Management license is installed. The section allows you to define intrusion users, which
are automatically downloaded to the selected intrusion panels when you save the card holder details.

Note:Intrusion System Users is not applicable to M2150 intrusion systems.

Please refer to the Intrusion Management Installation and User Guide for an overview of intrusion management
and step-by-step instructions on how to configure and use the software.

General Features
Assigning Access Rights
You can assign access rights as follows:
1. In the tree view, select the branch required.

Note: Selecting Normal Rights has the same effect as selecting Access Codes in the Normal section.

2. Select the Assign button or select the equivalent option from the right-click menu.
3. Specify the required access rights in the screen displayed.
Removing Access Rights
You can remove an individual access right or any group of rights as follows:
1. Select the individual access right, or the whole rights branch, to be removed. For example: to remove all
reader group access rights, select Reader Groups.
2. Select the Remove button or select the Remove option in the right-click menu.
Color Coding of Icons (e.g. Doors)
Door Icons
The door icons in the tree view are color coded to enable you to see easily which access rights are currently
valid. The meanings are as follows:
 Green door - Access rights assigned and currently active.
 Red door - Access rights assigned but currently inactive.
 Grey door - No access rights assigned.
 Yellow door (displayed only in "Home/Identity/Bulk Card Amendments" screen) - There are existing
access rights for one or more of the selected cards.
For example, if the card owner has normal rights and Advanced 1 rights defined, and the current date is during
the Advanced 1 period, the Assigned Access Rights door is green, the Normal Rights door is red, the
Advanced Rights door is green and the Advanced 1 door is green.

Access Code Icons

422
Symmetry Software Reference Manual

Access code icons (but not the names) are grayed out if they are inactive on the current day. Using the
"Operation/Times/Access Codes screen, an access code can be forced inactive or made inactive on specific
days according to a schedule.
Prerequisites to using the Access Rights Tab
Before defining access rights, make sure that the items necessary to define the required access rights have
been set up. For example:
 Reader Groups ("Setup/Device Groups/Readers")
 Readers ("Install/Access Control/Reader")
 Floor Groups ("Setup/Device Groups//Floors")
 Access Codes ("Operation/Times/Access Codes")
 Time Codes ("Operation/Times/Time Codes")

Overview of Antipassback
Introduction
A user with access to the install options can switch individual readers into antipassback mode. The purpose of
antipassback is to prevent people from passing back a card to a second person to gain entry or exit.
In order for antipassback to be totally effective, it should be used in conjunction with turnstiles. The turnstiles
should be controlled by entry and exit readers to enable the system to know whether each card is in or out of an
antipassback-protected area.

An Antipassback-Protected Area
There are two forms of antipassback: zonal and timed. Timed is easier to set up, but is not quite as secure as
zonal. Timed antipassback is normally used to control antipassback around the periphery of a single area,
whereas zonal antipassback can have nested antipassback areas.

Note: Executive cards (as set in the "Home/Identity/Card Holders" screen) can be excluded from timed and
zonal antipassback rules. Elevator nodes do not support antipassback rules at all.

The following sections provide further information.


Timed Antipassback
The principle of timed antipassback is simple: once a card has been used at a timed antipassback reader, the
card causes an antipassback violation if it is used again at the same or another timed antipassback reader
within a predefined period of time.
The exception to this rule is when the antipassback reader has been defined to be for an exit route. In this case,
the card can be used at any time without causing an alarm or event. This allows for situations where a person
enters an antipassback-protected area, then wishes to exit and re-enter quickly.
You can also use Reset Passback in the Locator tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen to cause the delay period for reuse of the card to be zeroed. Alternatively,

423
Overview of Antipassback

sending a Set All Cards to Neutral command (such as used in the "Home/Monitoring/Command Center" screen)
has the same effect for all cards. Sending a command may be useful if, for example, people have passed
through an exit during a fire drill and the delay is long.
Zonal Antipassback
In the case of zonal antipassback, the building needs to be partitioned into zones. For example, zone 1 may be
the main lobby, zone 2 the computer room, etc.

A Possible Zone Arrangement for Zonal Antipassback


For each reader that is defined as a zonal antipassback reader, you can specify which zone of the building the
card is going from and which zone it is going to. For example, the reader may allow a card to go from zone 1
(which may be in the main lobby) to zone 2 (which may be in the computer room).
The system remembers which zone each card is in and updates this information whenever the card is used at a
zonal antipassback reader. An antipassback alarm or event is generated if the reader's from zone does not
match the card's currently-recorded zone. For example, an alarm or event is generated if the from zone of the
reader is zone 3, but the card is currently recorded as being in zone 1.

Note: Except for an EN-LDBU, the change of zone occurs when the door is opened. For an EN-LDBU, the
change occurs following a successful access-control transaction, even if the door is not opened (due to
limitations in door monitoring).

If a card's currently-recorded zone and the actual zone get out of step, either because of some violation of the
system (for example, a person has previously climbed over a turnstile) or for a legitimate reason (for example, a
person has passed through a fire exit during a fire drill), some means is obviously required to bring the two back
into step. This can be accomplished by using:
 The Reset Passback option from the Locator tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
 By means of a Set All Cards to Neutral command (for example, in the "Home/Monitoring/Command
Center" screen).
Both methods put the card(s) into a "neutral zone", so that the next transaction at an antipassback reader is
always accepted without violation, and the reader's to zone becomes the card's new zone.

Note: Zone 0 is the Symmetry default "neutral" zone. A card can enter or exit the neutral zone without violation.

If zonal antipassback is required, you will need to make sure that readers connect to the appropriate nodes,
nodes are in the appropriate chains and that the chains connect to the appropriate clients. If you do not plan
this carefully, you may not be able to achieve the desired antipassback scheme. Each Symmetry client can
manage up to 16 LAN chains containing zonal antipassback readers.
A factor to consider is that if readers in the same antipassback scheme connect to different database units, it is
important for the Symmetry client that manages communication to the chain to remain switched on, as well as
the server. Symmetry clients manage antipassback messaging within a chain, and the Symmetry server
manages antipassback messaging across chains. A preferable design is to ensure that all readers in the same
scheme are connected to the same database unit, if possible.

424
Symmetry Software Reference Manual

Hard and Soft Antipassback Readers


Each antipassback reader is nominated as either a hard or soft antipassback reader.
A hard antipassback reader logs an antipassback violation as an alarm or event and does not grant access,
whereas a soft antipassback reader logs an alarm or event, but does grant access.
Disabling Antipassback
You can disable and re-enable antipassback checking in an antipassback-protected area by using the
"Setup/Identity/Anti-Passback" screen.
Setting Up Antipassback in Symmetry
For an EN node (which does not require a LAN chain to be set up previously):
1. In the Setup tab of the "Install/Access Control/Node" screen, select the required antipassback option.
2. In the Communications tab of the "Install/Access Control/Node" screen:
1. For timed antipassback, select None for Anti-Passback Mode.
2. For zonal antipassback, select one of the Continuous options in the Connection Type menu, then
either None, Zonal (Global Client) or Zonal (Global System) as appropriate.
3. For each reader connected to the node, open the "Install/Access Control/Reader" screen and configure the
reader-level antipassback settings.
For all other node types:
1. If you are setting up a LAN chain, choose either Zonal (Global Client) or Zonal (Global System), as
appropriate.
2. In the Setup tab of the "Install/Access Control/Node" screen, select Zonal (Local), Zonal (Chain) or
Timed, as appropriate.
3. For each reader connected to the node, open the "Install/Access Control/Reader" screen and configure the
reader-level antipassback settings.
Antipassback Differences Between Node Types
The following table gives differences in the behavior of antipassback between the multiNODE node and later
(for example, multiNODE-2) nodes.

Condition multiNODE multiNODE-2 (or later) EN-LDBU Response


Response Response
Valid Granted access Granted access Granted access
transaction door transaction transaction generated transaction generated
contact is generated when when the door contact when access granted.
opened the door contact opens. Passback Passback time/zone
opens. Passback time/zone updated. updated.
time/zone
updated.
Valid Granted access Door Not Opened Granted access
transaction door transaction transaction generated transaction generated
contact is NOT generated when when the Door unlock when access granted.
opened the door unlock time expires. Passback Passback time/zone
time expires. time/zone NOT updated. updated.
Passback
time/zone NOT
updated.
Anti-passback Granted Access Antipassback 'Soft' Antipassback 'Soft'
'Soft' and transaction generated transaction generated
transaction at Antipassback when the door contact when access granted.
reader. Door 'Soft' opens.

425
Overview of Biometric Hand Templates and HGUs

contact is transactions
opened. generated when
the door contact
opens.

Overview of Biometric Hand Templates and HGUs

Introduction
A biometric hand template number represents a hand print captured by a Hand Geometry Unit (HGU) connected to
a serial port of your client PC. The HGU must connect to the client port as defined in the "Install/System/Client
Ports" screen. When you select the Capture (Biometric Hand Template) button in the Biometrics tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen, the HGU reads the hand print currently presented
to it and uploads this as a template number to the client. The template number is stored with the card details.
The template number is downloaded with the standard card details and access rights to a multiNODE-2000 or
multiNODE-2100 HGU node.
To perform a transaction at an HGU reader, the person must first supply his/her card number, then present the
hand. The card number can be entered at the HGU's keypad or supplied automatically from a separate
20mA/Wiegand companion reader (a standard 20mA/Wiegand reader cannot be used). During the transaction, the
HGU reader compares the HGU template stored in the HGU node with the actual hand print, then returns a score
back to the node. If the score is less than or equal to a specified threshold, the hand print is accepted as valid.
In this case, the HGU reader and optional companion reader connect directly to the node.

Notes for Installers of HGU Nodes


multiNODE-2000 HGU Nodes
An HGU can connect as a reader to any odd-numbered RS485 reader port of a multiNODE-2000 HGU node.
This is set up in the "Install/Access Control/Reader" screen.
If a companion reader is used, it must connect to an even-numbered port of the node and can be used only with
the HGU reader connected to the preceding odd-numbered port. To set up a companion reader, the HGU
reader must be set for Two Readers At One Door mode in the "Install/Access Control/Reader" screen.
The maximum score for a valid hand is specified by Use Reader Acceptance Threshold in the "Install/Access
Control/Reader" screen.
multiNODE-2100 HGU Nodes
If companion readers are not used (that is, the card number is entered through the HGU reader's keypad), an
HGU reader can be connected to each RS485 reader port of the door controller. This means that two HGU
readers can connect to 2DCR and four to a 4DCU, each of which for control of a different door.
For a 2DCR/2DCR-P, an HGU reader installed on the port of an RS485 Module must have a companion reader
defined on the 20mA/Wiegand reader port on the 2DCR/2DCR-P. (Otherwise, the HGU can not have a card
holder assigned to it.) This is classed as a "Composite Assembly".
For a 4DCU/4DCR-P, an HGU reader can be installed on each of the four ports of a Quad RS485 Module
without companion readers. If companion readers are used, up to two HGU readers can be used, connected to
the odd-numbered ports, as shown in the following table.
If HGU Reader Connected to: Companion Reader Connects to:
Port 1 on RS485 Module in the 20mA/Wiegand Port 1 on the
2DCR/2DCR-P 2DCR/2DCR-P
Port 2 on RS485 Module in the 20mA/Wiegand Port 2 on the
2DCR/2DCR-P 2DCR/2DCR-P
Port 1 on RS485 Module in the 20mA/Wiegand Port 2 on the

426
Symmetry Software Reference Manual

4DCU/4DCR-P (see Note 1) 4DCU/4DCR-P


Port 3 on RS485 Module in the 20mA/Wiegand Port 4 on the
4DCU/4DCR-P (see Note 1) 4DCU/4DCR-P
Note 1: When connected to a 4DCU and 4DCR-P, the HGU reader must be set to Two Readers At One Door
in the "Install/Access Control/Reader" screen. Define the HGU reader first, with Two Readers At One Door
selected, then define the companion reader.
You can not install a standard reader that is not a companion reader onto any port of an HGU node.

Overview of CCTV Switching

What is a switcher unit?


Note: CCTV switchers are not supported in this version of Symmetry.

A CCTV switcher unit is a device that the installer can connect to the COM port of a client PC. A switcher unit is
able to accept commands that can switch the picture from any CCTV camera to any monitor or switch on and off
ancillary devices, such as camera lamps, washer pumps and wipers.

Note: When using a Dedicated Micros PC-based switcher, the term "monitor" refers to a cameo segment of the
display. The display is split into 16 cameo segments.

A switcher unit is required by the CCTV and Controls licenses.

What does the installer do?


Besides physically connecting the equipment, to set up the system for CCTV switching, the installer needs to:
1. Install a license for the CCTV software at the server, as described in the Symmetry Software Installation
Manual. This will cause the CCTV Cameras option in the "Home/Video & Audio" menu to be displayed.
2. Add a port for each CCTV switcher in the "Install/System/Client Ports" screen.
3. Define each CCTV switcher in the "Install/Video & Audio/CCTV/Switcher" screen.
4. Define each camera, monitor and ancillary device using the screens in "Install/Video & Audio/CCTV".

What can a user do using the CCTV license?


A user can:
 Send a command that causes the switcher to route the picture from any camera to any monitor or
switch an ancillary device on or off. Scheduled and trigger commands can be set up to automate
this process. The commands can be sent from any Symmetry client.
 Use the "Home/Video & Audio/CCTV Cameras" screen to
a) Control any camera's pan, tilt, zoom and focus (camera type permitting).
b) Display the live pictures from the camera on a selected monitor.
c) Switch ancillary devices.
If the installer has made a physical connection between a monitor and the PC, the "Home/Video &
Audio/CCTV Cameras" screen also displays the pictures from that monitor.
 Use the "Home/Monitoring/Graphics" screen to switch a camera to a monitor and to switch ancillary
devices.
 Set up an Activate Alarm trigger command for any camera.

427
Overview of Dial-Out/In Alarms Reporting

 Use the Acknowledge Alarms screen to switch a CCTV camera to a monitor, as set up in the
"Operation/Alarms/Commands" screen. The camera/monitor can vary, depending on the device
that is in alarm.

What can a user do using the Controls license?


A user can use all of the options provided by the CCTV license, plus others.
Overview of the Controls option

Overview of Dial-Out/In Alarms Reporting

Introduction
Dial-out/dial-in alarms reporting enables alarms detected by Symmetry to be copied to another totally independent
Symmetry system. All alarms routed to a nominated dial-out client (as set up by the installer) are automatically
copied to the alarms-receiving (dial-in) site. The alarms continue to be displayed at the dial-out site in the normal
way. No event messages are transmitted.
You may want to use dial-out alarms reporting if, for example, a client PC is unmanned outside of normal office
hours and you want alarms generated at these times to be copied to a central manned system located elsewhere.
It is important to realize that dial-out alarms reporting is not the same as alarms routing, which enables alarms to be
routed to different clients within the same networked system.
The alarm messages copied to the alarms-receiving (dial-in) site are the same as those displayed at the local (dial-
out) site. However, the alarm instructions (as displayed when acknowledging an alarm) can be different. The
"Operation/Alarms/Definitions" screen enables instructions to be set up for both locally-displayed alarms and alarms
displayed at the alarms-receiving site.
When a user of Symmetry views a copied alarm at the alarms-receiving site, it is not possible for the user to:
 Use the Graphic option in the "Home/Monitoring/Alarms" or "Home/Video & Audio/Virtual Matrix"
screen.
 The Command button in the Acknowledge Alarm screen. The user can clear the alarm in the
Acknowledge Alarm screen, but this has no effect on the status of the alarm at the dial-out site.
Alarms do not have to be reset at the dial-out site before they can be cleared in the Alarms screen at the dial-in site.

Setting Up Dial-Out/Dial-in Alarms Reporting


At the dial-out site you must:
 Use "Install/System/Client Ports" to specify the client and port that is to be used to send alarms to
the alarms-receiving site. This client is known as the dial-out client and requires a modem.
 Use "Install/Access Control/Chains/Dial-Out Alarm" to set up the dial-out site (such as the telephone
number to dial, etc.).
Note: Only one Dial-Out Alarms record is allowed per system.

 Use "Operation/Alarms/Routing" to ensure that alarms are routed to the dial-out client at the
appropriate times.
At the alarms-receiving (dial-in) site, you need to:
 Use "Install/System/Client Ports" to specify the client that is to be used to receive alarms. This client
also requires a modem.
 Use "Install/Access Control/Chains/Dial-In Alarm" to set up the alarms-receiving site (such as the
password required for the dial-out site to log in, etc.).

428
Symmetry Software Reference Manual

Overview of Fingerprint Readers

About Fingerprint Readers


A fingerprint reader consists of a device that reads a fingerprint, which can be used to verify identity at access-
controlled doors or during a secure logon to Symmetry. Suprema BioLite N2, Bioscrypt and S81x fingerprint readers
are supported.
Note: An installer must configure all Bioscrypt fingerprint readers using the "Install/System/Client Ports" screen
before they can be used. This applies to enrollment readers used to capture new fingerprints, and readers that will
be connected to nodes for access control. Please refer to the "Install/System/Client Ports" help for further
information.
Note: If Suprema readers are being used, please refer to the Third-Party Access Devices Configuration and User
Guide for additional information, including details about how to configure the readers, set up Symmetry and capture
fingerprints.

Capturing Fingerprints
Before a person can gain entry through doors controlled by fingerprint readers or use the reader for secure logons,
his/her fingerprint(s) must be captured using a fingerprint enrollment reader. When a fingerprint is required for
access-control, it is captured using the Biometrics tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. When a fingerprint is required for secure logons (not available for Suprema
readers), it is captured using the Capture button in the "Maintenance/User & Preferences/Accounts" screen.
Suprema enrollment readers are network-attached. S81x and Bioscrypt enrollment readers connect to a serial port
of your client PC. The enrollment reader is defined in the "Install/System/Client Ports" screen.
If you are capturing fingerprints for access control and you are using Suprema or S81x fingerprint readers, up to two
fingerprints can be enrolled per person.
For S81x enrollment readers, the fingerprint data is stored with in the Symmetry database. For Suprema readers,
Store Fingerprints in Symmetry in the "Maintenance/User & Preferences/System Preferences" screen determines
whether or not fingerprint data is stored in Symmetry.

Using Fingerprint Readers for Access Control


Encoding Smart Cards
Fingerprint data captured for access-control purposes must be encoded onto a smart card. You can encode the
fingerprint data and card number onto a smart card using the Encode button in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen. If you are using an S81x enrollment reader, you can also encode
the card using the Encode button displayed in the Fingerprint Enrollment dialog, which is displayed when you
choose Capture in the Biometrics tab of the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Encoding Smart Cards for Dual Fingerprint and non-Fingerprint Readers
It is allowable to use the same smart card for access control at both fingerprint readers and at standard smart
card readers. If you encode a smart card with fingerprint data, you can use the card at both fingerprint and non-
fingerprint readers. Similarly, if you encode the card with no fingerprint data, you can use it at non-fingerprint
readers and at fingerprint readers not in fingerprint mode.
If you are using Bioscrypt fingerprint readers, you must encode the card twice if you want to be able to use the
card at both fingerprint and standard (non-fingerprint) smart card readers. The first time you encode the card,
you must make sure you select the Smart CardEncoder option in the Encoder Type menu, with an
appropriate (for example, GemPlus) encoder connected. The second time you encode the card, select
Bioscrypt Enrollment Reader with a Bioscrypt encoder connected.
Gaining Access
Fingerprint readers used for access control connect to a node in the normal way. To gain access through a
door controlled by a fingerprint reader, the card owner presents his/her card and fingerprint(s) to the reader,
which then compares the fingerprint(s) stored on the card with the fingerprint(s) presented to the reader. The
reader also compares the card record stored on the card (which includes the card numberand customer code)

429
Overview of Floor Groups

with the card record stored in the node. If both sets of data match, the node determines whether or not to grant
access, based on the person's stored access rights.
S81x Acceptance Threshold
Click here for details.
S81x Reader Modes
S81x fingerprint readers can be placed in single-fingerprint mode, two-fingerprint mode (where two fingerprints
are required to gain access) or no-fingerprint mode (in which case, the reader acts as a normal contactless
smart card reader).
The fingerprint mode is set up in the "Install/Access Control/Reader" screen, and can be changed from manual,
scheduled or trigger commands.
S81x fingerprint readers can also be set up in the "Install/Access Control/Reader" screen to accept "duress"
access-control transactions. Click here for details.

Using Fingerprint Reader for Secure Logons


S81x and Bioscrypt enrollment readers can be used for secure logons. To perform a secure logon, the user of
Symmetry presents a fingerprint to the reader, which then compares it with the fingerprint stored in the User
Accounts screen. If the two match, the logon is allowed.
The fingerprint reader must be connected to the client PC that is used for secure logons. The serial port that the
reader connects to must be defined in the "Install/System/Client Ports" screen. In addition, Enable Secure Logon
must be selected in the "Maintenance/User & Preferences/Accounts" screen.
Note that secure logons can be performed by presenting a just smart card rather than a fingerprint (a different smart
card reader must be used for this; a fingerprint reader cannot be used for secure logons simply by presenting a
card). The method to be used is defined in the "Maintenance/User & Preferences/Accounts" screen.
A user who has System Admin privileges (as specified in the "Maintenance/User & Preferences/Roles" screen)
cannot use the secure logon option.

Overview of Floor Groups


A floor group is a group of one or more elevator floors (auxiliary outputs on an elevator node). Floor groups are
used when defining access rights (such as in the "Home/Identity/Card Holders" screen) to specify the floors that a
person has access to when he/she makes a transaction at an elevator reader. For example, assume that the floor
group is as follows:
Associated Reader = West Elevator
Floors in this Group = Ground Floor, First Floor, Third Floor.
Any person who has this floor group in his/her access rights will have access to the Ground Floor, First Floor and
Third Floor when he/she makes an access-control transaction at the West Elevator reader.
The installer needs to set up an auxiliary output definition for each floor. Each auxiliary output corresponds to a floor
relay in the elevator node. After a valid access-control transaction, the elevator node de-energizes the relays for
those floors in the card's access rights. When the card owner presses a floor button associated with one of these
floor relays, he/she is delivered to the appropriate floor. For further information, refer to the details of connecting the
relays in the appropriate elevator node installation instructions.

To Set Up Access Rights Involving Floor Groups


1. In the "Setup/Device Groups/Floors" screen:
a) Select the elevator reader(s).
b) Include one or more of the elevator floors in the group.
Create more floor groups, if required.
If there is a need for cards from more than one company to be able to have access to the same floor, a
shared floor group will need to be created by the company that owns the floor.

430
Symmetry Software Reference Manual

2. In the access rights (for example, via "Home/Identity/Card Holders"), select the floor group and a time code.

Note: The Permissions button may have been used when defining a floor group to prevent you from
accessing it.

Overview of Multi-User Commend Control Systems

Introduction
A Commend Controls system can be used with an Ernitec CCTV switcher, which can have separate master and
slave units. If such a system is being used, the master and each slave can each be connected to a different
Symmetry client PC. Although it is possible simply to connect only the master to a client PC (with communications
to slaves all going through the master), connecting each slave directly to a separate PC enables different people to
use the "Home/Monitoring/Controls" screen to independently monitor different areas of a site. The following diagram
illustrates the system architecture for a simple system that contains just one slave unit.

In this example, PC1 could be used to monitor "Control (Access) Point 1", and PC2 could be used to monitor
"Control (Access) Point 2".
Notice that both PCs connect to the "Monitor 1" and serial inputs at each switcher unit.
Remember that the Monitor 1 input to a PC provides the picture in the "Home/Monitoring/Controls" screen. This
picture is from the CCTV camera at the control point currently being monitored in the "Home/Monitoring/Controls"
screen.

431
Overview of Multi-User Commend Control Systems

CCTV Switcher Definitions


For each master and slave switcher connected to a separate COM port (client), you need to set up:
 A port definition ("Install/System/Client Ports").
 A CCTV switcher definition ("Install/Video & Audio/CCTV/Switcher").

Control Centers
A control center is a collection of one or more control groups. You can set up control centers in the
"Operation/Controls/Control Centers" screen.
When you open the "Home/Monitoring/Controls" screen, you select the control center to monitor. This then
determines the control groups that are being monitored, and hence the control (access) points.
To implement the system shown in the diagram above, where PC1 is to monitor "Control (Access) Point 1", and
PC2 is to monitor "Control (Access) Point 2", you would need to set up:
 A control center consisting of one control group, which contains "Control (Access) Point 1". You
would choose this control center in the "Home/Monitoring/Controls" screen at PC1.
 Another control center consisting of one control group, which contains "Control (Access) Point 2".
You would choose this control center in the "Home/Monitoring/Controls" screen at PC2.

Centralized Monitoring from the "Master" PC


Control centers enable centralized monitoring of control (access) points from the PC connected to the master unit.
Centralized monitoring may be appropriate during, for example, out-of-office periods.
For example, PC1 could be used to monitor both of the control (access) points shown in the above diagram during
the night. This is achieved by setting up a third control center, which would be selected in the
"Home/Monitoring/Controls" screen by the user at the appropriate time. This control center would need to contain:
 The existing control group that contains "Control (Access) Point 1".
 A new control group that contains a new control (access) point; for example, "Control (Access) Point
3". This is a copy of "Control (Access) Point 2", with a change to the camera number, as described
next.

Camera Definitions
To implement the control system shown in the previous diagram, you would need to set up the following camera
definitions ("Install/Video & Audio/CCTV/Camera"):
 "Control (Access) Point 1" camera - specify the master switcher unit and a camera number in the
range 0001-0032.
 "Control (Access) Point 2" camera - specify the slave switcher unit and a camera number in the
range 0001-0032.
 "Control (Access) Point 3" camera (for centralized monitoring) - specify the master switcher unit and
a camera number in the range 1001-8032, which allows the image from the CCTV camera
connected to the slave to be viewed on the PC connected to the master. For example:
1001: For camera 1 on slave unit 1.
1008: For camera 8 on slave unit 1.
2001: For camera 1 on slave unit 2.
3002: For camera 2 on slave unit 3.
When using the "Home/Monitoring/Controls" screen at a PC connected to a slave, it is not possible to view images
from CCTV cameras connected to a different slave or to the master unit.

432
Symmetry Software Reference Manual

Overview of Output Groups and Card-Relay Nodes

Output Groups
Overview of Output Groups
An output group is a group of one or more auxiliary outputs connected to a Card Relays node. Output groups
are used when defining access rights to specify the auxiliary outputs to enable when the card owner is granted
access from the card-relay reader (as nominated by the installer). For example, assume that the output group is
as follows:
Associated Reader = Main Exit
Outputs in this Group = Lamp 1, Lamp 2.
Anyone who has this output group in his/her access rights will cause Lamp 1 and Lamp 2 to operate when
granted access at the Main Exit (as well as causing the door release to operate in the normal way). The
auxiliary outputs are deactivated when the door is relocked.
Each of these auxiliary outputs can still be controlled by commands, but you should realize that the auxiliary
output could be deactivated when the door relocks following a card transaction.
Setting Up Access Rights Involving Output Groups
1. Create an output group using the "Setup/Device Groups/Floors" screen:
a) Select the reader that is to activate the auxiliary outputs. (See "The Controlling Reader" below.)
b) Select all the auxiliary outputs that the reader is to activate.
2. In the access rights (for example, "Home/Identity/Card Holders"), add the reader that is to activate the
auxiliary outputs. Choose an appropriate time code with the reader.
3. Right-click on the reader in the access rights, selectAssign Relay Output Group, and choose the
output group.

Note:If there is a need for cards from more than one company to activate the same auxiliary outputs on a Card
Relays node, you will need to switch offCard Holders by Company in the "Maintenance/User &
Preferences/System Preferences" screen, set the currently-selected company to the company that owns the
card-relay reader and auxiliary outputs, then include the reader and output group in the access rights of the
relevant people.
Note: If you are using the Installer help, information is included about how to set up the system for card-relay
nodes. Refer to "Card-relay nodes" in the index.
Note:ThePermissions button may have been used when defining an output group to prevent you from
accessing it.

Card-Relay Nodes
Purpose of Card-Relay Nodes
A card-relay node has all of the features of a standard multiNODE-2 or multiNODE-2000, but in addition, some
or all of its auxiliary outputs can also be activated automatically when a card is granted access from a specified
reader (as nominated by the installer). The auxiliary outputs are deactivated when the door is relocked.
This functionality does not affect any of the node's other standard operations; all readers (including the reader
that is used to activate the auxiliary outputs) are available for normal access-control transactions, monitor
points behave normally, the auxiliary outputs can be controlled by commands, and so on.
(When activating an auxiliary output with a command, you should realize that the auxiliary output can be
deactivated when the door relocks following a card transaction.)

433
Overview of Setting Up a Commend Control System

The Controlling Reader


The reader that is used to activate the node's auxiliary outputs is specified in the "Install/Access
Control/Reader" screen using the Card Relays Reader option. This option is available when you select the
Multinode-2 Card Relays or multiNODE-2000 Card Relays Mode node type.
The Auxiliary Outputs Activated
The auxiliary outputs activated by the card transaction are specified within the card's access rights using output
groups. An output group is a collection of one or more auxiliary outputs and is defined by using the
"Setup/Device Groups/Floors"screen.
Procedure for installing and setting up card-relay nodes
Installing and setting up a card-relay node:
1. In "Install/Access Control/Node", define the node type to be Multinode-2 Card Relays or multiNODE-2000
Card Relays Mode.
2. In "Install/Access Control/Reader", define the reader. In the Modes tab, set Card Relays Reader. This is
the reader from which the auxiliary outputs will be activated.
3. In "Install/Access Control/Auxiliary Output", define the auxiliary outputs.

Note: It is normal, but not mandatory, to assign all of the auxiliary outputs to the same company as the
reader.

Overview of Setting Up a Commend Control System

Control Points and Control Groups


The Commend Controls license (available only for Securimaster systems) enables a guard to use the
"Home/Monitoring/Controls" screen to operate equipment at "control points" around the site. A control point is one
of the following:
 An "access point" to the site (such as a vehicular or public entrance).
 An "output point" - A location where equipment such as lights need to be switched on or off.
Both types of control point are set up using the "Operation/Controls/Control Points" screen.
In a typical application, the guard would use the "Home/Monitoring/Controls" screen to answer an incoming
intercom call from a person at an access point, verify the person's identity using an intercom link and CCTV
camera, then open/close a barrier, operate a traffic light or allow access through a door, as appropriate. The
incoming call could be started by the caller pressing a button at the remote intercom, or by driving over a sensor in
the road.
All of the controls necessary for the guard to operate this equipment are defined in the control point definition.
Each control point must belong to a control group, which can be set up using the "Operation/Controls/Control
Groups" screen.

Note: The Controls license also gives access to all CCTV features.

Output Relays and Status Inputs


The system controls traffic lights, barriers and other devices by energizing or de-energizing "output relays". An
output relay can be one of the following:
 An ancillary output relay on a CCTV switcher unit.
 An auxiliary output relay on a Symmetry node.
 An output relay (control output) on an I/O controller of the Commend Intercom System.

434
Symmetry Software Reference Manual

The control systems of some types of traffic light, barrier (or alternative device) and output point include sensors to
indicate the current status of the device (such as whether the red or green light is lit for a traffic light). These status
signals can be monitored by one of the following "status inputs":
 A monitor point input on a Symmetry node.
 A control input on an I/O controller of the Commend Intercom System.
Each input is actually a pair of contacts that are shorted or open-circuited by the sensor to indicate the status of the
device.
The number and type of output relays and status inputs required is different for barriers, traffic lights and output
points, as described in the following sections.

Note: Each control point can use inputs and relay outputs from only one type of source: from the switcher unit,
from access-control nodes or from the Commend Intercom System.

Equipment Used
The following diagram illustrates the equipment that can be used.

Client PC
This is a client at which the guard can use the "Home/Monitoring/Controls" screen. The client connects to the
Commend system via an RS232 link. A video link connects directly from the Commend system to the client.
If the Commend system uses one or more Ernitec slave units, it is possible to connect the master unit and each
slave unit to a different PC. This enables the "Home/Monitoring/Controls" screen to be used at multiple PCs,
each to control a different area of the site.
Click here for further information about using a multiple-PC/user system.

435
Overview of Setting Up a Commend Control System

Intercom
Each access point can have an intercom defined. This enables the guard to use a "master" intercom to
communicate with the person at the access point.
Commend Intercom System
The Commend Intercom System controls intercom usage and can be used to provide relay outputs and status
inputs. The Commend Intercom System connects to one of the client's COM ports.
Access-Control Node
This can be used to provide relay outputs and status inputs.
CCTV Cameras
If required, each access point can have a CCTV camera to provide the guard with a view of the access point.
The CCTV cameras connect to the CCTV switcher unit.
CCTV Switcher
The CCTV switcher routes the image from each CCTV camera to the monitors. The switcher connects to one of
the client's COM ports.
Currently, an Ernitec CCTV switcher must be used for the Controls license.
CCTV Monitors
These display the images from the CCTV cameras. Three monitor outputs from the CCTV switcher can be
used. The first output (monitor number 1) is always routed to the client's video input card, which causes the
image to be displayed on the "Home/Monitoring/Controls" screen. The other two outputs (monitors 2 and 3) can
be routed to external monitors.
You must use only CCTV monitors 1, 2 and 3.
The default monitor used by the CCTV camera at each control point is specified in the
"Operation/Controls/Control Groups" screen. This also affects the default positions of the control-point panels in
the "Home/Monitoring/Controls" screen.
Traffic Lights
If required, each access point can have a traffic light to control traffic flow. Two output relays are used to control
each traffic light.
If required, two status inputs can be used to feed back to the "Home/Monitoring/Controls" screen whether the
green or red light is lit, which then determines the color of the traffic-light icon in the "Home/Monitoring/Controls"
screen.
Setting up a traffic-light control
Barriers (or Other Devices)
If required, each access point can have a barrier that is open/closed. Up to three output relays are used per
device to open, close or stop the barrier.
If required, up to three status inputs can be used to feed back to the "Home/Monitoring/Controls" screen the
current status of the device, such as whether the barrier is open, closed or in motion.
Remember that although the above diagram shows the barrier using inputs and outputs from the Commend
system, inputs and outputs from an access-control node could also be used.
Setting up barrier controls
Readers
An access point can be set up to grant access at a specified access-control reader.
Output Points
An output point enables the guard to switch a device such as a light on or off from the
"Home/Monitoring/Controls" screen. A single output relay is used to switch the device on or off.

436
Symmetry Software Reference Manual

If required, two status inputs can be used to feed back to the "Home/Monitoring/Controls" screen whether the
device is switched on or off.
Setting up output points

Installation and Setup Tasks


To install and set up Controls, follow these steps:
1. Set up Port definitions for Switcher CCTV and Commend Controls systems ("Install/System/Client Ports").

Note: The same Symmetry system cannot be set up with port definitions for both Commend Controls and
Intercom System.

2. Set up the cameras, monitors and intercoms ("Install/Video & Audio/CCTV"). The guard's (master) intercom
must have the client PC specified in the "Install/Video & Audio/CCTV/Control Intercom" screen.
3. Decide the hardware that is to provide the inputs and relay outputs to operate and monitor the
barriers, traffic lights and output points. Set up these relay outputs and inputs using the appropriate
screens from the following list:
"Install/Access Control/Monitor Point"
"Install/Access Control/Auxiliary Output"
"Install/Video & Audio/CCTV/Ancillary"
"Install/Video & Audio/CCTV/Control Output"
"Install/Video & Audio/CCTV/Control Input"
4. Set up the control points ("Operation/Controls/Control Points").
5. Set up the control groups ("Operation/Controls/Control Groups").
6. For a multi-user Commend system, set up the control centers ("Operation/Controls/Control Centers"). This
screen is available only if you have the Control Centers license installed.

Note: If a fuzzy picture is obtained, start dxconfig.exe (located in the Symmetry software installation folder),
select the Source button and change the Output Size.

Overview of Visitor Management


About the "Home/Identity/Visitors" Screen
Depending on your user privileges, you can use the "Home/Identity/Visitors" screen to create, find, view,
modify, copy or delete visitor details. You can also assign card details and access rights, capture biometric
information about the visitor (such as a fingerprint), print a badge, view a card's last 25 transactions and sign
visitors in and out.
The Auto Card Number (Visitor Card) option in the "Maintenance/User & Preferences/System Preferences"
screen determines whether it is mandatory to specify a card number in the visitor's details. If Auto Card
Number (Visitor Card) is not set, it is possible to remove the card number from an existing visitor's details and
re-assign it to another, without deleting the previous visitor's details. Keeping the details of previous visitors
makes it easy to re-use those details at a later date should the visitor return.

Note: You may have no access to some visitors, tabs or options, depending on your permissions. Permissions
to tabs and options are set up in the "Maintenance/User & Preferences/Roles" screen. Permissions to access a
specific visitor are set up using the Permissions button when defining the visitor.

Visitor Management Logins


The "Home/Identity/Visitors" screen enables employees who are not normally users of Symmetry to enter the
details of their own visitors prior to arrival on site.

437
Overview of Visitor Management

This can be easily achieved by selecting Allow Visitor Management Login for this Cardholder in the
Personal tab of the "Home/Identity/Card Holders" screen. Selecting the option allows the card holder to log on
to the Symmetry software and enter the details of his/her own visitors. The default state of this option is
determined by Visitor Management Login is Default in the "Maintenance/User & Preferences/System
Preferences" screen.
By default, the card holder will have access to the "Home/Identity/Visitors" screen (Visitor Details and Personal
tabs only) and "Reports/Identity Reports/Visitors" screen. However, you can change the screens the user has
access to by modifying the Visitor Management user role in the "Maintenance/User & Preferences/Roles"
screen. Details of visitors for other people are hidden.

Note: A user account is added to the "Maintenance/User & Preferences/Accounts" screen. The screen includes
an Include Visitor Management Users option to display these accounts.

After a visitor management login, the user can only add or modify the details of his/her own visitors in the
"Home/Identity/Visitors" screen. The Visiting field is grayed out and displays the name of the card holder
currently logged in.
Specifying Visitor Escorts
There are two methods of specifying an escort for a visitor:
1. You can open the visitor's card details in the "Home/Identity/Visitors" screen and select the name of any
card holder who has been specified as an escort.
2. You can open the details of a "standard" card holder in the Card Holders screen, select the Visitor Escort
option, then use the Visitors tab to select the visitors that the card holder is to escort.
If Visitor Escort is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences"
screen, selection of a visitor escort is mandatory (except when the card has an "Inactive" status).
If the Auto Unassign Expired Visitor Cards setting is selected in the "Maintenance/User &
Preferences/System Preferences" screen, the escort is automatically removed from the visitor's card details
when the visitor card expires.
Setting up Visitor Personal Data
The process of specifying personal data for a visitor is similar to the process of specifying the data for a
standard card holder - you either type the data or select it from pull-down lists in the Personal tab of the
"Home/Identity/Visitors" screen.
The personal data titles (such as "Visitor's Company Name", "Reason for Visit", "Visit Arranged By", "Hair
Color") are different from those used for standard card holders and are set up from a separate screen - the
"Setup/Identity/Personal Data/Settings/Visitor Titles" screen.
Pre-defined data items for each of these personal data titles can be defined in the "Setup/Identity/Personal
Data/Visitor Data" screen. For example, for the data title "Hair Color", you may want to define data items such
as "Black", "Brown" and "Blonde". Pre-defined data items can be selected from pull-down lists in the
"Home/Identity/Visitors" screen.
Running Visitor Reports
Visitor details can be included in several reports:
"Reports/Identity Reports/Visitors" - A dedicated report showing visitors expected today, previous visitors,
etc.
"Reports/Identity Reports/Cards" - You can list details of visitor cards.
"Reports/Identity Reports/Access" - You can list details of the access rights of visitor cards.
"Reports/History/Activity" - You can view previous alarms and events generated by visitors.
"Reports/History/Cardholders Onsite" - You can find out which visitors used an entrance reader.
"Home/Identity/Locator" - You can find out the current location of selected visitors.
"Home/Identity/Muster" - The muster report includes visitors.

438
Symmetry Software Reference Manual

Sending an email when a Visitor Arrives


When a visitor is signed in from the "Home/Identity/Visitors" screen and the Save button is clicked, the system
automatically sends a "Visitor arrived" message to each email address specified in the Personal Data tab of the
card holder the person is visiting. This feature is enabled by selecting an email profile in the Email Notification
of Visitor Signing in option in the "Maintenance/User & Preferences/System Preferences" screen. The email
profile (as configured in the "Setup/Configuration/Email Profiles" screen) specifies the settings necessary to
send the email (such as the address of the SMTP mail server).
Text in the card holder Personal Data tab is recognized as an email address if the Category of the personal
data item is defined as Email in the "Setup/Identity/Personal Data/Card Holder Titles" screen.
Deactivating a Visitor Automatically on Leaving the Site
Visitors can be automatically deactivated following a successful transaction at a specified reader. To configure
this feature, set Deactivate Visitor Cards in the "Install/Access Control/Reader" screen and ensure the visitor
has access rights to this reader. When the visitor is granted access at the reader:
 The Force Cardholder Inactive checkbox is automatically set in the "Home/Identity/Visitors" screen.
 The "Visitor Card Holder Deactivated" alarm or event is generated.
This feature is typically used at readers that allow visitors to exit the site.
If Make Visitor Cards available for Re-use is selected in the "Install/Access Control/Reader" screen,
Symmetry also sets the visitor's card number to zero in the "Home/Identity/Visitors" screen. This allows the card
number to be easily reused for another visitor in Symmetry.
Note: If mustering is used on the site, make sure the deactivation reader is outside the Area Reader Group, as
set in the "Home/Identity/Muster" screen. The Area Reader Group defines the area covered by the muster, and
if the deactivation reader is in this area, the visitor will be removed from muster reports before leaving the area.
Requiring a visitor escort to confirm access for a visitor
An installer can set Visitor Mode at a reader, which requires the visitor and visitor escort to make valid card
transactions at the reader before the reader grants access to the visitor. This can reinforce the requirement for
a visitor escort to accompany their visitor.
The process at a reader that has Visitor Mode set is as follows:
1. The visitor makes a valid card transaction at the reader.
2. The reader waits for the visitor escort to present their card.
3. The visitor escorts makes a valid card transaction at the reader.
4. The reader grants access (providing the visitor escort is a specified escort for the visitor). The visitor should
pass through the door, but the escort should remain. Symmetry updates the antipassback status of the
visitor.
5. The visitor escorts provides a second valid card transaction at the reader.
6. The reader grants access. The visitor escort should pass through the door. Symmetry updates the
antipassback status of the visitor escort. An "Escort" event is generated.

PC Door Control
A reader (entry point) can be switched between automatic door control mode (PC door control off) and manual door
control mode (PC door control on) using:
 The Automatic Door Control Enabled and Manual Door Control Enabled commands. These are
available as manual, scheduled and trigger commands.
 The Enable Automatic Verification (PC door control off) and Enable Manual Verifications (PC
door control on) buttons in the "Home/Identity/Verification" screen. These buttons are available
only if enabled in the "Setup/Identity Verification/Entry Point" screen.
Automatic door control mode is the normal mode, where the system automatically grants or denies access
depending on access rights. In addition, if Card Alarm Notification is set in the "Setup/Identity Verification/Entry

439
Permissions Screen

Point" screen, a card alarm (such as "At Wrong Door") prompts the user of the "Home/Identity/Verification" screen
to choose whether to grant or deny access.
PC door control mode provides an additional layer of security by enabling the guard to use the
"Home/Identity/Verification" screen to choose whether to grant or deny access for each valid access-control
transaction at the reader. The Grant Access and Deny Access buttons are enabled only if the person's access
rights would allow access in automatic mode.
The green and red LEDs on the reader flash while the guard decides whether to grant or deny access. The amount
of time the system waits for a decision is determined by the PCDoor Control setting in the "Install/Access
Control/Node" screen.
A reader's default mode (PC door control mode or automatic door control mode) is determined by the PCDoor
Control option in the "Install/Access Control/Reader" screen.

Note: Customer code only mode overrides manual door control mode. Therefore, if Customer Code Only is
selected in the "Install/Access Control/Reader" screen, the reader will grant access to a card that has a valid
customer code, without confirmation from the "Home/Identity/Verification" screen.

Permissions Screen

Introduction
The Permissions screen is displayed by clicking the Permissions button when setting up items such as card
holders, readers, cameras and reader groups. The Permissions button is available if Enable Permissions is
selected in your user permissions ("Maintenance/User & Preferences/Accounts" screen).
You can use the Permissions screen to select the user roles (as defined in the "Maintenance/User &
Preferences/Roles" screen) that can use the item you are defining. For example, if you are defining a reader group
and Assigned User Roles contains only Card Admin, only users who have the Card Admin role will be able to add
the reader group to access rights.
By default for a new record, the Assigned User Roles area of the screen contains the roles selected using the
Default Permissions button in your user role ("Maintenance/User & Preferences/Roles" screen). If <Everyone> is
selected, all roles will be able to access the item.

Note: User roles set up in the "Maintenance/User & Preferences/Roles" screen specify whether users of the
role have read-only, modify, full or no access to each screen. The Permissions screen offers a lower level of
permissions, by enabling selective access to specific items (such as specific card holders).

For card holders, visitors, access codes and device groups (such as reader groups), you are able to open a record
only if the permissions include your user role. For example, you can open a specific card holder only if the card
holder permissions include your user role.
For other items, the Permissions screen can prevent the item from being used, but does not prevent the item from
being edited. For example, if a reader's permissions do not include your user role, you will not be able to assign the
reader to a card holder's access rights, but you will be able to edit the reader in the "Install/Access Control/Reader"
screen (providing your user role gives access to that screen). If someone with the required permissions has already
assigned the reader to the card holder's access rights, you are able to view and remove it from the access rights.

Bypassing Permissions Filtering


Filtering of items depending on permissions can be switched on or off for a selected user by using Ignore/Bypass
Permission Filters in the "Maintenance/User & Preferences/Accounts" screen. By default, this option is selected
for the default "Installer" account.

440
Symmetry Software Reference Manual

Data Import
When importing a new card holder or visitor using the Data Connect Module, the Default Permissions of the role
belonging to the user who starts the import are assigned to the permissions (Assigned User Roles) of that card
holder or visitor.

Personal Data Titles


If the card owner is not a visitor, the personal data titles displayed in this tab are defined in the
"Setup/Identity/Personal Data/Card Holder Titles" screen.
For visitors, the titles are defined in the "Setup/Identity/Personal Data/Visitor Titles" screen.

Pull-down lists
A pull-down list may be displayed for some of the personal data titles. These are for common information such as
"Hair Color", "Gender", etc. For these titles, you can choose predefined data from the pull-down lists.
For non-visitors, the predefined data shown in the pull-down lists can be set up and modified using the
"Setup/Identity/Personal Data/Card Holder Data" screen.
For visitors, the "Setup/Identity/Personal Data/Visitor Data" screen is used.
If the personal data title has been set up with a Field Type of Edit List, you can also type alternative text directly
into the boxes. The information you type will be automatically added to the list the next time you or anyone else in
your company uses the screen.

Fields without pull-down lists


The personal data titles that do not have pull-down lists are for information that is likely to be different for each
person, such as "Date of Birth". Type the text in the box.

Card Expiry Date


One or more personal data titles may have Field Type set to Expiry Date in the "Setup/Identity/Personal Data/Card
Holder Titles" or "Setup/Identity/Personal Data/Visitor Titles" screen. If you enter a date for such a title, the status of
the card is automatically set to "Inactive" at the beginning of the specified day. This feature is useful if you want the
card to be made inactive when, for example, an insurance policy or qualification expires.

Masks
In some fields, the format of the information you can type may be fixed (as defined by "masks" in the
"Setup/Identity/Personal Data/Card Holder Titles" screen or "Setup/Identity/Personal Data/Visitor Titles" screen).
For example, you may need to specify a time value in a format such as 12:45, or a value consisting of 6 digits. You
are prompted to correct any invalid entries when you save.

Playback Buttons
Reduces the playback speed each time you click the button, or for some camera
types, skips back. The playback speed is shown to the right of the Playback
buttons. This option is not available for some camera types.
Plays the video clip after a pause and restores the normal playback speed.

Pauses the video clip. Buttons on the right of the screen are enabled once the video
is paused. Each click of the Pause button advances the picture by one frame.
Pressing and holding Pause may accelerate replay, depending on the playback
device.
Increases the playback speed each time you click the button, or for some camera
types, skips forward. This option is not available for some camera types.

441
Playback Buttons

Enables you to save the picture as a JPEG file. This button is available only after
pausing playback.
Enables you to bookmark a part of the video clip, so that it can be easily found and
replayed in the "Home/Video & Audio/Video Playback" screen. This button is
available only after pausing playback.
Allows you to export the video clip recorded by a Symmetry NVR as an MPEG-4 file
for replay using the Symmetry Standalone Player or any other played that supports
the MPEG-4 standard (the digital signature is ignored by other players). This button
is available only after pausing playback. Your user role ("Maintenance/User &
Preferences/Roles") must contain the Export Video With Privacy Zones privilege
if you want to be able to export a video clip that contains privacy zones. Exported
video has the privacy zones removed.
For further information, please refer to the help for the Save and Export Video
screen.
Prints the currently paused image on the default Windows printer. This button is
available only after pausing playback.
This button indicates whether any part of an recording played back so far has been
tampered with. The button is available only for recordings made by certain camera
types, such as those connected to an ENVS.
Clicking the button displays a digital signature report. Make sure that the video is
playing at normal speed (not paused) before clicking this button.
The report includes a Reset button, which resets the digital signature check in the
event that an invalid signature is detected.
Click here for more information.
A digital signature is added to video data as it is being recorded. When a clip is
replayed, the Symmetry software continually checks the digital signature to
determine whether the video replayed so far has been tampered with. If the
signature is not correct, the button appears as follows:

You should allow a video clip to play all the way through at normal speed to
determine whether any part of it has been tampered with.
This button is available only in the "Home/Video & Audio/Video Playback" screen
when more than one cell displays video, and is not available for some DVRs.
Clicking the button causes the playback time of all cells to be synchronized with the
time of the currently selected cell. For example, if the playback time in the currently
selected cell is 11:00, the playback time of all other cells is set to 11:00.
Toggles between:
Skip to Next on - Selecting this option causes playback to skip each period of
standard recording that may exist between tagged recordings. At the end of a
tagged recording, playback will skip the standard recording that follows, and
immediately resume at the start of the next tagged recording.
Skip to Next off - Selecting this option prevents playback from skipping standard
recordings that exist between tagged recordings. Instead, all recording is played
back.
Zooms out, so that the time between marks on the time line is increased.
Zooms in, so that the time between marks on the time line is reduced.

442
Symmetry Software Reference Manual

Popup Media View Screen


This screen displays the live video image from the selected video camera. The screen is displayed by right-clicking
on a camera in the "Home/Monitoring/Graphics" screen and selecting Live Video when Show live video from
graphics in is set to Popup Window in the "Maintenance/User & Preferences/Client Preferences" screen.
The maximum number of windows is specified by the PopupWindowCount ini file setting.
The icons in the title bar and the right-click options have a similar purpose to the options in the
"Home/Monitoring/Video & Audio/Virtual Matrix" screen. For further information, please refer to "Virtual Matrix
Screen". The right-click Remove option removes the video (rather than closing the window).

Predefined Report Selection Screen ("Reports/Configuration")

General
Overview of this screen

About the Options


Report Title
Entries Found
New
Find
Open
Close

Random Search
Symmetry can be configured to require a guard to carry out random searches of card holders when they carry out
card transactions. If Symmetry selects a card holder for a random search, the Search Required alarm is generated
and the card holder is denied access.
Optionally, the card can be automatically blocked at the reader until the guard performs a card command
(configured as described below), which unblocks all cards that have been blocked by a random search. The "At
Wrong Door" alarm is generated if the card holder attempts another transaction using a blocked card.
Note: Elevator nodes do not support random search rules at all.
To configure the Random Search feature:
1. If card blocking is required, add BlockRandomSearch=1 to the [multimax] section of multimax.ini. Restart
the Symmetry services and the Symmetry software.
2. Open the "Install/Access Control/Reader" screen for the readers at which random searches are to take
place. In the Modes tab:
1. Select Enable Random Search. The PC Door Control option is selected automatically; leave this
option selected.
2. In the menu, set the required probability of a search at this reader (High or Low). The actual
probability as a percentage is dependent on the settings in the system preferences (see below).
3. If card blocking is required, select Card Commands in the Command Type menu.
3. Open the "Maintenance/User & Preferences/System Preferences" screen, and select the Card Settings tab.
Enter High and Low values in the Random Search Probability fields. These determine the meaning of high and
low probability and refer to a probability out of 1000. For example, if you enter 100 for High, the meaning of high
probability is approximately 100/1000 = 10 percent.
4. If card blocking is required:

443
Readers Listing Selection Screen ("Reports/Configuration/Reports"/Readers)

1. If required, set up a scheduled or trigger command to cancel blocking automatically after the search
is complete. For example, to set up a trigger command to do this, open the
"Operation/Commands/Trigger" screen, and configure the command as follows:
If: Device = Reader; Location = reader as defined above; Message = Card Command; Command
= any number.
Then: Device = Reader; Location = reader as defined above; Command = Re-enable Stopped
Cards.

Alternatively, the guard can issue a Re-enable Stopped Cards manual command from Symmetry to
cancel card blocking.
2. In the "Home/Identity/Card Holders" screen, open the guard's card and select both Executive Card
and Command Card Holder. Executive cards are not subject to random searches.
5. In the "Home/Monitoring/Command Center" screen, send the command "Random Search On" to the
relevant readers.

Readers Listing Selection Screen


("Reports/Configuration/Reports"/Readers)

General
Overview of this screen
Use this screen to produce a report of how readers are set up, as defined in the "Install/Access Control/Reader"
screen.
The report can include an "Alarms" section. This lists the possible messages generated from the reader and its
door (for example, "Reader Tamper" and "Door Held"), and whether the message is an alarm, event or is
disabled.

About the Options


Filter By
Choose one of the following options to select the reader(s) that you want to include in the report:
 Reader - To include a specific reader or All Readers.
 Reader Group - To include all readers in a selected reader group.
 Node - To include all the readers connected to the selected node. This option is available only if you
have System Admin privileges (as specified in the "Maintenance/User & Preference/Roles"
screen).
The report can include only those readers that belong to the currently selected company.
Select Lists to Include
Select the type of information to include in the report. The option you select determines which of the individual
settings are automatically selected in the boxes at the bottom of the screen. The Select Lists to Include
options correspond to the tabs in the "Install/Access Control/Reader" screen, except for:
 All Entries - causes the information from all the tabs in the "Install/Access Control/Reader" screen to
be included in the report.
 Custom - Has no effect when you select the option, but if you modify the settings in the boxes at the
bottom of the screen, Custom is automatically selected to indicate that one of the standard
settings is not being used.

444
Symmetry Software Reference Manual

Include All
The two boxes in the bottom half of the screen show the individual settings that will be included (selected) or
excluded (unselected) from the report. For example, if Node Description is selected, the report will include the
name of the reader’s node.
The right-hand box gives a list of reader alarm/event messages. Each message from a reader can be set to
Alarm, Event or Disabled in the "Install/Access Control/Reader" screen. The report will include the
Alarm/Event/Disabled status of all reader messages that are selected.
Selecting/deselecting Include All selects/deselects all items in the box.

Record Video Screen

General
Overview of this screen
This screen enables you to record the selected video picture. The recording is started when you click OK.
A user recording is created, which you can easily locate and replay in the "Home/Video & Audio /Video
Playback" screen (by selecting the Video by User Recording filter).
Note that the video picture may be being recorded already (for example, if the video is being continuously
recorded). In this case, the benefit of creating a user recording is to make this area of the recording easier to
find in the "Home/Video & Audio/Video Playback" screen.
If you select Remember options, the system remembers the settings you make in this screen. The next time
you select Record Video from a cell's right-click menu (or click the record icon in the top-left corner of a cell),
recording begins without displaying this screen.
A red icon appears in the top-left corner of the cell when recording is in progress.

About the Options


Description
Enter a description for this user recording. The description will be displayed in the "Home/Video & Audio/Video
Playback" screen when listing user recordings. Selecting User name as description causes the description to
be the same as your Symmetry login user name.
Pre-Period
Specify the number of seconds or minutes in the past to include in the recording. For example, if you specify 1
minute, the previous one minute of video prior to starting the recording will be included.

Note: Video in the past will be included in the clip only if it is available. This can be achieved by recording
continuously, or by ensuring that the pre-event video buffer can provide the video.

Post-Period
Specify the amount of time to continue recording after starting the recording.
User name as description
With the option selected, the Description defaults to your Symmetry user name. Deselecting User name as
description enables you to enter a Description of your own choice.
Remember options/Don't ask again
Select this option if you want to save the settings and do not want the screen to be displayed the next time you
select Record Video (or click the button in the top-left corner of the cell). Instead, the recording will start
immediately without the Record Video screen being displayed.

445
Suprema Fingerprint Enrollment Screen

You can access the Record Video screen again my selecting Record Video Options from the right-click menu
in the Virtual Matrix.
OK
If Remember options is not selected, clicking this button starts the recording. Otherwise, the settings are
saved.
Cancel
This takes you out of the screen without saving any changes.

Suprema Fingerprint Enrollment Screen


This screen is displayed by clicking Capture Suprema in the Biometrics tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. You can use the screen to capture fingerprints using a Suprema BioLite N2
biometric enrollment reader.
You can enroll two fingerprints, either both for access, or one for access and another for duress.
For information about configuring Suprema readers and using them in Symmetry, please refer to the Third-Party
Access Devices Configuration and User Guide.

Enrolling fingerprints
To enroll fingerprints:
1. In the picture of the hands:
 Left-click any finger tip to specify the finger is to be used to gain access. The finger tip is
highlighted in green.
 Right-click any finger tip to specify the finger is to be used to signal duress. The finger tip is
highlighted in red.
The headers near the top of the window show the selected finger numbers and their selected purpose.
2. For each finger, click Enroll and present the selected fingerprint to the enrollment reader.
The fingerprints are displayed, with a percentage score to the right. Aim for a score in excess of 80% for
each finger to ensure reliable operation and good security. If you do not reach a score of 80%, click Enroll
and try again.
3. Click Verify and present the finger again to confirm that you positioned the finger normally during
enrollment.

Screen Options
Enroll
Click to enroll the fingerprint number given in the header near the top of the window.
Verify
After using Enroll (see above), click Verify to check that when you present the same finger again, the reader is
able to confirm that it is the same finger as the one enrolled. This gives confidence that the finger has been
positioned normally on the sensor during enrollment.
Verify presents a score - aim for a score in excess of 80%. If you do not reach this score, enroll the finger
again.
Clear
Click Clear if you want to clear the enrolled fingerprint.

System License Activation Screen


This screen is displayed if you attempt to log in at a Symmetry client that does not have a license activation code.

446
Symmetry Software Reference Manual

If available, enter the activation code and click OK. You can obtain the activation code in one of two ways:
 Over the internet, such as by clicking the link in the screen. You will be prompted to log in and
register your details. The login username and password are provided on the Software License
Certificate.
 By phone. If you use this method, you will need the Serial Number and Registration Key, both of
which are displayed in the screen. Call one of these two numbers:
 For installers in Continental America call: 1-800-889-9138 (6am to 5pm, Monday to Friday,
Pacific Standard Time).
 For installers outside Continental America call: 44 1684 277257 (9am to 4pm, Monday to
Friday, Greenwich Mean Time).
When you have the activation code, write it down in the space provided on the Software License Certificate.

S813 Fingerprint Enrollment

General
Overview of using this screen
The Fingerprint Enrollment screen is displayed by selecting Capture S813 in the Biometrics tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
Use this screen to enroll fingerprints from an S81x fingerprint enrollment reader, and to encode the fingerprint
data and card number onto a NXP MIFARE or NXP MIFARE DESfire contactless smart card.
In order to use this screen, an S81x enrollment reader must be connected to the computer you are using. The
reader is set up in the "Install/System/Client Ports" screen.
To use this screen:
1. Click the finger(s) to enroll, then Enroll. Use index, middle or ring fingers (not thumbs or little fingers).
Read the instructions in the panel in the top-left corner of the screen.
You can choose to enroll one or two fingerprints, including a finger to be used to indicate a duress access-
control transaction. It is not normal to choose only duress fingers, as the system will generate a duress
alarm/event message for every access-control transaction.
If you enroll two fingerprints, either of the two fingerprints can be used to gain access at a reader that is in
single-fingerprint mode. At readers that are in two-fingerprint mode, both fingers must be used.
2. Present the finger to the enrollment reader.
Make sure the finger is placed correctly on the pad - with the first joint of the finger resting on the ridge lock
at the front of the sensor:

Apply moderate pressure. Too much pressure may cause smudging of the fingerprint. Too little pressure
may prevent the ridge patterns from being captured.
Cover as much of the sensor area as possible with the finger.

447
S813 Fingerprint Enrollment

Note: Make sure your finger touches the buff-colored ring around the edge of the sensor. Your fingerprint
image may not be recognized if you do not do this.

3. Check the displayed fingerprint. Click Accept if the displayed fingerprint core is centered and well
defined. Otherwise, click Retry and continue from step 2. Here are examples of enrolled fingerprints:
Quality: Good.
Content: Core is properly centered. Surface area and ridge
pattern are well defined.

Quality: Poor - more pressure is needed to improve the


image. Enroll again.
Content: Core is properly centered.

Quality: Poor - ridges are not well defined. Enroll using a


different finger that provides a better image.
Content: Core is properly centered, but is not well defined.

Quality: Good.
Content: Core is not centered. The same finger should be
enrolled again.

Note: The enrolled fingerprints are not permanently saved until you choose Save in the Definition screen.

4. If prompted, present the finger for verification. The default is three verification passes, but can be changed
using the Force Fingerprint Verification setting in the "Maintenance/User & Preferences/Client Preferences"
screen. Verification makes sure that the enrolled fingerprint will be able to be matched with a live fingerprint using
the displayed acceptance threshold. Make sure that you remove and re-place the finger between each
verification. You will see a green check mark (tick) for each verification passes that is successful.
If any of the verification attempts is not successful, the acceptance threshold is automatically lowered and
you are prompted to try again. Click Retry if you want to continue with the current attempt using the new
acceptance threshold, or Verify to repeat the whole verification procedure again, using the original setting.
5. If there is another finger to enroll, click Accept and repeat from step 2.
6. ClickEncode to encode the smart card. Follow the instructions.
Click here for an overview of fingerprint readers.

Screen Options
Enroll
Verify
Encode
Clear
Acceptance Threshold
Quality and Content
Fingerprint Image-Accept/Retry

448
Symmetry Software Reference Manual

Tagged, Bookmarked, User and Standard Recordings

Tagged Recordings
Tagged recordings can be produced by one of the following:
Record Video trigger commands
A Record Video trigger command could, for example, be activated when a Door Forced alarm occurs. A
Replay option is available in the "Home/Monitoring/Alarms", "Home/Video & Audio/Virtual Matrix" or
"Reports/History/Activity" screen if a selected alarm has an associated tagged recording. Selecting Replay
replays the recording.
Bookmarks
Bookmarked recordings are created manually using the Bookmark button in the "Home/Video &
Audio/Video Playback" or Video Replay screen (which is accessible from the "Home/Video & Audio/Virtual
Matrix" screen). A bookmark indicates an area of interest in a recording.
User recordings
User recordings can be made using the Record Video option while watching a live camera image in the
"Home/Video & Audio/Virtual Matrix" screen.
Tagged recordings have the following features:
 Each tagged recording spans a specified period of time. The start and end times of the recording are
specified when setting up the command, adding the bookmark or starting the user recording.
 Tagged recordings are easy to locate and replay in the "Home/Video & Audio/Video Playback"
screen.
 Tagged recordings stored in a network storage folder by a Symmetry NVR are protected from being
overwritten.
Note: Recordings triggered directly by an event configured at an NVR or DVR are always classed by the Symmetry
software as a standard recording. For example, if the web interface of a Symmetry NVR has been used to configure
a recording to start when there is a motion event at a camera, this is classed by the Symmetry software as a
standard recording, since the NVR is unable to return the recording mode used.

Standard Recordings
Recordings that are not tagged are known as standard recordings. These are not protected, and therefore may be
overwritten when disk space is required.
For cameras other than DVR cameras, a standard recording can be made using a Start Recording command (a
manual, scheduled or trigger command). DVR cameras are assumed to record continuously, and any non-tagged
areas are regarded as standard recordings.

The Color Screen


Select the required color of the object from the table.
 Define Custom Colors - For future enhancement.
 OK - Applies the changes you have made.
 Cancel - Exits without applying any changes.

449
The Font Screen

The Font Screen


Font - Type or select a font name. The fonts listed are those that are available with the current printer driver and
additional fonts that have been installed with Windows. You can also change the font of selected text from the pull-
down menu in the toolbar.
Font Style - Select a style. To use the default type style for the font, select Regular.
Size - Type or select a size. The sizes available depend on the printer and the selected font. If the size you type is
not available on the current printer, the closest-available size will be used. You can also change the font size of
selected text from the pull-down menu in the toolbar.
Effects - Choose Underline to underline the text. Choose Strikethrough to draws a line through the text.
Color - Choose the required color for the text.
Sample - Shows the effects that the formatting you specify will have on the selected object.
OK - Applies the changes you have made.
Cancel - Exits without applying any changes.

The Frame Width Screen


Use the up-arrow and down-arrow buttons to increase or decrease the width of the border, or type the value in
directly. The value is in points, where 1pt = 0.35mm.
OK - Applies the changes you have made.
Cancel - Exits without applying any changes.

Threat Commands Screen ("Setup/Configuration/Threat Levels")

General
Overview of this Screen
You can use the Threat Commands screen to set up one or more commands for the selected threat level. You
may, for example, want to set up commands that change readers from card-only mode to card-and-PIN mode,
or that enable selected monitor points.
Any command you set up in this screen is actioned when the current threat level matches or passes through
the command's threat level. For example, if you set up commands for threat level 3, the commands are
actioned if the current threat level is escalated from level 1 or 2, to level 3, 4 or 5. The commands are also
actioned if the current threat level de-escalates from level 4 or 5 to level 1, 2 or 3.

Note: You may need to set up additional commands to reverse the effects of the threat level commands you set
up. For example, if you have set up "Disable Reader" commands for threat level 3, you will probably want to set
up "Enable Reader" commands for threat level 2 to bring the system back to its normal state.

To set up a command:
1. Use Select Type to choose the type of item the command applies to.
All items of the selected type are listed in the box near the center of the screen, irrespective of the
currently selected company.
2. Select the item(s) you want the command to apply to. If you want to select more than one item, press the
Control or Shift key between mouse clicks (Control selects another device; Shift selects a range).
3. Choose the command from the pull-down list.
4. Click Assign.
The commands associated with the threat level are listed in the Commands Defined box.
You can remove commands associated with the threat level by selecting them in the Commands Defined area
and clicking Remove.

450
Symmetry Software Reference Manual

For an overview of threat level management, please refer to the Threat Level Manager Installation and User
Guide.

Screen Options
Select Type
Choose the type of item the command applies to.
Command
Choose the command to send to the highlighted device(s) or group(s) of devices. Click here for a description of
each command.
Find By Description
This option determines the number of existing entries listed when you select Find. If the option is blank, all
entries are listed. If you want to narrow the search, type the name of the entry in the box. You can find a range
of entries by using wildcards.
Assign
Assigns the selected command to the threat level.
Remove
Removes the selected commands from the threat level.

Threat Level
 Activate at Level - Select the threat level at which you want the access rights to become active.
 Deactivate at Level - Select the threat level at which you want the access rights to deactivate.

Note: You can set threat levels on normal and advanced access rights. If an advanced access right is
automatically deactivated by a threat level, any normal access rights that have been overridden by the
advanced access rights become active.

Click here to see how these two options work together.

Timing Diagrams for Door Operation


Click the links below to view the timing diagrams:
Valid Card Re-Lock Options = Door Opens. Door not opened.

451
Timing Diagrams for Door Operation

Timing Diagram 1

Valid Card Re-Lock Options = Door Opens. Door closed before open time expires.
Timing Diagram 2

Valid Card Re-Lock Options = Door Opens. Door closed before preheld time expires.

452
Symmetry Software Reference Manual

Timing Diagram 3

Valid Card Re-Lock Options = Door Opens. Door closed after preheld time expires.
Timing Diagram 4

Valid Card Re-Lock Options = Door Closes. Door not opened.

453
Timing Diagrams for Door Operation

Timing Diagram 5

Valid Card Re-Lock Options = Door Closes. Door closed before open time expires.
Timing Diagram 6

Valid Card Re-Lock Options = Door Closes. Door closed before preheld time expires.

454
Symmetry Software Reference Manual

Timing Diagram 7

Valid Card Re-Lock Options = Door Closes. Door closed after preheld time expires.
Timing Diagram 8

Valid Card Re-Lock Options = Unlock Time Expires. Door not opened.

455
Timing Diagrams for Door Operation

Timing Diagram 9

Valid Card Re-Lock Options = Unlock Time Expires. Door closed before open time expires.
Timing Diagram 10

Valid Card Re-Lock Options = Unlock Time Expires. Door closed before preheld time expires.

456
Symmetry Software Reference Manual

Timing Diagram 11

Valid Card Re-Lock Options = Unlock Time Expires. Door closed after preheld time expires.
Timing Diagram 12

Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door not opened.

457
Timing Diagrams for Door Operation

Timing Diagram 13

Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door closed
before open time expires.
Timing Diagram 14

Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door closed
before preheld time expires.

458
Symmetry Software Reference Manual

Timing Diagram 15

Valid Card Re-Lock Options = Door Opens. Exit Request Re-Lock Options = Follow Exit Request. Door closed after
preheld time expires.
Timing Diagram 16

Print Setup Screen


The Print Setup screen allows you to select and set up a badge printer.
You should set the Landscape/Portrait setting to be the same as selected in the "Tools/Card Format/Card Layout"
option of the "Setup/Identity/Badge Designer" screen.
Please refer to the Symmetry Software Installation Manual for details of the printer settings.

Save and Export Video Screen

General
Overview of this screen
This screen enables you to save a recording in MPEG4 format.

459
Save As Screen

Optionally, you can also choose to save the Standalone Symmetry Video Player installation software to the
same location as the MPEG4 file.
Use the Browse button to specify the name of the MPEG4 file you want to create, and its location. Clicking OK
creates the recording.
Your user role ("Maintenance/User & Preferences/Roles") must contain the Export Video With Privacy Zones
privilege if you want to be able to export a video clip that contains privacy zones. Exported video has the
privacy zones removed.

About the Options


Notes
Enter any notes you may consider useful.
Camera
This read-only field shows the name of the camera you have selected.
Output Folder
Use the Browse button to select the folder in which to save the video file.
Filename
Specify the name of the file in which to save the video recording.
Include stand-alone player installation
Select this option if you want the installation wizard for the Symmetry Video Player to be added to the selected
folder.
The installation software is saved to the file InstallSMSVideoPlayer.exe. Double-clicking the file starts the
installation process.
Auto-run CD
Select this option if you want to create an auto-run CD or other recordable media that can automatically install
the Symmetry Video Player and play the saved recording.
Selecting this option adds autorun.inf and SMSVideoPlayerAutoRun.exe files to the selected location. You
should normally select this option only if you have selected recordable media, such as a CD or DVD, using
Browse.
Finalize recordable media
This option is available only if you have selected a recordable media location, such as a CD or DVD, using the
Browse button. Select this option if you want to finalize the media to enable it to be used on other PCs.
You are not be able to add files to a recordable media that has been finalized.
From Current Playback Position
From Start of Video Selection
By Date and Time

Save As Screen
Use this screen to specify a filename and location in which to save the data.

Note: This is a standard Windows dialog.

Save in - Use this pull-down list and the box in the center of the dialog to navigate to the folder in which to save the
data. For example, if you want to save the file in C:\Program Data\Security Management System\, you can select
the C: from the Save in pull-down list, then double-click on "Program Files", followed by "Security Management
System" to navigate to the correct folder.

460
Symmetry Software Reference Manual

The buttons to the right of theSave inpull-down list enable you to move up one position in the folder hierarchy,
create a new folder and view information in the dialog box as a list or with full details.
File name - You can use this field to type the name of the file you want to save.
Save as type - Select the type of file you want to save. The box in the center of the dialog will display existing files
of the selected type.
Save - This saves the specified file.
Cancel - This takes you out of the screen without performing any action.

Save View Screen


Use this screen to specify a name for the view you are creating. The existing views are listed in the dialog.
Each view must have a view number. Leave View Number blank if you want the system to generate a view number
automatically.
Click Save to save the view, or Cancel to return without saving. Click here for details of the Permissions button.

Secure Logon Dialog


This dialog is displayed if you are required to present your fingerprint or smart card as part of the logon process.
You will not be able to log on if the fingerprint or the encoded data on the smart card is incorrect.
Secure logons are set up in the "Maintenance/User & Preferences/Accounts" screen and require a fingerprint
reader or smart card reader to be connected to a serial port of the client PC.
If you cannot log in, the fingerprint or card details may not match your fingerprint or card details previously captured
in the "Maintenance/User & Preferences/Accounts" screen.

Selectable Messages

System Activity
An NVR Device Plugin Failed to Load
Card Commands
Card Holder Deactivated-Secondary Expiry
Card User PIN Changes
NVR Status
Patrol Operations
Recording Stopped, Insufficient Space
Scheduled Operations
Trigger Operations
Uncategorized
User Comments
User Initiated Door Command
Valid Card Transaction
Video Purged Early, Check NVR Config

Card Activity
Anti-Passback
At Wrong Door
At Wrong Time
Cardwatch
Deleted for PIN
Door Pre-Held Timer Expires
Door Pre-Held Timer Start

461
Selectable Messages

Duress
Expired
Floor Access
Granted Access
Granted Access (Extended Door Time)
Inactive
Keycard
Lost Card
Not Yet Valid
On Vacation
Unknown Card
Unknown Fingerprint
Visitor Card Holder Deactivated
Wrong Issue Number
Wrong PIN

Door Activity
Door Alarm Reset
Door Forced
Door Held Open
Door Monitor Circuit
Door Not Opened
Exit Button Circuit
Reader Tamper
User Code Lockout

Video Activity
Note: Ensure that Uncategorised is also selected in the System Activity section if you want the report to
include video activity.

Camera Restarted
IP Camera Offline
IP Camera Online
Motion Alarm
Motion Normal
Picture Loss
PTZ Preset Activated
PTZ Start
PTZ Stop
Video Picture Restored
Video Signal Loss
Video Signal Restored

Intrusion Activity
Area Armed
Area Disarmed
Area In Alarm
Area Reset
Panel Fault
Panel Reset
Uncategorized Intrusion
Zone Bypassed
Zone Disabled

462
Symmetry Software Reference Manual

Zone Enabled
Zone Force Armed
Zone In Alarm
Zone In Fault
Zone In Tamper
Zone Reset

Monitor Point Activity


Monitor Point: Circuit Open, Circuit Shorted, In Alarm, Normal, Tamper Alarm, Tamper Normal

Aperio Activity
Aperio Battery Flat
Aperio Battery Low
Aperio Battery OK
Aperio Bolt Position
Aperio Device Online
Aperio Device Offline
Aperio DIU Restarted
Aperio DIU Watchdog Reset
Aperio Door Position
Aperio Door Tamper
Aperio Handle Position
Aperio Radio Disturbance Cleared
Aperio Radio Disturbance Detected

Integrated System Activity


About this section

Selection Screens

Introduction
About Selection screens
Many options display two screens - the Selection screen (for example, the Card Holder Selection screen) and
the Definition screen (for example, the Card Holder Definition screen). The Selection screen is the screen that
is displayed when you first select the option.
Selection screens contain a Find option, which enables you to find all existing items (for example, existing card
holders). The items found are listed on the screen, often with other related information.
If you want to be selective about the items to list, you can the filter the items displayed by using the option(s) or
field(s) in the upper area of the screen (if provided). For example, there may be a Name or Description field in
which you can enter a name. Selecting Find then displays only those items that match the filter settings.

Note:Selection List Rows Limit in the "Maintenance/User & Preferences/Client Preferences" screen may limit
the maximum number of items listed. A warning message indicates when the limit it exceeded. In the limit is
exceeded, filter the results to see the items of interest.

Screen Options
The Selection screen may contain any of the following options.

463
Setting Up a LAN Chain

Description/Name/Code/Filter or other object name (such as "Card Format")


This field determines the number of existing entries listed when you click Find or the button.
If the field is blank, all entries are listed (depending on the settings of any other filter options on the screen). If
you want to narrow the search, type the name of the entry in the field.
You can find a range of entries by using wildcards.
Entries Found
This displays the number of existing entries found after you have selected the Find button.
Group By
The Group By menu allows you to group devices in the Selection screen according to a selected attribute,
such as the name of the company that owns the devices, or the location or category of the device as defined in
the Definition screen.
New
Use this to create a new entry.
Find
This lists any existing entries. The search can be narrowed if you enter a name/description/code first (if
provided).
All
Highlights all items listed.
Clear
Removes the highlighting from all items listed.
Open
Gives access to the details of the highlighted entry. Use this button after you have selected Find and
highlighted an entry with the mouse. Double-clicking on an entry has the same effect.
The Definition screen will be displayed.
Close
This takes you out of the screen. You will not lose any data.

Setting Up a LAN Chain


Note: For full details of LAN chains, please refer to the NIC Module Configuration Guide.

To set up a LAN chain, you need to:


1. Use the "Install/System/Clients" screen to specify the client that is to be used to communicate with the LAN
chain.
2. Use the "Install/System/Client Ports" screen to specify the port on the selected client that is to be used to
communicate with the LAN chain.
3. Set up the LAN chain using the "Install/Access Control/Chains/LAN" screen.
4. Carry out one of the following:
 For node LAN chains, set up each node on the chain using the "Install/Access Control/Node"
screen. You must specify one of these nodes to be the first node in the chain.
 For intrusion systems, use the "Install/Intrusion/Intrusion/System Configuration" screen to
define each intrusion system being used.
 For a Stentofon Alphacom intercom system, use the "Install/Video & Audio/Intercom/Clients"
screen to specify the client PCs that will be used to answer call requests.

464
Symmetry Software Reference Manual

 For an intrusion communications receiver, use the "Install/Intrusion/Communications


Receiver/Clients" screen to define each communications receiver being used.

Setting Up Barrier Controls


The following options in the "Operation/Controls/Control Points" screen enable you to set up an access point to
operate a device such as a barrier or light, or to grant access at a selected reader.

The Open Output and Close Output Options


Two output relays can be used to open and close a device such as a barrier at the access point. When the Open
button is pressed in the "Home/Monitoring/Controls" screen, the Open Output relay energizes and the Close
Output relay de-energizes. The reverse occurs when the Close button is pressed.
Note that the guard can set the Close button to operate automatically at a specified time by right-clicking in any
non-button area of the access point's panel in the "Home/Monitoring/Controls" screen.
You can set up the access point so that selecting the Open button in the "Home/Monitoring/Controls" screen opens
the door at a specified reader (a Grant Access command will be sent to the reader). To do this, select Access
Control Reader for the Output Type, and select the reader from the Open Output pull-down list.
If you do not want the Open and/or Close button to appear for the access point in the "Home/Monitoring/Controls"
screen, choose None for Open Output and/or Close Output.
About relay configuration

The Stop Output Option


A third output relay can be used to stop a barrier in an emergency. The Stop Output relay is energized when the
Stop button is pressed in the "Home/Monitoring/Controls" screen.
The relay is sometimes wired in series with the open and close relays, so that when it is energized it will open circuit
the open and close signals.
If no emergency stop button is required, select None for Stop Output. This will prevent the button from appearing
in the "Home/Monitoring/Controls" screen.
About relay configuration

The Button Text Options


You can customize the text that appears on the Open, Close and Stop buttons in the "Home/Monitoring/Controls"
screen by using the Open Button Text, Close Button Text and Stop Button Text options.

The Status Input Options


Two sensors can be used to feed back to the "Home/Monitoring/Controls" screen the current status of the device;
for example, whether the barrier is actually closed or open. This determines the color of the barrier status indicators
in the "Home/Monitoring/Controls" screen.
If this facility is required, select the two inputs being used for this purpose in the Open Status Input and Closed
Status Input pull-down lists. When the device is open, a green status indicator is displayed above the Open button
in the "Home/Monitoring/Controls" screen. When the device is closed, a red status indicator is displayed above the
Close button in the "Home/Monitoring/Controls" screen.
If sensors are not used, the status indicators can simply reflect whether the Open or Close button was last pressed
in the "Home/Monitoring/Controls" screen. Select None for this operation.
If you want to display no status indicators above the Open and Close buttons, select No Indicators in each pull-
down list.
A third sensor can also be used to indicate whether or not the device is in motion. If this is used, select the input
being used for this purpose in In Operation Status Input. When the sensor detects the device in motion, a yellow
status indicator is displayed between the Open and Close buttons. If the sensor is not used, the yellow status
indicator is lit only if the Stop button is pressed.
Connecting status inputs

465
Setting Up Output Points

Setting Up Output Points


An output point is a control point, where a device, such as a light, can be switched on or off.
You can set up the control buttons to be displayed for the output point in the "Home/Monitoring/Controls" screen by
using the following options in the "Operation/Controls/Control Points" screen (with an output point selected).

The Open/Close Output Options


A single output relay is used to switch the device at the control point on or off. The Output relay energizes when the
On button is pressed in the "Home/Monitoring/Controls" screen. The Output relay de-energizes when the Off
button is pressed.
The output relay will de-energize automatically after a predefined period of time if the installer has set up the output
relay to pulse.
About relay configuration

The Button Text Options


You can customize the text that appears on the On and Off buttons in the "Home/Monitoring/Controls" screen by
using the On Button Text and Off Button Text options.

The On/Off Status Input Options


Two sensors can be used to feed back to the "Home/Monitoring/Controls" screen the current status of the device;
that is, whether the device is actually on or off. If this facility is required, select the two inputs being used for this
purpose in On Status Input and Off Status Input.
When the device is on, a yellow status indicator will be illuminated above the On button in the
"Home/Monitoring/Controls" screen. When the input is off, a yellow status indicator will be illuminated above the Off
button.
If sensors are not used, the status indicators simply reflect whether the On or Off button was last pressed in the
"Home/Monitoring/Controls" screen.
If you select an input in one of the Status Input pull-down lists, you must select an input in the other.
Connecting status inputs

Setting Up a Traffic-Light Control


You can set up a traffic light button to be displayed for the control point in the "Home/Monitoring/Controls" screen by
using the following traffic-light options in the "Operation/Controls/Control Points" screen (with an access point
selected).

The Output Options


Two output relays are used to switch the traffic light at the control point between red and green.
If you wish to include a traffic-light button for the control point in the "Home/Monitoring/Controls" screen, select an
output relay in each of the two Output pull-down lists.
When a user of Symmetry selects the green traffic light in the "Home/Monitoring/Controls" screen, the specified
output relay for the red traffic light will energize and the specified output relay for the green traffic light will de-
energize. The traffic light should then show red in the "Home/Monitoring/Controls" screen.
Similarly, when the user selects the red traffic light, the specified output relay for the green traffic light will energize
and the specified output for the red traffic light will de-energize. The traffic light should then show green.
About relay configuration

The Status Input Options


Two sensors can be used to feed back to the "Home/Monitoring/Controls" screen the current status of the device;
that is, whether the traffic light is actually on green or red. This determines the color of the traffic-light button in the

466
Symmetry Software Reference Manual

"Home/Monitoring/Controls" screen. If this facility is required, select the two inputs being used for this purpose in
the two Status Input pull-down lists.
When the input for the green traffic light is on, the control point's traffic light will show green in the
"Home/Monitoring/Controls" screen. When the input for the red traffic light is on, the traffic light will show red in the
"Home/Monitoring/Controls" screen. Note that if the inputs are defined, but the inputs are not connected, the traffic
light will be grayed out in the "Home/Monitoring/Controls" screen.
If you select None in the Status Input pull-down lists, the color of the traffic light button in the
"Home/Monitoring/Controls" screen toggles between red and green for each press of the button.
Connecting status inputs

Storage Folder Screen

General
Use this screen to specify the location and maximum size of a storage folder.
You can select any folder on the network using the Browse button. If you specify a local path (such as
C:\My_Folder), the system will assume the storage folder is on the storage server.
Free space indicates the amount of available disk space on the whole of the drive that the folder is located.
Available space is the amount of disk space available within the amount specified by Use max.
Click Save to save changes, or Cancel to return without saving.
Standard user accounts should not be given access to the storage folders.

Note: To ensure availability of space, it is recommended that you select a folder on a partition dedicated to
storing Symmetry video recordings. If possible, you should not, for example, choose a folder on the partition
used by the Windows paging file (normally c:). When this is not possible, Use Max must not be more than 80%
of the total capacity of the partition.

Remote Storage Folders


If the folder is on a different machine, make sure that the path contains the full URL (including the machine name).
For example, \\Machine_Name\C_Disk\My_Folder. The account used for the SMSArchivedIndex,
SMSStreamingArchiver and SMSStreamingServer services on the Symmetry NVR must also be able to log into the
machine that contains the folder. The Local System account must not be used for the services in this case. Sharing
must also be set up for the storage folder - give Read and Change privileges to the account used for the services.

System Log Report ("Reports/Configuration/Reports"/System Log)


This report enables you to examine the contents of the system log. The log contains dates and times of when
Symmetry was started and stopped, when logs were purged, engineering messages from nodes and other
engineering/debug information.
Oldest, Previous, Next, Today and the date pull-down menu enable you to view the log contents for the required
date.
By default, the screen shows the latest record at the top of the screen. Items are displayed in reverse order if the
ActivityAndSystemReverseOrder ini file setting is set to "1".

Toggle Mode
When activated, toggle mode allows card holders to toggle a door between being in a permanently-locked or
permanently-unlocked state. When toggle mode is deactivated, the reader uses normal access control.
There are two types of toggle mode:
 Standard toggle mode. This is for readers whose node does not have Advanced Toggle Mode
Available selected in the "Install/Access Control/Node" screen. Toggle mode can be activated for

467
Understanding the Effect of the Activate and Deactivate Fields

each reader in the "Install/Access Control/Reader" screen. When activated, each valid access-
control transaction, exit-request transaction, or Grant Access command causes the door to toggle
between being permanently locked and permanently unlocked.
 Advanced toggle mode. This is for readers whose node has Advanced Toggle Mode Available
selected in the "Install/Access Control/Node" screen. Advanced toggle mode is supported by the
following nodes (with appropriate firmware - please contact your support representative for
details): M2150 2/4/8DBC, M2150 DBU+2/4/8DC, EN2DBC and SR (not elevator nodes).
Advanced toggle mode includes the same behavior as standard toggle mode, but also provides additional
functionality:
a) You activate or deactivate toggle mode in the same way as for standard toggle mode by selecting
Activate or Deactivate for Toggle mode in the "Install/Access Control/Reader" screen.
b) You activate or deactivate toggle mode using the Toggle Mode Activate and Toggle Mode Deactivate
commands. These are available as manual, scheduled and trigger commands.
c) If Toggle Mode Behaviour is set to Double Card Present in the "Install/Access Control/Reader"
screen, a card holder who has Allow Double Present Toggle Mode Activation set in the
"Home/Identity/Card Holders" screen can activate or deactivate toggle mode by presenting their card twice
at a reader. The two transactions must occur within the time period defined by Timeout (which is located
next to Toggle Mode Behaviour in the "Install/Access Control/Reader" screen), and the card must have
valid access rights to the reader. Presenting the card only once when toggle mode is deactivated causes a
normal access-control transaction.
Activating toggle mode in this way also unlocks the door, so it is not necessary to present the card a third
time to permanently unlock the door.

Note: Currently, only SR nodes support Double Card Present. The WIU (Wiegand Interface Unit) does
not support Double Card Present.

Allow Double Present Toggle Mode Activation is available only if enabled in the "Maintenance/User &
Preferences/Roles" screen (open "Home-Identity-Card Holders-Card Details-Options").
d) When Toggle Mode Behaviour is set to Double Card Present, you can also select All cards can
Lock when Double Card Present Active in the "Install/Access Control/Reader" screen. If selected,
presenting any card once will deactivate toggle mode and lock the door (assuming the reader has toggle
mode activated and the card has valid access rights to the reader). The door then operates in normal
access-control mode.
If All cards can Lock when Double Card Present Active is selected, activating toggle mode can be
carried out using any of the above methods, but the use of any card will deactivate toggle mode and lock
the door, and therefore the door cannot toggle between being permanently locked and permanently
unlocked with each card transaction.

Understanding the Effect of the Activate and Deactivate Fields

Introduction
You can set up access rights, scheduled commands and trigger commands to be activated by one threat level and
deactivated by another. The following figure shows how the two settings can be used to support various scenarios.

468
Symmetry Software Reference Manual

Scenario 1: Activate At Level = 2 and Deactivate At Level = 4


(Activate is lower than Deactivate)
Use this scenario for features that you want to be activated only for a specific threat level or range of levels. In
this example, selecting a threat level of 2 or 3 will activate the feature; selecting any other level will deactivate it.
Scenario 2: Activate At Level = 3 and Deactivate At Level = 2
(Activate is higher than Deactivate)
Use this scenario for features that you want to be deactivated only for a specific threat level or range of levels.
In this example, selecting a threat level of 2 will deactivate the feature; selecting any other level will activate it.
Scenario 3: Activate At Level = 2 and Deactivate At Level = None
(No Deactivate level set)
In this example, selecting a threat level of 1 will deactivate the feature; selecting any other level will activate it.
Setting Deactivate At Level to None ensures that the feature is activated at all levels above the Activate At
Level. Use this scenario for features that you want to be activated at all threat levels above a threshold, such as
to provide a guard with additional advanced access rights for all elevated threat levels.
Scenario 4: Activate At Level = 1 and Deactivate At Level = 2
(A variation on Scenario 1)
Use this scenario for features that you want to be deactivated at all threat levels above a threshold, such as to
suspend advanced access rights for ordinary staff for all elevated threat levels. In this example, selecting a
threat level of 1 will activate the feature; selecting any other level will deactivate it.
Scenario 5: Activate At Level = 1 and Deactivate At Level = None
(Always activated)
Selecting any threat level will activate the feature. Setting Deactivate At Level to None ensures that the feature
is activated at all levels above the Activate At Level, which is the lowest level in this case. Use this scenario for
features that you want to be constantly activated, irrespective of threat level.

Using Multiple and Temporary Cards


Selecting Multiple Cards in the "Maintenance/User & Preferences/System Preferences" screen allows you to
define multiple cards per card holder in the "Home/Identity/Card Holders" screen. Each card can have a different

469
Using the Pan, Tilt, Zoom Tab

card number. Multiple cards may be useful if, for example separate cards are needed for different sites, or if the
card holder requires a temporary card while the original is unavailable.
By default, you can define up to 10 cards per card holder; this limit can be changed using a setting in multimax.ini.
The Active Date, Inactive Date, Card Number, Facility/Customer Code and Card Issue Level can be different
for each of the card holder's cards. Other settings are common to all cards.
Note:
 Multiple cards are not available for visitors.
 In the Selection screen, each card belonging to a card holder is listed if Filter By causes the card
number to be displayed.
 Antipassback control applies to each card individually.

About Temporary Cards


One card can be a "temporary card", which could be used if, for example, the card holder has left his or her
standard card at home.
When a card holder has an active temporary card, only that card can be used to gain access; all other cards
belonging to the card holder are set to "Inactive".
When viewing the details of a temporary card, "Temporary Card" is displayed under the status icon in the Card
Details tab. "Temporary Card In Use" is displayed for all other cards.
When a temporary card has expired or is deleted, all other cards are returned to their original state, such as "Active"
or "Inactive".
Note: If Force Cardholder Inactive is set, all cards belonging to the card holder are made inactive, including any
temporary card.

Multiple/Temporary Card icons


The following icons appear in the "Home/Identity/Card Holders" screen if Multiple Cards is set in the
"Maintenance/User & Preferences/System Preferences" screen:

From left to right, the icons have the following meanings:


This allows you to scroll through the card holder's multiple cards.
Creates a new, non-temporary, multiple card.
Deletes the currently displayed card.
Creates a temporary card. The icon is grayed out once you have
created a temporary card.

Using the Pan, Tilt, Zoom Tab

Introduction
Purpose of this Tab
You can use the tab to:
 Specify whether the camera has pan, tilt or zoom controls.
 Set up a maximum of 999 presets for the camera, assuming the PTZ controller supports presets. A
preset defines a set position for a camera. When using the "Home/Video & Audio/Virtual Matrix"
screen, an operator can click a preset button to move the camera automatically to the predefined
position. A PTZ Preset command can also perform the same task.

Note: The options in this tab may vary, depending on the camera type.

470
Symmetry Software Reference Manual

Options
Address
The Address option is available only for some types of video server cameras. The option is used to specify the
address of the camera's PTZ controller.
The controller must be connected to the PTZ port on the video server. Each camera's PTZ controller connected
to this port requires a unique address, which must be set up in the controller itself and in the Pan/Tilt/Zoom tab.
Enable Pan/Tilt, Enable Zoom and Enable Focus
Select the required options to enable controls for the camera in this screen and in the "Home/Video &
Audio/Virtual Matrix" screen.
If required, you can set up different preset positions for the camera, then deselect Enable Pan/Tilt, Enable
Zoom and Enable Focus if you do not want to enable the controls in the "Home/Video & Audio/Virtual Matrix"
screen.
Pan, tilt and zoom operations may be carried out by a supported joystick.
Speed Multiplier
Increases the speed of pan and tilt by the specified factor.
Reverse PTZ
Select this option if the camera is mounted upside down and set to flip the image. The option will cause the pan
and tilt controls to operate as expected by the user.

Note: This option reverses the PTZ controls in the "Home/Video & Audio/Virtual Matrix" screen, but does not
reverse the operation of the controls on any external USB joystick that you may be using.

Presets
To define a new preset:
1. Use Enable Pan/Tilt, Enable Zoom and Enable Focus to select the controls that the camera supports.
2. Click Add and specify the preset description and number.
3. Click Live.
4. Select the preset in the list.
5. Position the camera and set the focus using the controls on the right-hand side of the tab.
6. Click Set.
Add
Click this button to define a new preset. You are prompted for the preset description and number.
Remove
Click this button to remove the selected preset.
Go to
Click this button to move the camera position and focus to those defined in the selected preset.
Set
Once you have selected a preset in the table and used the controls on the right-hand side of the tab to specify
the camera position and focus, click Set to store those settings.
Live
Select this option to view live video from the camera. You need to view live video to set up or review the
presets.

471
Using the Privacy Zones Tab

Using the Privacy Zones Tab


Select Enable Privacy Zones if you want to black-out or blur areas of the image. Select the Privacy Type.
To draw a privacy zone, press and hold down the left mouse button, then drag the mouse across the required
areas. You can remove areas of a privacy zone by performing the same action with the right mouse button.
Clicking Clear clears all privacy zones.
Clicking Select All sets the full image as a privacy zone; you can then clear areas using the right mouse button.
Invert sets any clear areas as privacy zones, and clears all currently defined privacy zones.
The Hide Privacy Zones privilege in the "Maintenance/User & Preferences/Roles" screen determines whether
users can view live or recorded video free of areas blurred or blacked out by privacy zones.

Using Wildcards

The "Match All" Wildcard


The * wildcard means "match anything" and is particularly useful if, for example, you do not know how spell a name
when finding a card holder.

For example:
Names in the system: Moran, Morgan, Morison, Morrison, Smith, Smithe
Entering * finds all names
Entering Mor* finds Moran, Morgan, Morison, Morrison
Entering Mor*son finds Morison, Morrison
Entering *ITH* finds Smith, Smithe
You can also use the * wildcard within numeric information, such as a card number. For example, 12* causes 12,
120, 121 and other numbers to be found. The * wildcard on its own has the same effect as specifying no name or
number.

The "Range" Wildcard


You can use the "-" wildcard to specify a numeric range. For example, in the "Home/Identity/Card Holders" screen,
if you want to find all card holders that have card numbers between 100 and 120 inclusive, you could perform a
Find with the card number specified as 100-120.

Video Replay Screen

Purpose of this Screen


You can use this screen to replay recorded video.

Displaying the Screen


The screen can be displayed by any of the following methods:
 From a Video Instant Replay command. You can replay the action leading up to the time the
command was executed.
 By clicking the Replay button when viewing an alarm associated with a recording created using a
Record Video trigger command. You can replay action recorded before and after the trigger
command was executed.
 By right-clicking on a cell in the "Home/Video & Audio/Virtual Matrix" screen and selecting Instant
Replay. This enables you to replay video recorded up to the time you selected the option. The

472
Symmetry Software Reference Manual

start time of the replayed recording is determined by Instant Replay in the "Maintenance/User &
Preferences/Accounts" screen. For example, if Instant Replay is 5 minutes, you can replay the
last 5 minutes of recorded video.

About the Time Line


The time line near the bottom of the screen shows the current position in the video recording. You can move the
slider to any position to start playback from a time of your choice.
Click here for a key to the colors used in the time line.

Screen Buttons
Click here for details of the buttons on the screen.

Workflow Alarm Conditions Screen ("Setup/Workflow/Workflow


Designer")
This screen is displayed by clicking Select in the Conditions area of the "Setup/Workflow/Workflow Designer"
screen. The Select option is available only if an alarm-based trigger is selected for the workflow.
The screen allows you to choose the types of alarm that will cause the workflow to trigger. For example, you can
choose the workflow to trigger only when there is a Door Forced alarm from a specific reader. By default, the
workflow is triggered by any type of alarm, with the exception of task alarms.
Using the Filter by menu, select the type of alarm you want to trigger the workflow, or leave the default setting of
<None> for all alarms from any type of device.
Note: The alarm condition can apply either to all types of device (by selecting <None>) or to only one type of
device.
If you want only specific devices to trigger the workflow, deselect the Include all option on the left side of the
screen, and select the required devices.
If you want only specific alarm messages to trigger the workflow, deselect the Include all option on the right side of
the screen, and select the required alarms.
Click here for a description of the alarm messages.

Workflow Designer Priority Screen ("Setup/Workflow/Workflow


Designer")
You can use this screen to set the priority of workflows that have the same trigger. The priority determines the order
in which the workflows are executed when the trigger occurs.
You can use the up and down arrow buttons to adjust the priority of the workflow you are currently editing. The
current workflow is the one that is listed without a padlock symbol.

Note: If a user cancels a workflow, all other workflows later in the execution order are also cancelled.

473
Hyperlinked Popup Topics

About Content
Content is a measure of how much of the information-rich region of the fingerprint has been captured. A low-content
score during fingerprint enrollment is typically a result of the finger not being properly centered on the finger pad, or
the fingerprint itself not being very well defined. In the latter case, it may be necessary to choose a different finger.
The content of an enrolled fingerprint must be greater than the minimum content specified in the "Maintenance/User
& Preferences/Accounts" screen.

About Quality
Quality is a measure of how well the fingerprint ridge pattern is defined. A low-quality score during fingerprint
enrollment may be the result of the finger not being placed with sufficient pressure on the finger pad, or an
excessively dry finger.
The quality of an enrolled fingerprint must be greater than the minimum quality specified in the "Maintenance/User
& Preferences/Accounts" screen.
Generally, a quality score of less than three is unacceptable.

About Relay Configuration


The installer can configure each output relay to operate continually once energized (until de-energized when the
appropriate button is selected in the "Home/Monitoring/Controls" screen, such as Open to de-energize the Close
Output relay), or to stay energized for only a specified pulse period. The choice of whether or not a pulse is
configured may depend on the output device's control equipment.

About the Locator Tab


This tab lists the last 25 reader transactions for the card.

Note: You may have no access to some tabs and buttons, depending on your user permissions, as set up in
the "Maintenance/User & Preferences/Roles" screen.

About the Personal Tab


Note: You may have no access to some tabs and buttons, depending on your user permissions, as set up in
the "Maintenance/User & Preferences/Roles" screen.

The Personal tab allows you to specify personal data such as gender, height, contact telephone number, etc.
Depending on how the personal data titles have been set up, it may be mandatory to specify data for some or all of
the titles. If there are mandatory fields, you will not be able to save changes until you have specified personal data
in them. Mandatory fields are shown with a red marker on the right-hand side.

Note: Your user permissions ("Maintenance/User & Preferences/Roles" screen) may stop you from accessing
groups of personal data titles in this screen.
Note: Click here for further details.

474
Symmetry Software Reference Manual

AC Power Fail
The mains supply to the node has been interrupted.

AC Power Restored
The mains supply to the node has been restored.

Access Codes
An access code is a pre-defined set of access rights, containing any number of reader group, reader, floor group or
area rights. (You can define access codes using the "Operation/Times/Access Codes" screen.)
Access codes can save time if you need to assign the same complex access rights to more than one person. For
example, you could set up an access code called Admin Staff containing all the access rights needed by the
people working in the Administration department.
Note: In Symmetry Global Edition systems, a card holder at a region can be assigned an access code from the
head office using global access codes. Please refer to the Symmetry Software User Guide for an introduction to
Global Edition.

Access Denied
Access was denied by a guard using the "Home/Identity/Verification" screen.

Access Requested
A node requested the guard to allow or deny access for a person who has used a reader that is in PC door control
mode.

Account, Area and Zone Number


This field is relevant only if a communications receiver is set up in the "Maintenance/User &
Preferences/System Preferences" screen.
The information can help an operator of a communications receiver that receives alarms from the Symmetry
software to identify the location of the alarm.
To send alarms to a communications receiver, you need to:
 Route alarms to the receiver using the "Operation/Alarms/Routing" screen.
 Specify the IP address and other settings of the communications receiver in the "Maintenance/User
& Preferences/System Preferences" screen.

Activate
Activates the command set up in the "Operation/Commands/Predefined" screen.

Activate Alarm
When this trigger command is actioned, an alarm command is automatically sent to the CCTV switcher unit.
When the switcher unit receives an alarm command, it performs some pre-programmed action. For example, if the
Activate Alarm command for "Camera 1" is sent, the switcher unit may switch the output of camera 1 to a bank of
video monitors. The effect of issuing an Activate Alarm command depends on how the selected camera has been
set up in the "Install/Video & Audio/CCTV/Camera" screen and how the switcher unit itself has been set up.
This command is applicable only when using an external CCTV switcher unit that supports the alarm feature.
Available as: trigger command.

Active
Indicates that the card can be used normally.

475
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Active
To list only those people who have a card status of "Active" (the card can be used normally).

Active
The visitor is currently signed in.

Active and Inactive Date


Enter or select a date if you want to list only those card holders that are active (as specified in the
"Home/Identity/Card Holders" Definition screen) for one or more dates on or between the Active Date and Inactive
Date.
If Active Date is blank, it means "any date up to the Inactive Date". If Inactive Date is blank, it means "any date
after the Active Date".

Active Date
The date on which the card is able to be used. The card is active from the start of the specified date. If the date is
the current date, the card can be used when you select Save, then close the Selection screen.

Activity Checkboxes
Use the checkboxes on the right-hand side of the screen to specify the types of alarms and events to include in the
report. Click here for details of each option.

Adjusting the Picture Frame


Click and drag the pointer to define a frame around the area to use. You can enlarge or reduce the size of the frame
by dragging one of the frame's handles. You can also reposition the whole frame by clicking in the center and
dragging. Click OK when the frame is in the desired location.
The picture is stored in the database when you return to the Definition screen and select Save, Badge or Encode.
The aspect ratio can be adjusted using the HorizontalFaceRatio and VerticalFaceRatio settings in multimax.ini, as
described in the Software Installation Manual.

Advance and Retard Check 7 Days Prior


Selecting this option enables an Advance/Retard warning dialog to be displayed during the 7-day period before any
advance/retard date shown in the "Maintenance/Time/System Time" screen. The warning dialog is sent to the client
PC specified by Route Holiday/Advance/Retard Checks to in the "Maintenance/User & Preferences/System
Preferences" screen.

Advanced
To list only those people who have advanced access rights defined in the Card Details tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.

Advanced Access Rights Additive


Select this checkbox if you want advanced access rights (for example, set up in the Access Rights tab of the
"Home/Identity/Card Holders" screen) to add to the normal access rights, rather than replace them. Click here for
further information about advanced access rights.

Alarm Masking Requires Second User


Selecting this option forces a second person to enter their username and password when an alarm is masked.
Please refer to Masking Alarms for further information.

476
Symmetry Software Reference Manual

Alarm Masking Requires Second User


When set, a user of the Symmetry software (other than the logged-in user) must enter their username and
password when an alarm is masked in the "Home/Monitoring/Alarms" screen.

Note: Both the logged-in user and second user require the Allow Alarm Masking privilege set in the
"Maintenance/User & Preferences/Roles" screen.

All
This selects all the card holders or visitors listed. After using the button, you may want to deselect individual entries
using Ctrl-click.
Use the >> button to move records selected in the left-hand area to the right. Use the << button to move records
selected in the right-hand area to the left. Amendments operate on only those records listed in the right-hand area.

All
To list all, irrespective of status.

All Entries and Or Select Below


Select All Entries if you want to report on every action taken by the user(s).
Selecting Or Select Below displays the screen names that the user(s) can access; only operations in the selected
screens will be reported (press the Shift or Ctrl key before clicking to select a range of screens).

All Patrols or This Patrol Tour


Select All Patrols if you want the report to include all patrol tours set up for the companies in your company group
or in the selected company.
Select This Patrol Tour to select a single patrol tour to report on. Only those patrol tours set up for the companies
in your company group or in the selected company are listed.

All Users and Or By User


Select All Users if you want to report on all the users who belong to the selected companies.
Select Or By User if you want to report on a single user (select the user from the pull-down list). The <Other>
setting was introduced for multi-lane video verification, but is not currently used.

Allow area arming with active zones on exit route


This option is available only if you have System Admin privileges (as specified in the "Maintenance/User &
Preferences/Roles" screen), and is relevant only for M2150 intrusion systems. Selecting the option allows you to
start the arming sequence, even if a zone that is on the entry/exit route is active. If a zone remains active after the
exit timer has expired, the affected area is not armed and an Area Failed to Arm alarm is generated.
You may want to select the option if the arming/disarming reader is in view of a zone sensor on the entry/exit route.

Allow Double Present Toggle Mode Activation


This option is relevant if Toggle Mode Behaviour is set to Double Card Present in the "Install/Access
Control/Readers" screen. If selected, the card holder can active or deactivate toggle mode at a reader by
presenting their card twice within a specified time period.
This option is available only if enabled in the "Maintenance/User & Preferences/Roles" screen (open "Home-
Identity-Card Holders-Card Details-Options").
About toggle mode

Allow Use of Old Passwords


Selecting this option enables users of Symmetry to reuse their current password when changing their password.

477
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Allow Visitor Management Login for this Cardholder


Select this option if you want the card holder to be able to log in to the Symmetry software for visitor management
(to enter or modify the details of his/her own visitors). Specify a login username and password.
Click here for further information.

An NVR Device Plugin Failed to Load


The Symmetry NVR has failed to load the software plugin.

Ancillary Off
Switches off the selected CCTV switcher ancillary device.
Available as: manual, scheduled or trigger command.

Ancillary On
Switches on the selected CCTV switcher ancillary device.
When using this as part of a trigger command ("Operation/Commands/Trigger"), you may, for example, want to
switch on a camera's infra-red illuminator when a daylight sensor (a monitor point) detects darkness.
Available as: manual, scheduled or trigger command.

Answered Call
A client PC has answered a telephone call from a remote chain or from a dial-out alarms site.

Antipassback Hard/Soft
Readers can be installed as antipassback readers to prevent people from 'passing back' their card to a second
person to gain entry or exit. There are two forms of antipassback:
 Antipassback Hard - The person has attempted to break the antipassback rules. Access was not
granted, since the reader has been installed as a 'hard' antipassback reader.
 Antipassback Soft - The person has broken the antipassback rules, but was granted access,
because the reader has been installed as a 'soft' antipassback reader.
Click here for additional information about using these messages in trigger commands.
Click here for an overview of antipassback.

Aperio Battery Flat


The battery in the Aperio lock is flat and needs to be replaced immediately. The lock may not be operating.

Aperio Battery Low


The battery in the Aperio lock needs to be replaced at the earliest opportunity. Failure to do so may stop the lock
from operating.

Aperio Battery OK
The battery in the Aperio lock has been replaced following a "Battery Low" alarm.

Aperio Bolt Position


This indicates the current position of the bolt in the Aperio lock.

Aperio Device Offline


The Aperio lock is not communicating with its hub.

478
Symmetry Software Reference Manual

Aperio Device Online


The Aperio lock is now communicating with its hub following a "Device Offline" alarm.

Aperio DIU Restarted


Power to the Aperio hub has been reapplied.

Aperio DIU Watchdog Reset


The Aperio hub has been reset by its internal watchdog.

Aperio Door Position


Indicates the current position of a door controlled by an Aperio lock (open or closed).

Aperio Door Tamper


A tamper condition has been detected at an Aperio lock.

Aperio Handle Position


This indicates that the handle of an Aperio lock has been moved into the open or closed position.

Aperio Radio Disturbance Cleared


A disturbance of the wireless signal to an Aperio lock has been cleared following a "Radio Disturbance Detected"
alarm.

Aperio Radio Disturbance Detected


A disturbance of the wireless signal to an Aperio lock has been detected.

Apply
Saves changes without closing the screen. If you can see the filter tab in the "Home/Monitoring/Alarms" screen, you
can see the effects of your changes without closing the Alarm Filters screen.

Approving Official
If necessary, select the name of the person who has authorized you to issue the person's badge. The names of the
approving officials are defined in the "Setup/Identity/Approving Official" screen.
If Approving Official is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences"
screen, it is mandatory to select an approving official.
The "Setup/Identity/Approving Official" screen specifies the approving official's authority period. Only those
approving officials that have an authority period that includes the current date are available for selection.
Clicking the button to the right of the Approving Official field displays the approving official's signature, as captured
in the "Setup/Identity/Approving Official" screen.

Approving Official is Mandatory


If this option is selected, it is mandatory for an approving official to be specified in the "Home/Identity/Card Holders"
or "Home/Identity/Visitors" screen.

Archiving Failed
Video files from the hard disk of an Edge Network Video Server have not transferred successfully to the FTP server.

479
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Archiving Succeeded
Video files from the hard disk of an Edge Network Video Server have been transferred to the FTP server
successfully.

Area Arm Time Changed


The time of the next auto-arm of the area was changed.

Area Armed
An intrusion area was armed.

Area Armed Early


The M2150 intrusion area was armed too early, as specified by the schedule in the Arm/Disarm Warnings tab of the
"Setup/Device Groups/Intrusion Areas" screen.

Area Armed with Security Reduced


This is applicable only to Bosch B9512G, DSC, ThorGuard and CU30 systems. An area that has security reduced
may be the result of only partially arming the area.

Area Disarmed
An intrusion area was disarmed.

Area Disarmed Outside Schedule


The M2150 intrusion area was disarmed too early, as specified by the schedule in the Arm/Disarm Warnings tab of
the "Setup/Device Groups/Intrusion Areas" screen.

Area Failed to Arm


An M2150 intrusion area failed to arm. A zone may have been active when the operator attempted to arm the area.

Area in Alarm
An intrusion area is in an alarm condition.

Area Late To Arm


The M2150 intrusion area was armed too late, as specified by the schedule in the Arm/Disarm Warnings tab of the
"Setup/Device Groups/Intrusion Areas" screen.

Area Late to Disarm


The M2150 intrusion area was disarmed too late, as specified by the schedule in the Arm/Disarm Warnings tab of
the "Setup/Device Groups/Intrusion Areas" screen.

Area Occupancy Card


Choose this option if the person is going to use readers to gain entry and exit from an area that has a controlled
occupancy count, as set up in the "Setup/Identity/Area Occupancy" screen.

Area Reset
An intrusion area was reset from an alarm or fault condition. An area can be reset only by disarming the area or by
sending the Reset Area To Normal command.

480
Symmetry Software Reference Manual

Arrived Too Early At Point


The guard arrived too early at a patrol tour point.

Arriving and Departing


Use these options to list visitors whose possible dates on site (as specified by the arrival and departure dates in the
"Home/Identity/Visitors" Definition screen) include a date within the period defined by Arriving and Departing.
If Arriving is blank, it means "any date up to the Departing date". If Departing is blank, it means "any date after
the Arriving date".
The dates default to today if Visitor Selection By Today is selected in the "Maintenance/User & Preferences/Client
Preferences" screen (except if you have selected the Visitor Card Number filter, since it is more likely that you are
attempting to find a previous visitor if you select this filter).

Arriving, Arriving Time, Departing and Departing Time


Specify the dates and times of arrival and departure. The dates and times you specify can affect the visitor status
shown in the Visitor Details tab.

Assign
This button displays the appropriate screen for assigning access rights.
For example, to assign the person normal access rights to a reader group, select Reader Groups in the Normal
Rights branch of the tree display then select Assign.
You can also select this option via the right-click menu from the appropriate entry in the tree view.

Assign
This button displays the appropriate screen for assigning access rights to this ID badge.
For example, to assign access rights to a reader group, select Reader Groups then click Assign.
You can also select this option via the right-click menu, from the appropriate entry in the tree view.

Assigned
This area lists the output group currently selected.

At Wrong Door
The person is known to the system, but was not granted access, because the reader that was used is not included
in the person's access rights (as assigned by using the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen), or the card has been blocked as a result of excessive PIN-entry errors (click here for more information
about blocked cards).
Click here for additional information about using this message in trigger commands.

At Wrong Time
The person is known to the system and is allowed to use the reader. However, the person was not granted access,
because the time that the card was used is not included in the person's access rights (as assigned by using the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen).
Click here for additional information about using this message in trigger commands.

Audio Activity Alarm


Not used.

Audio Activity Normal


Not used.

481
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Auto-Arm and Pre-arm Period


You can use scheduled commands ("Operation/Commands/Scheduled" screen) to arm M2150 intrusion areas
automatically at scheduled times.
The period before an auto-arm is known as the "pre-arm period", which is set up for each area in the "Setup/Device
Groups/Intrusion Areas" screen. The following occurs during the pre-arm period:
 All arming/disarming readers in the area beep to warn people to exit the area.
 If set up in "Setup/Device Groups/Intrusion Areas" screen, a selected auxiliary output switches on for
the whole of the pre-arm period.
Auto-arms can be delayed from the "Home/Monitoring/Command Center" screen or from an intrusion reader. The
"Home/Monitoring/Command Center" screen can also be used to start or stop the pre-arm timer.

Auto Card Number (Standard Card)


If this is selected, and you leave Card Number empty in the "Home/Identity/Card Holders" screen, a card number is
automatically allocated when you save the card holder's details. The system uses the lowest available unused card
number.
If Auto Card Number(Standard Card) is not selected and you leave Card Number empty for any type of card, a
card number of zero is saved. The card number can be modified at a later date.

Auto Card Number (Visitor Card)


If this is selected, and you leave Card Number empty in the "Home/Identity/Visitors" screen, a card number is
automatically allocated when you save the visitor's details. The system uses the lowest available unused card
number.
If Auto Card Number(VisitorCard) is not selected and you leave Card Number empty for any type of card, a card
number of zero is saved. The card number can be modified at a later date.

Auto Clear Alarm on Reset


The Auto Clear Alarm on Reset option in the "Maintenance/User & Preferences/System Preferences" screen
determines what happens when you attempt to clear an alarm that requires a reset. For example, if you try to clear
a monitor-point alarm in the "Home/Monitoring/Alarms" screen when the monitor point is still in its alarm state (e.g.
the window it is monitoring is still open).
If Auto Clear Alarm on Resetis not set, you will not be able to clear an alarm that requires a reset (see note 1). In
this case, the alarm is shown in blue (by default), and you will be able to clear it only after the alarm has reset
(shown in green, by default).
If Auto Clear Alarm on Resetis set an alarm that requires a reset can clear automatically after you have
attempted to clear it manually. The option you select from the menu determines the behavior:
 Clear Automatically - After you have attempted to clear the alarm manually, the alarm will clear
automatically when the device or condition that requires a reset returns to its normal state.
 Prompt User - When you attempt to clear the alarm manually, a prompt is displayed for you to
choose whether to allow the alarm to clear automatically when the device or condition returns to its
normal state. If you select multiple alarms, the prompt is displayed only if at least one alarm
requires a reset.
When an alarm is cleared automatically, the comment "Alarm cleared automatically by system" is added to the
alarm record.
Note 1: You can clear alarms that require a reset if you have System Admin privileges in the "Maintenance/User &
Preferences/Roles" screen.

Auto Delete Expired Cards


If you select this option, at the end of each day Symmetry will check all cards that have an expired status, as
indicated in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen. With the exception of a temporary
card, any cards that have been expired for the specified number of days (Expired Days) are automatically deleted.

482
Symmetry Software Reference Manual

Note: See also the Delete Inactive Or Expired Multiple Cards preference. If a card holder has multiple cards,
this preference is able to delete all cards other than the primary card or a temporary card that are expired OR
inactive. Auto Delete Expired Cards is able to delete all cards, including the primary.

Auto Display Graphic on Call Request


Select this option if you want the "Home/Monitoring/Graphics" screen to be automatically displayed when an
intercom call request is received from any intercom that has a graphic.
If a graphic hierarchy has been defined, the "Home/Monitoring/Graphics" screen will display the highest-level
graphic containing the intercom.
A graphic is displayed only if the "Home/Video & Audio/Intercom Control" screen is not open (if the "Home/Video &
Audio/Intercom Control" screen is open, the software assumes that the user would prefer to continue to use this
screen).
If a graphic is already open when a new call request is received, and the call request is from a Call Station linked to
a different graphic, the system will not automatically display the associated graphic.

Auto Logoff Time


This setting is used only if the same setting in the logged-on user's role (as specified in the "Maintenance/User &
Preferences/Roles" screen) is set to zero (0).
The user is logged off automatically from Symmetry if there is no keyboard or mouse activity after number of
minutes specified by Auto Logoff Time. This is a security measure to prevent unauthorized use of the system.
When no user is logged in at the client, alarms are displayed on the logon screen (if appropriate to the type of client
being used).
Entering a value of zero (0) disables auto-logoff, providing the same setting is also set to zero in the logged-on
user's role.

Auto Set Unused Cards Expired / Card Expiry Applies


If you select Auto Set Unused Cards Expired, any cards that remain unused for the specified number of days are
automatically set to an expired status (that is, they will no longer be able to be used to gain access). Use Card
Expiry Applies to specify whether the rule applies to all cards, or only those with or without a badge design.
Any card marked as an Executive Card in the "Home/Identity/Card Holders" screen is exempt from this rule.
The Symmetry services running at the server check whether or not to expire cards at the end of each day. For each
card, the system determines the last date that the card was used, or if it has not been used, the card's Active Date.
The card is set to an expired status if the specified number of days from this date has been exceeded.
You can use the "Reports/Identity Reports/Access" screen to find out which cards have not been used for a
specified number of days and therefore are at risk of expiring.
The Auto Delete Expired Cards or Delete Inactive Or Expired Multiple Cards preference can automatically
delete expired cards.

Auto Unassign Expired Visitor Cards


If selected, the name of any assigned visitor escort is automatically removed from a visitor card when the visitor
card expires.

Auto Update
Select this option if you want the system to carry out an automatic refresh of the Selection screen at periodic
intervals, as specified by the Minutes field. For example, if you enter 10 in Minutes, the system will refresh the
screen every ten minutes at the PC you are currently using. This ensures that any changes of visitor status made
from data imports or RDS/Citrix Clients are automatically displayed at the PC you are currently using.

Note: It is not necessary to select Auto Update to enable changes made at other Symmetry clients to be
shown in the screen. The screen is automatically updated when changes occur at other Symmetry clients.

483
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

To prevent the screen from being updated while you are entering or modifying selection options, the system waits
for a period of one minute before refreshing the Selection screen with an Auto Update.
The refresh period can be a different value at different Symmetry PCs.

<<
This moves the people you have selected in the right-hand area of the screen into the left-hand area.
Any amendments you make operate on only those people listed in the right-hand area of the screen.

Background Image File Name


Displays the name of the background image to display in the main window.

Badge
This button saves any changes you have made (the same as Save) and displays a screen that allows you to
preview and print the badge (optionally encoding a badge at the same time).
Before selecting this button, select the person's badge design, picture, signature, etc.
You may not have access to the button, depending on your user permissions, as set up in the "Maintenance/User &
Preferences/Roles" screen.

Badge Design
Use this to select the badge design, which determines the appearance of the person's badge or card, including the
positions of the signature and picture, if appropriate. The badge design is set up using the "Setup/Identity/Badge
Designer" screen. You can select only those badge designs defined for the currently selected company.
A default badge design can be set up in the "Setup/Identity/Badge Designer" screen.
The badge design can also specify the card’s default normal access rights, such as the times at which the card is
allowed to be used to open doors or other access points. If the badge design specifies any default access rights
and you have privileges to modify the normal access rights ("Maintenance/User & Preferences/Roles" screen), you
are prompted to specify whether or not to overwrite the existing normal access rights when you select the badge
design.
No similar prompt is displayed if a badge design is already selected and you modify the normal access rights (the
changes you make will override the access rights associated with the badge design).

Badge Expires
After you have selected a Badge Design, this field shows the card expiry date, assuming an expiry period has
been set in the "Setup/Identity/Badge Designer" screen.
The expiry period determines the length of time from the Active date that the card is valid. The card will not be able
to be used from midnight on the expiry date, irrespective of access rights. For example, if the expiry date is 6th
December, the card will not be able to be used from the beginning of 7th December, and the status of the card will
change to Expired.
This field is blank if the badge design does not have an expiry period specified.

Badges Flagged for Batch Printing


This option selects only those people who have the Set for Batch Printing option set in the Card Details tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.

Badges Flagged for Batch Printing


If you select this option, everyone who has the Set for Batch Printing option set in their card details is listed when
you select the Find button.
Your next action depends on how the system was set up by the installer. Normally, you should upload (and
therefore clear) the event buffer as soon as possible using the "Maintenance/Access Control/Upload" screen(please
read the guidelines in the online help for this screen). However, if the installer has set the appropriate parameter in
the ini file, the upload occurs immediately.

484
Symmetry Software Reference Manual

If you receive this alarm regularly, consider asking the installer to increase the frequency of the scheduled uploads.

By Company Group or By Company


By Company Group - If you are running a report that is not a predefined report, use this option to report on all
companies in your company group. If you are configuring a predefined report and select By Company Group, only
operators who have the same company group as yourself are able to configure and run the report.
By Company - If you have more than one company in your company group, you can choose a specific company to
report on by selecting By Company, followed by the company name in the pull-down list. For predefined reports,
only operators who have the company in their company group are able to configure and run the report. The report
will contain only data associated with the selected company, and data not associated with any company.
If Filter by Company in the "Maintenance/User & Preferences/Client Preferences" screen is selected, these
options are grayed out and By Company is set to the name of the currently selected company.

By Date and Time


Creates a bookmark/video clip that has a time span defined by the From and To fields.
The default for From is the start date and time of the currently displayed video clip. The default for To is the end
date and time of the currently displayed video clip.
Time zone is a read-only field that shows the time zone in which the video clip was recorded.

Call Forwarded
A user of the "Home/Video & Audio/Intercom" screen has forwarded a call from an intercom to another intercom.

Call Missed
A user of the "Home/Video & Audio/Intercom" screen has missed a call from an intercom.

Call on Hold
A user of the "Home/Video & Audio/Intercom" screen has placed a call from an intercom on hold.

Call Request
A call request can be generated by the caller pressing a button at the remote intercom or by the caller's vehicle
driving over a detection loop in the road. The method used for each intercom is specified in the "Install/Video &
Audio/CCTV/Control Intercom" screen.

Call Request
A call has originated from an intercom. The message includes the name of the intercom and, if applicable, the call
request ID generated by the intercom.
The call can be answered from the "Home/Video & Audio/Intercom" or "Home/Video & Audio/Intercom Control"
screen, depending on the intercom type.

Call Taken
A user of the "Home/Video & Audio/Intercom" screen has answered a call from an intercom.

Camera
This read-only field shows the name of the camera you have selected.

Camera Restarted
This indicates that an IP camera has been restarted. This message may not be available for all types of camera,
and may require event configuration using the camera web interface.

485
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Camera Tour Time


This specifies the default length of time (in seconds) that each camera image is displayed during a camera tour in
the "Home/Video & Audio/Virtual Matrix" screen.

Camera/Monitor Name
(Command text depends on camera/monitor name defined by installer.) This command switches the video of the
selected camera to a specified monitor output of the CCTV switcher unit. This command is applicable only when
using an external CCTV switcher unit.
The pictures from a single camera can be displayed on two or more monitors by sending separate commands. For
example, if you want to display camera 1 on monitors 2 and 3, send two commands: one specifying camera 1 and
monitor 2, and the other camera 1 and monitor 3.
For a scheduled command ("Operation/Commands/Scheduled"), the camera selected by the Start Command is
switched to the monitor at every start time in the time code. The camera selected by the Stop Command is
switched to the monitor at every end time in the time code.
Available as: manual, scheduled or trigger command.

Cameras and Camera Groups


This is used to report on alarms/events associated with cameras.
Choose Cameras to produce a report of all alarms/event from a specified camera, or from all cameras.
Choose Camera Groups to produce a report of all alarms/event from a specified camera group, or from all camera
groups.
Choose None if you do not want to report on camera alarms and events.

Cancel
This takes you out of the screen without saving any changes.

Cancel
Select this button to exit from the screen without producing the report.

Card + PIN
Puts the reader in card-and-pin mode; that is, the card owner must enter a PIN after presenting the card. Executive
card holders, as set up in the "Home/Identity/Card Holders" screen, do not have to enter a PIN when a reader is in
card-and-PIN mode (but do when the reader is in user-code-and-PIN mode). This command is ignored if the reader
does not have a keypad.
Available as: manual, scheduled or trigger command.
The Card + PIN command is recognized, even if the reader is disabled. (However, the reader can only read cards
and PINs when it is enabled.)
Sending the Card Only and Card + PIN commands has no effect on User Code + PIN mode or User Code Only
mode. For example, a reader can be set for both Card + PIN and User Code Only. In this case, when the person
presents the card, a PIN has to be entered, but if user-code mode is on, the person can enter the card number
without a PIN.

Card Command (1 to 99)


The card holder has generated a card command of the specified number. If you are using this message as part of a
trigger command, enter the card-command number in the Command No box.
About Card Commands.

Card Command Mode


Card Command Mode On - Enables the reader to be used to issue card commands.
Card Command Mode Off - Stops the reader from being able to be used to issue card commands.

486
Symmetry Software Reference Manual

About Card Commands


Available as: manual, scheduled or trigger command.

Card Data Request


A node has requested information about a card when in learn mode.

Card Data Title


Use this option and leave the boxes blank if you want to list card holders or visitors who have information specified
for the selected personal data titles.

Note: The option is not available is <All Companies> is selected in the Company menu, as personal data titles
can be company-specific.

If you choose And, only people who have information specified for both titles are listed. If you choose Or, people
who have information specified for one or both titles are listed.
By typing specific personal information in the Card Data boxes, you can be selective about the card holders or
visitors listed. For example:
 First Card Data Title = "Course Name", with "Science Year 1" entered in the Card Data box.
 Or selected.
 Second Card Data Title = "Course Name", with "Science Year 2" entered in the Card Data box.
In this example, all people who have a "Course Name" of "Science Year 1" or "Science Year 2" will be listed when
you select Find.
You can use wildcards if required.

Card Data Title


Select a particular Card Data Title and leave the Card Data box blank to list all card holders (excluding visitors)
who have information specified for that card data title. By typing specific personal information in the Card Data box,
you can be even more selective about the card holders to include. You can use wildcards if required.

Card Expired
The card is known to the system, but has been used after it has expired (as shown in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen). The person was not given access.
Click here for additional information about using this message in trigger commands.

Card Holder on Vacation


The card holder has attempted to gain access during a vacation, as set up in the Vacation tab of the
"Home/Identity/Card Holders" screen.
Access is not allowed during vacations.

Card Holders Associated with an Area


Select this to list people who have a specific M2150 intrusion area in their access rights. Select the appropriate
intrusion area from the pull-down list.

Card Holders by Company


This option in the "Maintenance/User & Preferences/System Preferences" screen has an effect on the card holders
or visitors a user can view or edit in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.
If the option is selected (the default), you can view only those people who are associated with the currently-selected
company.
If deselected:

487
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

 You are given view-only access to the Card Details, Personal and Biometrics tabs for any person
from any company.
 For all companies, you are able to add and remove access rights that include readers or other items
belonging to the currently-selected company. You are not able to view access rights that include
readers or other items belonging to another company.

Card Holders Who Can Access This Door


Select this to list people who have access through a specific door. Select the appropriate reader from the pull-down
list.

Card Inhibition Period


This system preference applies if PIN Code Errors is set to Inhibit Card on PIN Error in the Modes tab of the
"Install/Access Control/Reader" screen. The setting specifies the length of time to suspend a card if the card holder
enters their PIN a specified number of times.
Click here for further details.

Card Issue Level


This option is available only if the card technology used allows an issue number to be included on the card (as
specified in the "Maintenance/User & Preferences/System Preferences" screen).
This specifies the card's issue number (in the range 0 to 7).
If an earlier issue of the card is used, the reader generates the 'Wrong Issue Number' alarm/event and the card is
not granted access.
You may want to increase the issue level if the card has been lost or damaged and you need to print a new card.

Card Issue Levels


If the card technology being used allows an issue number to be included on the card, select this option. Doing so
enables the Card Issue Leveloption in the "Home/Identity/Card Holders" and "Home/Identity/Visitors" screen.If a
card is lost, the card technology enables a new card to be made that has the same card number, but a higher issue
number. If an earlier issue of the card is used, the reader generates the 'Wrong Issue Number' alarm/event and the
card is not granted access.

Card Lost
Select this option if the card has been lost or stolen. If selected, the card cannot be used to gain access. If the card
is used, the reader generates a "Lost Card" alarm/event.

Card Name
Select this option if you want to list existing people by first and/or last name.
If you want to be selective about the people to list, type the first and/or last name in the box(es). For example, if you
want to find everyone who has a last name of Smith, type Smith in the Last Name box before clicking Find.
You can use wildcards if required.

Card Name
Select this option if you want to find card holders (excluding visitors) by name.
If you want to be selective about the card holders to list, type the last name and/or first name in the box. For
example, if you want to find all card holders who have a last name of Clarke, type Clarke in the Last Name box.
You can use wildcards if required.

Card Number
Select this option if you want to find existing cards by card number.
If you want to be selective about the cards to list, type the card number in the box.

488
Symmetry Software Reference Manual

If you select a Facility/Customer Code, only those cards that have the selected facility/customer code will be
listed. You can leave the Card Number box blank to list all cards that have the selected facility/customer code. If
you have selected a company from the Company menu, the Facility/Customer Code menu includes only those
facility/customer codes that belong to the selected company.
Visitors are included in the cards found, except when using the "Home/Identity/Card Holders" screen, and when
using the "Home/Identity/Bulk Card Amendments" screen with Visitor Cards deselected.
You can use wildcards if required.
Card holders and visitors can have a card number of zero shown in the Selection screen. This indicates that a card
number has not been allocated.

Card Only
This command puts the reader into card-only mode; there is no need to enter a PIN. You may want to use this
command at busy times of the day.
Available as: manual, scheduled or trigger command.
The Card Only command is recognized, even if the reader is disabled. (However, the reader can only read cards
and PINs when it is enabled.)
Sending the Card Only and Card + PIN commands has no effect on User Code + PIN mode or User Code Only
mode. For example, a reader can be set for both Card + PIN and User Code Only. In this case, when the person
presents the card, a PIN has to be entered, but if user-code mode is on, the person can enter the card number
without a PIN.

Card Suspended
A card has been temporarily suspended because the card holder has entered their PIN incorrectly a specified
number of times at the reader.
Click here for further details.

Card User PIN Changes


Select this if you want the report to include changes of card PIN number, as actioned by card holders from keypad
readers (Series 6xx or later).
It is possible for a card holder to change his/her PIN from a reader only if the Command Card Holder option is set
in the "Home/Identity/Card Holders" screen, and the reader has the User Initiated PIN option set in the
"Install/Access Control/Reader" screen.
For further information, see About Card Commands.

Card Watch
If selected, the card can be used normally, but the reader generates a "Cardwatch" alarm/event, which allows the
movements of the person to be "watched".

Cardholder Deactivated-Secondary Expiry


The card has been automatically set to inactive in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
Deactivation was caused by an expiry date in the card holder's personal data. For example, an insurance policy or
qualification may have expired.
The personal data title set up in the "Setup/Identity/Personal Data/Card Holder Titles" or "Setup/Identity/Personal
Data/Visitor Titles" screen has a Field Type of Expiry Date.

Cards Deactivated at this Threat Level


Select this to list people who have Deactivate at Level set to the specified threat level in the Card Details tab of the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.

489
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Cards Expiring Between Badge Date


Select this to list people who have a badge design expiration date (as displayed in the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen) that matches or falls between the two specified dates.

Cards Expiring Between Inactive Date


Select this to list people who have a card inactive date (as displayed in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen) that matches or falls between the two specified dates.

Cards Not Used From


This option enables you to list all cards (including visitor cards) that have not been used since a specified date.
Cards that have not been used on or after the specified date are listed.

Cards Unused For This Number of Days Prior To Today


Select this to list cards that have not been used for the specified number of days.
You may want to use this option to list cards that have expired or are at risk of expiring by the Auto Set Unused
Cards Expired rule in the "Maintenance/User & Preferences/System Preferences" screen.
Selecting this option displays a subfilter option, which allows you to filter the content of the report by a selected
access code, reader group or reader.

Cards Using This Access Code


Select this to list people who have a specific access code in their access rights. Select the appropriate access code
from the pull-down list.

Cards Using This Door


Select this to list people who have a specific SALTO door in their access rights (including in an assigned door
group). Select the appropriate door from the pull-down list.
This filter is available only if the Disconnected Doors license is installed, as described in the Disconnected Doors
Installation and User Guide.

Cards Using This Door Group


Select this to list people who have a specific SALTO door group in their access rights. Select the appropriate door
group from the pull-down list.
This filter is available only if the Disconnected Doors license is installed, as described in the Disconnected Doors
Installation and User Guide.

Cards Associated with a Floor/Output Group


Select this to list people who use a specific floor group, output group or shared floor group in their access rights.
Select the appropriate group from the pull-down list.

Cards Using This Reader Group


Select this to list people who use a specific reader group (or a shared reader group) in their access rights. Select
the appropriate group from the pull-down list.

Cards Using This Time Code


Select this to list people who have a specific time code in their access rights. Select the appropriate time code from
the pull-down list.

490
Symmetry Software Reference Manual

Cards Using This Time Zone


Select this to list people who have a specific SALTO time zone in their access rights. Select the appropriate time
zone from the pull-down list.
This filter is available only if the Disconnected Doors license is installed, as described in the Disconnected Doors
Installation and User Guide.

Cardwatch
The card used has a status of Cardwatch (as set up by using the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen). This status causes the card to be 'watched'. The person was granted access in the
normal way. In addition, a 'Granted Access' alarm/event is generated.
Click here for additional information about using this message in trigger commands.

Category
You can use this optional menu to select a category for the device. You can type the category in the field or select
an existing category that you have previously typed.
You can filter records by category in the Selection screen. The Selection List Rows Limit option in the
"Maintenance/User & Preferences/Client Preferences" screen determines the maximum number of devices listed.
The category can also be displayed when viewing alarms and activity (e.g. in the "Home/Monitoring/Alarms" and
"Home/Monitoring/Activity" screens).

Change Active Date to


Select this option if you want to change the active date of the selected cards. A card can be used on or after its
active date.

Change Badge Design to


Select this option if you want to change the badge design for the selected card holders or visitors.
More

Change Inactive Date to


Select this option if you want to change the inactive date of the selected cards.
More

Change Permissions to
You can use this option to select the user roles (as defined in the "Maintenance/User & Preferences/Roles" screen)
that will have access to use the card holder records. The option is available if Enable Permissions is selected in
your user permissions ("Maintenance/User & Preferences/Accounts" screen).

Change Threat Level


You can use the Change Threat Level command in the "Operation/Commands/Trigger" screen to change the
threat level when an alarm or event occurs.

Clear
This deselects all the people listed.

Clear
Choose this option to remove the picture.

491
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Clear
Select this option to clear the enrolled fingerprint(s). You may want to use this option to clear any record of the
person's fingerprints from the database. There is no need to use this option if you want to re-enroll new
fingerprint(s).

Clear
Returns the screen to the default selections.

Clear Alarm if Cleared on Intrusion Panel


When this is selected, clearing an alarm at an intrusion panel automatically clears the alarm in the Symmetry
software.
This option is available only if the Full Intrusion Management software is installed.

Clear Call
Clears the call request without answering.

Client/Server Offline
A client PC or the server is no longer communicating over the network. The server watches for clients that go
offline, and clients that have alarms routed to them watch for the server going offline.
In the case of a server, the alarm/event message is generated the next time the server goes online. A server may
go offline if the Symmetry services at the server have been shut down.
If the server has been offline for some time, a pop-up warning message is also displayed at clients: "The server
machine appears to be offline". The server need not come back online for this message to be displayed.

Client/Server Online
A client PC or the server is now communicating over the network after being offline. The server watches for clients
that go offline, and clients that have alarms routed to them watch for the server going offline.

Clock Advanced
This indicates that the node clock has been advanced by the amount shown in the "Maintenance/Time/System
Time" screen.

Clock Advanced
This indicates that the clock at each client PC has been advanced by the amount shown in the
"Maintenance/Time/System Time" screen.

Clock Retarded
This indicates that the node clock has been retarded by the amount shown in the "Maintenance/Time/System Time"
screen.

Clock Retarded
This indicates that clock at each client PC has been retarded by the amount shown in the
"Maintenance/Time/System Time" screen.

Close
This takes you out of the screen. You will not lose any data.

492
Symmetry Software Reference Manual

Close
Click this button if the visitor is no longer expected. The visitor status changes to closed and the departure date and
time are set to the current date and time.

Closed
The visitor is not currently signed in and the departure date and time are in the past. This indicates that an
additional visit is not planned.

Collapse
This button fully collapses the currently-selected item in the tree view.

Command Line Logon


Selecting this option enables a user to start and automatically log on to the Symmetry Software by specifying the
username and password in the Windows command line. This feature can be useful to allow casual users of
Symmetry to log on easily (for example, for visitor enrollment).
To start and log in from a Windows shortcut, use the following command format in the Target field of the shortcut
properties:
"Path to Symmetry.exe" /u"UserName" /p"Password"
For example:
"C:\Program Files\Security Management System\Symmetry.exe" /u"alanc" /p"mypassword"
To start and log in from the Windows Start/Run dialog, type the following:
symmetry/u"UserName" /p"Password"
For example:
symmetry/u"alanc" /p"mypassword"
If secure logon is enabled, the user will be prompted to present the fingerprint or smart card in the normal way.

Command Rejected - Node Locked Out


A change in the Symmetry software has been rejected by a node that is in lock-out mode.

Comms Receiver
This option is applicable only for the Intrusion Management module.
Select Comms Receiver to produce a report of all alarms/events from a Bosch D6600 communications receivers,
as set up in the "Install/Intrusion/Communication Receiver/Clients" screen. You can choose to report on all
communications receivers or a selected receiver.
Select Comms Receiver Acct No to choose to report on all alarms/events from a Bosch D6600 communications
receiver that has specified account number, or from all account numbers.

Comms Receiver
This is used to report on alarms/events associated with the use of intrusion communications receivers.
The option is displayed only if the Communications Receiver interface is installed.
Choose Comms Receiver to produce a report of all alarms/event from a specified receiver, or from all receivers.
Choose Comms Receiver Acct No to produce a report of all alarms/event from a specified account number, or
from all account numbers.
Choose None if you do not want to report on communications receiver alarms and events.
For an overview of installing and using the communications receiver interface, please refer to the Intrusion
Management Installation and User Guide.

493
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Communications Failure to SALTO Server


The network connection to the SALTO server is offline. Card transactions from the SALTO system will not appear in
the Symmetry software.

Company
If Use Card Handler Access Rights is not selected, all new card holders being imported will be assigned to the
selected company.

Company
Select the name of the company that the card holders in the database belong to. All imported card holders will be
assigned to the selected company.

Company Group
A company group is a list of companies.
You may have more than one company in your company group, as set up by the "Install/System/Company Groups"
screen. In this case, you will see a Change Company option in the "Home/Monitoring" menu, which allows you to
change the currently-selected company.

Note: If your company group is changed to include more than one company, you need to log out, then back in,
to see the Change Company option.

Company Name
Displays the name of the company the person is associated with. This is displayed only if your company group
contains more than one company.

Company Name
Select the company that the report refers to.

Conditional Card
If selected, the card holder can use this card only to activate trigger commands or as part of a patrol tour
transaction; it does not open doors.
A conditional card can activate a trigger command by setting the IF part of a trigger command to Valid Card
Transaction.

Configuration Changed
The configuration settings of an Edge Network Video Server have been changed.

Configuration Error
There is an error with the configuration settings of a video server.

Connect
Opens an audio link between your PC's intercom and the selected intercom.

Connect Failed-Busy
Generated when an attempt to connect to an intercom has been made when that intercom is already in use.
In the Alarms screen, "Where" indicates the intercom that received the call, and "Who" indicates the intercom that
started the call.

494
Symmetry Software Reference Manual

Connect Successful
Generated when a connection has been opened between two intercoms.
In the Alarms screen, "Where" indicates the intercom that started the call, and "Who" indicates the intercom that
received the call.
The message is generated by the intercom originating the message.

Connected
A client PC has successfully connected to a remote chain of nodes or to a dial-in alarms site via a modem.

Connecting
A client PC is currently attempting to connect to a remote chain of nodes or to a dial-in alarms site via a modem.

Connecting Status Inputs


Each sensor connects to a monitor-point input of the security management system or to a control input of the
Commend Intercom System. Each input has a pair of contacts, which the sensor shorts or open circuits to indicate
the on/off status.
When using Commend inputs, the two terminals of the input must be shorted to indicate that the input is "on" (for
example, for a barrier status input, when the Open Status Input terminals are shorted, this indicates that the barrier
or other device has opened). When using monitor points on an access-control node, the two terminals must be
open circuited to signal "on".

Contact Number
Specify the contact telephone number of the person the visitor is visiting. If you have chosen an existing card holder
from the Visiting pull-down menu, the Symmetry software derives the contact number automatically from a
personal data field in the card holder's details. The personal data field that the Symmetry software uses is specified
by Contact Number Personal Data Field in the "Maintenance/User & Preferences/System Preferences" screen.

Contact Number Personal Data Field


Select a card data title if you want the Contact Number field in the "Home/Identity/Visitors" screen to be
automatically populated when you specify the name of the card holder the visitor is visiting.
Choose the personal data title that corresponds to the card holder's contact telephone number.
This setting is specific to the currently selected company.

Controller Comms Failed


The communications link from the node to reader was lost.

Controller Comms Restored


The communications link from the node to reader was restarted.

Copy
This button is available if you have opened an existing record from the Selection screen. Select this button to copy
the details to create a new record. After selecting Copy, enter the new details, then select Save.
If DuplicateCardWhenCopied is set to 1 in multimax.ini, the card holder's image, signature, facility/customer code
and PIN are retained.
If Inactivate Card When Copying is selected in the "Maintenance/User & Preferences/System Preferences"
screen, a prompt is displayed when you choose Copy, which allows you to choose whether or not to inactivate the
person's card (that is, set its status to "Inactive"). You may want to inactivate the copied card if, for example, the
card has been lost and you are using Copy to set up a new card.
You may not have access to this button, depending on your user permissions, as set up in the "Maintenance/User &
Preferences/Roles" screen.

495
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Copy
If you have selected an existing entry from the Selection screen, you can use this button to copy the details to
create a new entry. After selecting Copy, enter the new details, then select OK.

Create HISEC Triggers


This is a special message type that is available for a trigger command when the HISEC Symmetry Video
Management software is installed. It is displayed when the "If" device is Digital Video Server (an ENVS). Selecting
the option causes the ENVS to send a message to activate a ThorGuard virtual input whenever an alarm/event
occurs at the ENVS. The number of the virtual input activated is dependent on the message and on the address
range selected from the Address menu. The following is an example when the selected address range is 5000-
5009.
ENVS Alarm/Event Virtual Input Action
Server Rebooted 5000 Activate Input
Video Signal Loss
Video Picture Loss
Disk Full
Warning Overwriting Standard Recordings
Warning Overwriting Tagged Recordings
Network Loss 5001 Activate Input
Network Restored 5001 Deactivate Input
Motion Alarm for camera 1 5002 Activate Input
Motion Normal for camera 1 5002 Deactivate Input
Motion Alarm for camera 2 5003 Activate Input
Motion Normal for camera 2 5003 Deactivate Input
Motion Alarm for camera 3 5004 Activate Input
Motion Normal for camera 3 5004 Deactivate Input
Motion Alarm for camera 4 5005 Activate Input
Motion Normal for camera 4 5005 Deactivate Input
Monitor Point 1 in Alarm 5006 Activate Input
Monitor Point 1 Normal 5006 Deactivate Input
Monitor Point 2 in Alarm 5007 Activate Input
Monitor Point 2 Normal 5007 Deactivate Input
Monitor Point 3 in Alarm 5008 Activate Input
Monitor Point 3 Normal 5008 Deactivate Input
Monitor Point 4 in Alarm 5009 Activate Input
Monitor Point 4 Normal 5009 Deactivate Input

Currently Selected Company


The currently-selected company is the company currently named in the Status Bar at the bottom of the window. If
you have more than one company in your company group, the Change Company option is available in the
"Home/Monitoring" menu.
You can use the Change Company option to change the company you are administering. The choice of company
can, for example, determine the range of readers made available when setting up access rights, or the badge
designs that are available when defining card holders, since each reader and badge design belongs to a specified
company.

Customer Code Only


This causes the reader to allow access to any card that has a customer code that is the same as one of the
customer codes stored in the reader's node. Click here for further information.
Available as: manual, scheduled or trigger command.

496
Symmetry Software Reference Manual

Customer Code Only - No Store


This is the same as Customer Code Only, except that no log information is stored, otherwise each transaction
causes the customer code to be recorded in the log.
Available as: manual, scheduled or trigger command.

Customer Codes
The customer codes stored in a node are dependent on the person's access rights. A node stores a person's
customer code (as defined in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen) if the person has
one of the node's readers in his/her access rights.

Data Read
This displays the information encoded on the card. The information encoded includes the card number, customer
code and any biometrics (hand print) information (for example, captured using the Biometrics tab in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen).

Date and Time


Specify the period to report on.
If you choose an archive source in the Source menu, the Start Date and End Date are automatically set to the
earliest and latest dates on the archive source (the Time fields are not affected).
Seconds are shown in reports if Show Seconds for Transactions is selected in the "Maintenance/User &
Preferences/Client Preferences" screen.

Dates
This button allows you to change the dates assigned for advanced access rights. To do this, select the appropriate
advanced rights title (such as Advanced 1) then select Dates.
You can also select this option via the right-click menu from the appropriate entry in the tree view.

DBase
This gives access to options that enable you to maintain the import database, which is used as a data interface
between the source database and Symmetry's live databases.

Deactivate at (Threat) Level


Specifies the threat level at which the card is automatically made inactive. The card is made inactive if the current
threat level (as set using the "Home/Monitoring/Change Threat Level" screen) is greater than or equal to this value.
This option is available only if the Threat Level Manager license is installed.
A card made inactive by the current threat level automatically returns to being active when the current threat level is
less than Deactivate at (Threat) Level.
The option is not used if set to None.

Deadbolt Override
This option is available only if the ASSA ABLOY DSR Lock license is installed. Selecting this option allows the card
holder's access rights to override the deadbolt at any lock that has Deadbolt Override selected in the
"Install/Access Control/Reader" screen. If the option is not set, the card holder will not be able to gain access at
doors where the deadbolt is thrown.

Default Language Pack


This specifies the default language for all new users. It is also the language used in the Login screen and for
system messages, such as alarm/event messages displayed in the Alarms screen and in reports.
In addition to English, the pull-down menu contains a language for each Language Pack installed (see the Software
Installation Manual for details of how to install Language Packs).

497
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Each user can have a different language. The language to use for each user is set up in the "Maintenance/User &
Preferences/Accounts" screen, with the default determined by the Default Language Pack setting in
"Maintenance/User & Preferences/System Preferences". The language selected in the "Maintenance/User &
Preferences/Accounts" screen causes text, such as in menus and screens, to be displayed in the selected
language.
If you change the setting of Default Language Pack, it does not affect the language setting of existing users.

Delay Cards to Dial-Up/LAN Chains


If this option is not selected, card data is downloaded to nodes on dial-up and LAN chains whenever cards are
added or amended (for example, in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screens).
If you select the option, card data is not downloaded immediately on adding or amending a card. Instead, all card
data is automatically downloaded to nodes on dial-up and LAN chains only at the times specified by a scheduled
command in the "Maintenance/Download/Cards" screen. You may want to select the option if you want to reduce
the number of modem calls or move LAN communications traffic to times when LAN usage is otherwise low.

Delete
If you have selected an existing entry from the Selection screen, you can use this button to delete the entry.

Delete All
You can use this button to delete the card holders or visitors selected in the right-hand area of the screen from the
database. Once deleted, the any cards associated with these people will not be able to be used.
The Delete All button is not available if there are card holders or visitors selected that do not belong to the currently-
selected company.
Do not use this button to indicate card holders or visitors you simply want to remove from bulk amendment. Instead,
select the records in the right-hand area of the screen and click <<.
Since it is possible to delete many records in one simple operation, the system prompts you to enter your login
password to confirm the deletion.
The button is available only if your user role ("Maintenance/User & Preferences/Roles") has the Bulk Card Delete
All option selected.

Delete Inactive or Expired Multiple Cards


If you select this option, at the end of each day the Symmetry software checks each card holder who has multiple
cards. The Symmetry software automatically deletes any card, other than the primary card or a temporary card, that
has had an expired or inactive status for the specified number of days (Number OfDays). The "Home/Identity/Card
Holders" screen shows the card status.

Note: The Auto Delete Expired Cards preference is able to delete the primary card if it has been expired for a
specified number of days.

Delete PIN Errors Globally


This option determines the extent of card blocking when cards are blocked as a result of an excessive PIN-entry
errors. Click here for further information.

Deleted for PIN


This alarm/event message is generated if the card's PIN was entered incorrectly a number of times (the limit is set
in the "Install/Access Control/Reader" screen). The person was not granted access and the card has been made
inactive.
Click here for more information about blocked cards.

498
Symmetry Software Reference Manual

DES Fire Encoding


Select this option only if you are using NXP® MIFARE® DESFire contactless cards. Deselect this option if you are
using normal MIFARE cards.
You must make sure that card encoders supported by Symmetry support MIFARE DESFire card encoding.
Except when using a Suprema BioLite N2 reader, a DESFire sentinel must be attached to the PC that you are
currently using.
The OpenDesfireFileEncoding setting in multimax.ini allows various DESFire information to be encoded into
application areas in the open (unencoded) section of a card, as described in the Symmetry Software Installation
Manual.

Description
Enter a description for this bookmark. The name will be displayed in the "Home/Video & Audio/Video Playback"
screen when listing recorded video clips.

Description (or Name)


This option determines the number of existing entries listed when you select Find. If the option is blank, all entries
are listed (depending on the settings of any other filter options on the screen). If you want to narrow the search,
type the name of the entry in the box. You can find a range of entries by using wildcards.

Destination
Using the pull-down list, choose whether to send the report to:
 The screen.
 A file. A dialog is displayed when you run the report, which enables you to specify the report file
name. Activity and User Audit reports can be created in CSV format (for use in applications such
as Microsoft Excel) or TXT format. All others are in TXT format.
 A printer.
 One or more email addresses. A dialog is displayed when you run the report, which enables you to
specify the profile (the email server settings, as configured using the "Setup/Configuration/Email
Profiles" screen), destination addresses, email subject and text. Activity and User Audit reports are
created in CSV format (for use in applications such as Microsoft Excel). All others are in TXT
format.

Dial-In Alarm Received


A dial-in alarm has been received from a dial-out alarms site.
Overview of dial-out/dial-in alarms reporting

Dial-In Alarm Sites


This option is available if your system includes the dial-in alarms reporting software. If you want the history report to
include dial-in alarms from another site, select the site from this pull-down list, or select All to include alarms from
all dial-in sites.
The dial-in alarms included in the report are not filtered according to the other settings in the screen.
Choose None if you do not want to report to include dial-in alarms.

Digital Input Alarm


A digital input at a digital video camera is in an alarm state.

Digital Input Normal


A digital input at a digital video camera has returned to a normal state.
This is any camera defined in the "Install/Video & Audio/Digital Video" screens.

499
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

DAK or DTMF Button


DAK (Direct Access Key) is a term used in Stentofon Alphacom systems. DTMF (Dual-Tome-Multi-Frequency) is a
term used in Zenitel Pulse Systems.
These refer to a button or switch at an intercom positioned next to any Symmetry client where calls are to be
managed using the "Home/Video & Audio/Intercom Control" screen (Stentofon Alphacom) or "Home/Video &
Audio/Intercom" screen (Zenitel Pulse).
The button/switch can be used to open a door/barrier or operate an auxiliary output, as configured in the
"Install/Video & Audio/Intercom/Stations" screen.

Disable Fingerprint Mode


Prevents an S81x fingerprint reader from requesting a fingerprint. The reader will operate as a standard contactless
smart card reader.
Available as: manual, scheduled or trigger command.

Disable Monitor Point


Disables the monitor point; the monitor is effectively ignored, with the exception of cable faults.
Available as: manual, scheduled or trigger command.

Disable Motion Detection


Disables motion detection for the selected video server camera. The command is available only for certain camera
types, such as those connected to an ENVS
Available as: manual, scheduled or trigger command.

Disable Picture Loss Processing


This command is available for some types of video server (originally ENVS) to prevent a camera attached to the
server from generating a Video Picture Loss alarm if the camera lens is obscured (for example, by paint or by a
person placing an object in front of the lens).
Available as: Manual, scheduled and trigger command.

Disable Visitor Login Sign In/Out


Selecting this option disables the Sign In and Sign Out buttons in the "Home/Identity/Visitors" screen for visitor
managers (that is, users who have the "Visitor Management" user role).

Disconnect
Hangs up the current call.

Disconnected
A client PC has now disconnected from a remote chain of nodes or from a dial-in/out alarms site.

Disconnected Door Groups


A disconnected door group is a set of one or more readers in a SALTO access-control system (in a SALTO system,
they are known as "zones"). Disconnected Door Groups are available if a Disconnected Doors license is installed,
as described in the Third-Party Access Devices Configuration and User Guide, and zones have been set up in the
SALTO system.
When access rights are set up for a door group, the card can gain access at all doors in the group on the days and
times determined by the selected time code. You cannot assign a door group if it contains a door that is used with
another time code in the access rights.
The disconnected door groups and time codes available for selection have been automatically imported into
Symmetry from the SALTO software. Changes are imported when you start Symmetry or click Refresh in the
"Install/Access Control/Disconnected Door" screen.

500
Symmetry Software Reference Manual

A Disconnected Door Group access right is therefore an access right defined by associating a particular SALTO
door group (zone) with a particular time code.

Disconnected Doors
Disconnected Doors are online and offline readers in a SALTO access-control system. They are available if a
Disconnected Doors license is installed, as described in the Third-Party Access Devices Configuration and User
Guide.
A card can have access rights to a door on the days and times determined by the selected time code. A
disconnected door can appear only once in a card holder's access rights.
The disconnected doors and time codes available for selection have been automatically imported into Symmetry
from the SALTO software. Changes are imported when you start Symmetry or click Refresh in the "Install/Access
Control/Disconnected Door" screen.
A Disconnected Door access right is therefore an access right defined by associating a particular SALTO door with
a particular time code.

Door Alarm Reset


This indicates that the door was closed following a 'Door Forced' or 'Door Held Open' alarm/event.
Door Alarm Reset can be suppressed by using a scheduled command to disable door alarms (see "Disabling or
Enabling Door Alarms").

Door Closed
This is generated whenever the door is closed.
This message is used to indicate a closed door icon on graphics. A door icon can be shown as open or closed if the
Show Door Status on Graphics setting is selected in the "Maintenance/User & Preferences/System Preferences"
screen.

Door Forced
The door was opened without proper authority. If this is an alarm, it cannot be cleared until the door is closed. Door
Forced alarms can be suppressed by using a scheduled command to disable door alarms (see "Disabling or
Enabling Door Alarms").

Door Held Open


The card was used to gain access in the normal way, but following the pre-held sounder operating at the reader, the
door has continued to be held open for a longer period of time than is allowed (as defined by using the
"Maintenance/Access Control/Door Timing" screen). If this message is an alarm, it cannot be cleared until the door
is closed.
Door Held Open alarms can be suppressed by using a scheduled command to disable door alarms (see "Disabling
or Enabling Door Alarms").

Door Insecure
This applies to readers that use “door loop” connections, where a single 2-core cable is used to monitor the lock
sensor, door sensor and exit-request switch. The alarm/event is reported when the door lock is in a disengaged
state when it should be in an engaged state. For example, if after a normal access-control transaction or a Lock
Door command, the lock has not engaged after the appropriate timeout period. The open/closed status of the door
is not relevant.

Door Monitor Circuit Open


The wires that monitor the door's status have been open-circuited. This alarm/event is generated only for door
monitors that have three-state or four-state supervision (as set up by the installer).

501
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Door Monitor Circuit Shorted


The wires that monitor the door's status have been short-circuited. This alarm/event is generated only for door
monitors that have three-state or four-state supervision (as set up by the installer).

Door Not Opened


This has one of the following two meanings:
 The card was used at a zonal antipassback reader connected to a multiNODE-2 or later node and
was granted access in the normal way, but the person did not open the door.
 The card is a conditional card, as specified in the "Home/Identity/Card Holders" screen. The door
was not opened. Conditional cards are useful only as a means of triggering the IF part of a trigger
command.
Click here for additional information about using this message in trigger commands.

Door Open
This is generated whenever the door is opened.
This message is used to indicate an open door icon on graphics. A door icon can be shown as open or closed if the
Show Door Status on Graphics setting is selected in the "Maintenance/User & Preferences/System Preferences"
screen.

Door Pre-Held Timer Expires


Indicates that the door pre-held alarm has finished for one of the following reasons:
 The pre-held alarm has been operating for the maximum length of time, as specified by Door Pre-
Held Time in the "Install/Access Control/Reader" screen.
 The pre-held alarm has been switched off by the door closing.
For detailed information about pre-held alarm operation, please refer to Timing Diagrams for Door Operation.

Door Pre-Held Timer Start


Indicates that the door pre-held alarm has started.

Door Set To <nn> mins <card number>


The door open time has been set to the specified value by a card command at the reader.
The card holder is a command card holder, as set up in the "Home/Identity/Card Holders" screen. The reader has
been set up by the installer to accept extended card commands.
About Card Commands.

Doors Which Can Be Accessed By This Card


To list the doors that can be accessed by a specific person, type the appropriate card number in the box and
choose the card's facility/customer code.
If you are using this option to produce an access report ("Reports/Identity Reports/Access" screen), the report will
be split into two sections:
 The first section (Current Access Rights) lists the access rights that are in force now.
 The second section (Non-Current Access Rights) lists the access rights that are not currently in
force. These may, for example, be advanced access rights that have a date range that does not
include the current date.

(DSR) <message>
Symmetry can display a wide range of different messages from ASSA ABLOY DSR locks. All such messages are
prefixed with "(DSR)".
The Third-Party Access Devices Configuration and User Guide lists all messages supported by Symmetry.

502
Symmetry Software Reference Manual

Please refer to the ASSA ABLOY documentation for details of the meaning of each message.

Duress
A card holder or visitor signaled that he/she is gaining access or arming/disarming an intrusion system under
duress.
Click here for details of how duress is signaled.
The Duress message can be generated only at readers enabled for duress mode in the "Install/Access
Control/Reader" screen.

Edge Network Video Server


Note: ENVS devices are no longer supported.
An Edge Network Video Server (ENVS) is a hardware network device that enables images from connected CCTV
cameras to be displayed at a Symmetry client PC and recorded locally on a built-in hard disk. The ENVS also has
inputs for monitoring sensors, and outputs for controlling external equipment.

Email Notification of Visitor Signing In


Selecting an email profile enables a "Visitor arrived" message to be emailed when a visitor signs in. Click here for
further information.

Employee Ref
You can use this field for supplemental information about the card holder, such as a staff number. It is displayed
only within this screen and for filtering the listed card holders in the Card Holders Selection screen.
If Unique Employee Reference is selected in the "Maintenance/User & Preferences/System Preferences" screen,
Employee Ref cannot be blank and must not be the same as the Employee Ref of any other card holder in the
same company.

Employee Reference
Select this option if you want to find existing card holders (excluding visitors) by their employee reference. Only card
holders who have an employee reference will be listed.
If you want to be selective about the card holders to list, type the employee reference in the box. For example, if
you want to find all card holders who have an employee reference of Emp25, type Emp25 in the box.
You can use wildcards if required.
If you select a Facility/Customer Code, only those card holders who have the selected facility/customer code will
be listed. You can leave the Employee Reference box blank to list all card holders who have an employee
reference and who have the selected facility/customer code.

Enable Alarm Banner


If this option is selected and there are any unacknowledged alarms routed to this client, the background of the
Symmetry main window at this client is displayed in red, with "Alarm!" displayed in the bottom-right corner.

Enable Alarm Statistics


Select this option to enable alarm statistics processing at the server. The statistics are displayed in the
"Home/Monitoring/Alarms" screen at any client that has Display Alarm Statistics selected in the
"Maintenance/User & Preferences/Client Preferences" screen.
You may want to deselect this option to obtain performance benefits.

Enable Comments on Graphic


This setting is available if an intrusion license is installed, and is relevant for M2150 intrusion systems and intrusion
systems supported by the Full Intrusion Management interface.

503
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Selecting this option causes the "Action Taken" prompt to be displayed when sending a command to disarm an
area, bypass a zone or disable a zone from the "Home/Monitoring/Graphics" screen. See also the Mandatory
Intrusion Comments system preference.

Enable Push Button


Enables the exit-request button, so that it can operate normally. Available as: scheduled or trigger command.

Disable Push Button


Disables the exit-request button. Available as: scheduled or trigger command.

Enable Logon Cancel Button


Selecting this option causes the Cancel button to be made available in the Logon dialog. Selecting Cancel in the
Logon dialog causes Symmetry to shut down.
It is normal to deselect this option if Remove access to Windows Desktop was selected during the installation of
Symmetry (please refer to the Symmetry Software Installation Manual for further information).

Enable Monitor Point


Enables the monitor point; the monitor point operates normally.
Available as: manual, scheduled or trigger command.

Enable Motion Detection


Enables motion detection for the selected video server camera. The command is available only for certain camera
types, such as those connected to an ENVS. Alarms or events can be generated if motion is detected, as set up in
the appropriate camera screen in Symmetry.
Available as: manual, scheduled or trigger command.

Enable Picture Loss Processing


This command enables an video server camera to generate an Video Picture Loss alarm if the camera lens is
obscured (for example, by paint or by a person placing an object in front of the lens). The command is available
only for certain camera types, such as those connected to an ENVS.
Available as: Manual, scheduled and trigger command.

Enable Printing of Alarms/Events


Select this option if you require real-time printing of alarm/event messages. The alarms/events printed at a client
depend on alarm routing, as set up in the "Operation/Alarms/Routing" screen. If real-time printing is required at a
client, Output Alarms/Events to printer must also be selected in the "Install/System/Clients" screen. Each client
uses its default Windows printer. Only those alarms/events set up for printing in the "Operation/Alarms/Reporting"
screen are printed in real time.
Deselecting the option causes a global override to stop real-time printing at all clients.
The printer used for real-time printing should be the dot-matrix type. Laser printers are unsuitable due to their
inability to use continuous stationery.
The account used by the "SymmetryServices" service must have permission to print. This can be tested by logging
in as the account, adding the printer in the Control Panel, and checking that you can print a document from this
account.

Enable Reader
Enables the reader, so that it can operate normally. Available as: manual, scheduled or trigger command.

504
Symmetry Software Reference Manual

Disable Reader
Disables the reader. The reader will not be able to read cards or numbers entered on its keypad (if fitted. Available
as: manual, scheduled or trigger command.

Encode Fingerprint
Select this option to encode the card holder's or visitor's fingerprint on the smart card.
This option is available only if a smart card (not mobile device) is being encoded, and only if fingerprint data is
available for encoding.

Note: If Store Fingerprints in Symmetry is not selected in the "Maintenance/User & Preferences/System
Preferences" screen, the Encode Fingerprint option will be available only if you have just enrolled a fingerprint
without leaving the Card Holders or Visitors screen.

Encode PIN
Select this option to encode the card holder's or visitor's PIN on a smart card.

Note: The card must be re-encoded if the PIN is changed.

Encoder Type
Select the type of encoder that is being used.
 Smart Card Encoder - A supported encoder type (see the Symmetry Software Installation Manual).
 IP Biometric Encoder - An encoder accessed over he network, such as a Suprema BioLite N2
encoder.
 S81x Fingerprint Enrollment Reader encodes the card number and a fingerprint template for S81x
fingerprint readers. This option is available only if the person has fingerprint data, captured for an
s81x reader from the Biometrics tab of the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
 Symmetry Blue Enrollment Reader - a device connected via a USB port to the computer that
allows the card details to be encoded onto a mobile device installed with the Symmetry Blue app.
 Bioscrypt Enrollment Reader encodes the card number and fingerprint data for Bioscrypt
fingerprint readers and is available only if the person has fingerprint data, captured for a Bioscrypt
reader from the Biometrics tab of the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen.
The encoder type being used must be set up in the "Install/System/Client Ports" screen.

Enroll
Select this option when you are ready to use the enrollment reader to capture the selected fingerprints. Follow the
prompts.

Entrance and Exit Reader Group


For each card holder included in the On Site Times report, the time between the use of a reader in the Entrance
Reader Group and a reader in the Exit Reader Group is listed.

Entrance Reader Group


Only those people whose last successfully-used reader is in the selected reader group are included in the report.

Entries Found
This displays the number of existing entries found after you have selected the Find button.

505
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Entries Selected
This shows the number of people selected in the right-hand area of the screen.

Entry Timer
An entry timer is used in intrusion systems to specify the length of time a card holder is given to disarm an area
after triggering a zone defined as being along an entry/exit route.
For M2150 intrusion systems, the duration of the entry/exit timer is specified by the Entry/Exit Delay setting in the
"Install/Access Control/Node" screen.

Entry Timer Started


The entry timer has started after an M2150 intrusion zone that is located along an entry route was triggered.

Entry Timer Stopped


The entry timer has finished after an M2150 intrusion zone that is located along an entry route was triggered.

Erase
Click this button to erase all data that has been encoded onto the card using the Symmetry software (such as the
card number). Other data not added by the Symmetry software is not removed.
The button may not be available, depending on the type of encoder you are using.

Escort
A visitor escort has allowed a visitor access through a door. This applies if the reader is set up with Visitor Mode,
where both the visitor and the visitor escort need to make valid card transactions at the reader to allow the visitor to
pass through the door.

Example
From Time ("Reports/Configuration/Predefined Reports" screen) = 06:00
To Time ("Reports/Configuration/Predefined Reports" screen) = 11:00
First Report Date ("Reports/History/Predefined Reports" screen) = 6th November 2020
Report Run/End Time ("Reports/History/Predefined Reports" screen) = 09:10
Include Previous Days ("Reports/History/Predefined Reports" screen) = 3
Start Time ("Reports/History/Predefined Reports" screen) = 07:00

Report will include:


6th November 2020: 06:00 to 09:10
5th November 2020: 06:00 to 11:00
4th November 2020: 06:00 to 11:00
3rd November 2020: 07:00 to 11:00

Executive Card (and Exemptions)


Selecting Executive Card allows you to choose various rules that will not apply to the card holder or visitor.
The card holder cannot have both the Executive Card and Keycard Holder options set.
By default, when you select Executive Card, a checkmark is placed next to all of the following exemption rules,
meaning that the rules will not apply to the executive card. Removing a checkmark reinstates the rule.
 Auto Delete - If selected, the card will not be deleted according to the Auto Delete Expired Cards
rule (if set in the "Maintenance/User & Preferences/System Preferences" screen).
 Anti Passback - If selected, timed and zonal antipassback rules will not apply to the card holder or
visitor. Note that elevator nodes do not support antipassback rules at all.
 Random Search - If selected, Random searches will not apply to the card holder or visitor. Note that
elevator nodes do not support random searches at all.

506
Symmetry Software Reference Manual

 PIN - If selected, the card holder or visitor will not need to enter a PIN at any reader that is in card-
and-PIN mode, unless the reader is in user code + PIN mode.
Note: The above four options are supported only at nodes that have the required firmware - please refer to your
Customer Support Representative. When Executive Card is selected, nodes that do not have the required
firmware operate as if all four options are selected.
Note: Executive card exemptions could be ignored on the first card transaction at any node that has Learn Mode
set in the "Install/Access Control/Node" screen.

Exit Button Circuit Normal


This is displayed following an Exit Button Circuit Normal or Exit Button Circuit Shorted alarm.

Exit Button Circuit Open


The wires to the exit button have been open-circuited. This alarm/event is generated only for exit buttons that have
three-state or four-state supervision (as set up by the installer).

Exit Button Circuit Shorted


The wires to the exit button have been short-circuited. This alarm/event is generated only for exit buttons that have
three-state or four-state supervision (as set up by the installer).

Exit Button In Alarm


This is generated whenever the exit-request button is pressed (multiNODE-2 or later node types only). By default,
this message is ignored by the system and therefore should never be seen.

Exit Button Normal


This is generated whenever the exit-request button is closed (multiNODE-2 or later node types only). By default,
this message is ignored by the system and therefore should never be seen.

Exit Timer
An exit timer is used in intrusion systems and determines the length of time a card holder is given to exit an area
after arming it from an intrusion reader. During this time, zones that are defined as being along the entry/exit route
do not cause alarms if triggered.
For M2150 intrusion systems, the duration of the entry/exit timer is specified by the Entry/Exit Delay setting in the
"Install/Access Control/Node" screen.
The exit timer can be cancelled by triggering a monitor point or intrusion reader door monitor that belongs to the
area and has Final Exit selected in the "Install/Access Control/Reader" or "Install/Access Control/Monitor Point"
screen.

Exit Timer Started


The exit timer has started after an M2150 intrusion area was armed from a reader.

Exit Timer Stopped


The exit timer has finished after an M2150 intrusion area was armed from a reader.

Expand
This button fully expands all contents of the currently-selected item in the tree view.

Expired
This indicates that the card has expired and occurs when:

507
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

 The badge expiry date is reached, as shown in the Card Details tab.
 The card has not been used for the number of days specified by the Auto Set Unused Cards
Expired rule in the "Maintenance/User & Preferences/System Preferences" screen.
Once expired, a card cannot be used to gain access, irrespective of access rights.
If the Auto Delete Expired Cards or Delete Inactive Or Expired Multiple Cards option in the "Maintenance/User
& Preferences/System Preferences" screen is selected, cards that have been expired for a specified number of
days are automatically deleted.
The Card Expired alarm/event is generated if an expired card is used.

Expired
To list only those people who have cards that have expired; for example, as determined by the Inactive Date\Time
defined in the card details.

Export
Choose this option to save the currently displayed picture as a JPEG file.

Export
Choose this option to save the currently displayed signature as a JPEG file.

Extended Door Times


If selected, doors opened by the card are given an extended unlock time, open time and pre-held time, as set up in
the "Maintenance/Access Control/Door Timing" screen. This may be useful if, for example, the person uses a
wheelchair.
It is possible for card holders defined in the "Home/Identity/Card Holders" screen to change the door open time at
Series 6xx or later readers (providing the reader has a keypad). For further information, see About Card
Commands.

Extended Trigger Commands


The message is available in the IF (Message) part of a trigger command if Location is set to the name of a reader
connected to a node that has the Node Supports Extended Trigger Commands option selected in the
"Install/Access Control/Node" screen.
Some alarm/event message types selected in the IF part of a trigger command display an Any Card option. If this
option is selected, any valid card used at the reader can activate the trigger command. If Any Card is not selected,
only the selected card can activate the trigger command.

Facility/Customer Code
Choose the customer (facility) code to be encoded on the card. The combination of card number and customer
code should uniquely identify the card.
If the card type does not use a customer code (such as some proximity cards), choose the customer code that has
been assigned to the readers that the person is going to use (as set up by the installer).
It is important to set up the correct customer/facility codes before you add the card details, since you cannot select
a different facility/customer code without deleting and re-adding the record.

Facility/Customer Code
Select the facility/customer code. All imported card holders will be given the selected facility/customer code.

Failed Connection
Indicates that a modem call to a remote site has failed to connect after the maximum number of retries.

508
Symmetry Software Reference Manual

Filter by Company
This option affects the following screens:
Reports/History/Predefined Reports
Home/Video & Audio/Video Playback
Home/Video & Audio/Virtual Matrix
Home/Monitoring/Activity
Home/Monitoring/Command Center (non-graphical version)
Home/Monitoring/Controls
Home/Monitoring/Graphics
Home/Identity/Locator
Reports/Configuration/Predefined Reports/Predefined Video Archive Audit
Reports/Configuration/Predefined Reports/Predefined Activity
Reports/Configuration/Predefined Reports/Predefined User Audit
Reports/Configuration/Predefined Reports/Predefined Patrols
Reports/History/User Audit
Reports/History/Patrols
Reports/History/Activity
Reports/History/Video Archive Audit
Selecting this option causes the screens to operate on the currently-selected company. Deselecting the option
causes the screens to operate on all companies in the company group.
This preference is available from "Maintenance/User & Preferences/Client Preferences" and "Maintenance/User &
Preferences/System Preferences". The system preferences sets the default for the client preference. The client
preference takes priority.

Filter Each Day to Include


Only the data between From Time and To Timeon each day within the report period range (as specified when you
run the report from the "Reports/History/Predefined" menu) is reported on.

Filter Each Day to Include


Specify the times within each day to report on. The report will include only the activity that is between the From
Time and To Time on each day within the date range.
Example:
Start Date = 22nd March 2014, Start Time = 09:00.
End Date = 24th March 2014, End Time = 17:00.
From Time = 07:00, To Time = 18:00.
In this example, the report will include:
22nd March 2014 - activity from 09:00 to 18:00
23rd March 2014 - activity from 07:00 to 18:00
24th March 2014 - activity from 07:00 to 17:00

Find
This lists any existing entries. The search can be narrowed if you use the filters at the top of the screen.
Clicking the magnifying-glass icon has the same effect as selecting Find.

Find
This lists any existing entries. The search can be narrowed if you enter a name/description/code first.

509
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Fingerprint Cores
The green outlined areas show various types of fingerprint core.

Fingerprint Image-Accept/Retry
This shows the fingerprint you have just enrolled. Choose Accept to accept this fingerprint, or Retry to enroll or
verify the fingerprint again.
Make sure you see a clear and complete fingerprint image, with the fingerprint core in the center of the picture.
Failure to do this may cause unreliable access control.

Floor Access
Selecting this option will cause the report to include valid access control transactions at an elevator reader.

Floor Access
A elevator reader granted the person access in the normal way.

Floor Groups
A floor group is a set of one or more elevator floors, as set up in the "Setup/Device Groups/Floors" screen. When
access rights are set up for a floor group, the card can gain access at all floors in the group on the days and times
determined by the selected time code. You can define time codes using the "Operation/Times/Time Codes" screen.
A Floor Group access right is therefore an access right defined by associating a particular floor group with a
particular time code. Only those elevator floor buttons associated with the floor group are enabled when the card
owner makes a transaction at the elevator reader.
You cannot assign a floor group to the access rights if it contains a floor that is used with another time code in the
access rights. This prevents the access rights including the same floor with different time codes. For example, it
prevents you setting up "Floor 1" with "Time Code 1", and also "Floor 1" with "Time Code 2". If this were allowed,
the system would not be able to determine the time code to use for access to "Floor 1".
A person's access rights can contain a maximum of four "Floor Group + Time Code" entries per elevator node,
except for Micronode elevator node hardware, where only one "Floor Group + Time Code" entry is allowed.
When assigning access rights, the floor groups available for selection include any shared floor groups (as set up in
the "Setup/Device Groups/Shared/Shared Floors" screen) that have been shared to the currently-selected
company.
When viewing existing access rights, shared floor groups are grayed out if they are not shared to the currently-
selected company.
Overview of floor groups and setting up access rights

510
Symmetry Software Reference Manual

Floors and Floor Groups


This is used to report on alarms/events associated with elevator floors.
Choose Floor to produce a report of all alarms/event from a specified floor, or from all floors.
Choose Floor Group to produce a report of all alarms/event from a specified floor group, or from all floor groups.
Choose None if you do not want to report on floor alarms and events.

Force Card Inactive


This option is available only if Multiple Cards is selected in the "Maintenance/User & Preferences/System
Preferences" screen.
Select this option if you want to make the selected card inactive. The card will not be able to be used to gain
access. If the card is used, the 'Inactive' alarm/event is generated.
When you select Force Card Inactive, a dialog is automatically displayed for you to add a note giving a reason why
the card has been made inactive.
The option is set automatically if the card number is zero.

Force Card Inactive


To list only those cards that have Force Card Inactive selected in the card details.

Force Cardholder Inactive


Select this option if you want to make all of the card holder's cards inactive. The cards will not be able to be used to
gain access. If a card is used, the 'Inactive' alarm/event is generated.
When you select Force Cardholder Inactive, a dialog is automatically displayed for you to add a note giving a
reason why the card holder has been made inactive.
The option is automatically selected if:
 The current date is on or after an expiry date specified in the Personal Tab. An expiry date has
Expiry Date specified for the Field Type in the "Setup/Identity/Personal Data/Card Holder Titles"
or "Setup/Identity/Personal Data/Visitor Titles" screen. You cannot deselect Force Cardholder
Inactive until you change the date to a date in the future.
 A visitor has been granted access at a reader that has Deactivate Visitor Cards selected in the
"Install/Access Control/Reader" screen. This feature is typically used at readers that allow visitors
to exit the site.
 The Stop option is selected. In this case, Force Cardholder Inactive is also grayed out.
 The card number is zero and Multiple Cards is not set in the "Maintenance/User &
Preferences/System Preferences" screen.

Force Cardholder Inactive


To list only those cards that have Force Cardholder Inactive selected in the card details.

Force Cardholder Inactive Setting


Choose one of the following:
 No Change to Force Cardholder Inactive Status - If you require no change to each card's Force
Cardholder Inactive setting.
 Force Cardholder Inactive - If you require each card to be forced inactive.
 Remove Force Cardholder Inactive Status - If you want to remove the Force Cardholder Inactive
setting from all cards selected.
Any card that has the Force Cardholder Inactive setting cannot be used to gain access. If such a card is used, the
'Inactive' alarm/event is generated. You can find out whether a card has this setting by opening the card in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.

511
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Force Fingerprint Verification


Specifies the number of fingerprint verification passes used in the S81x Fingerprint Enrollment dialog. The setting
affects both the number of automatic verification passes when enrolling a new fingerprint, and the number of
verification passes used by the Verify button.
If you set this to 0, the system carries out no automatic verification passes, but the Verify button applies just one
pass.

Format
This displays the encoding format. The standard format is the smartMAX format.
A Hisec format may be available for encoding Hisec cards on a DTC printer. (The CustomCards setting in
multimax.ini must be set to "Hisec" for this option to be available.)
An Open format (not normally available) is for specialist purposes only. It is used if non-standard smartMAX keys
are being used to encrypt the data onto cards. For an Open format, keys are openly disclosed to enable the end
client to read and decode the data on the card using their own applications. With standard smartMAX format, the
data read from a card cannot be decoded.
The Format menu is not relevant for Suprema BioLite N2 fingerprint enrollment readers or Symmetry Blue mobile
devices. The DefaultFormat setting in multimax.ini determines the default format for these.

Format
Click this button to erase all data from the card. The button may not be available, depending on the type of encoder
you are using.

>>
This moves the people you have selected in the left-hand area of the screen into the right-hand area.
Any amendments you make operate on only those people listed in the right-hand area of the screen.

Free Access
Sending this command enables anyone to access the selected elevator floor (or all floors in the selected group). No
access-control transaction will be required to access the floors.
Available as: manual, scheduled or trigger command.

From Current Playback Position


Creates a bookmark/video clip that has a time span based on the time of the currently-frozen frame and the times
specified in the For x minutes before and And x minutes after fields. For example, if For x minutes before is 5
minutes and And x minutes after is 3 minutes, the bookmark/video clip will span a period of time starting 5 minutes
before the time of the frozen frame, to 3 minutes after.

From Start of Video Selection


Creates a bookmark/video clip that has a time span based on the start time of the current video clip and the times
specified in the minutes before and minutes after fields. For example, if minutes before is 0 minutes and
minutes after is 5 minutes, the bookmark/video clip will span a period of time starting at the beginning of the
current video clip, and ending 5 minutes into the clip.

Full Intrusion Management


Bosch 9512G, Siemens (Vanderbilt), DMP XR500N\XR550, DSC PC4030 (via SN4442), HISEC ThorGuard and
HISEC CU30 intrusion systems are supported by the Full Intrusion Management interface. This allows the
Symmetry software to upload details of the panels, zones, zone groups, areas and outputs directly from the
intrusion system. The current status of devices is conveniently displayed in graphics, in the

512
Symmetry Software Reference Manual

"Home/Monitoring/Command Centre" screen and in a dedicated Intrusion Status toolbar. The interface also enables
commands to be issued to perform actions such as:
 Arming or disarming areas or zone groups (zone groups apply only to CU30 and ThorGuard panels).
 Enabling, disabling or bypassing zones.
 Silencing an alarm.
 Switching outputs on or off.

General Alarm
An alarm of an unknown type has occurred at the device.

Global Access Codes


Global access codes are available for assignment to access rights only at the head office of a Symmetry Global
Edition system and define the access rights to one or more Global Edition regions.
Global access codes are defined using the "Setup/Configuration/Global Access Codes" screen at the head office
and contain a set of standard access codes defined using the "Operation/Times/Access Codes" screen at the
regions. Global access codes cannot be assigned to visitors.
Please refer to the Global Edition Installation and User Guide for an introduction to Global Edition.

Grant Access
Sending this command gives people free access to access the selected elevator floor (or all floors in the selected
group) for a limited period of time (as set up by the installer).
Available as: manual or trigger command.

Grant Access
Performs the same action as a valid access-control transaction.
Available as: manual or trigger command.

Granted Access
A reader granted the person access in the normal way.
Click here for additional information about using this message in trigger commands.

Granted Access (Extended Door Time)


A person with Extended Door Times set in the "Home/Identity/Card Holders" or "Home/Identity/Card Visitors"
screen was granted access. This occurs in addition to a Granted Access transaction.
Click here for additional information about using this message in trigger commands.

Group Call
An intercom group call has started (not currently used).

Hard Disk Full Warning


The hard disk on the computer that holds the Symmetry databases is getting full. The limit is set in the
"Maintenance/User & Preferences/System Preferences" screen. This message reappears each time a user of
Symmetry logs on, until the disk becomes less full.
Purge Daily Logs After in the "Maintenance/User & Preferences/System Preferences" screen may need to be set
to a more appropriate value if disk space is scarce.

513
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Hard Disk Warning at %


This figure is a percentage of the maximum capacity of the hard disk that holds Symmetry databases. If the hard
disk is utilized more fully than this amount, the 'Hard Disk Full Warning' alarm/event message is generated. If the
message is generated, it is important to remove unwanted data from the computer, otherwise system error
messages will be generated and some data may be lost.

Highlight Unacknowledged Alarms on Reset


This option affects the appearance of the colored blocks shown next to unacknowledged alarms in the
"Home/Monitoring/Alarms" screen. Selecting this option causes colored blocks for alarms that are unacknowledged
but have been reset to be displayed half grayed-out. For example, a monitor-point alarm that has not been
acknowledged but has been reset will appear as follows when Highlight Unacknowledged Alarms on Reset is
selected:

History
This box shows a history of when the visitor signed in and out, the person they visited and who the escort was.

HTTP
These settings are used by devices such as Axis IP cameras and Symmetry NVR devices.
Network Address - This must specify the IP address or network (DNS) name of the Symmetry server. The
Symmetry server must have a fixed IP address if digital video cameras or Symmetry NVRs are used. This IP
address must be manually updated if the IP address of the Symmetry server changes, otherwise Symmetry will not,
for example, receive Symmetry NVR messages.
HTTP URL path - This is the path to a file on the Symmetry server. Do not change the setting.
User Name and Password - These are used by digital video devices to authenticate with the Symmetry server (for
example, when transferring alarm/event messages). The username and password do not relate to any Windows
account; they are sent within messages from devices to enable the Symmetry server to authenticate the source of
such messages. The default username and password are "Installer" and "Install" respectively.

I and P Frames
A video transmission consists of one or more sets of frames. Each set starts with an I-Frame followed by a series of
P-Frames. An I-Frame is a complete picture at a point in time. Each P-Frame specifies only the changes in the
video picture from the previous frame.
P-Frames can contain much less data than an I-Frame, since they contain only the data that has changed.
Therefore, increasing the ratio of P-Frames to I-Frames reduces the overall amount of data to transmit, but leads to
the picture being refreshed less often.

IDS Code
This setting is available if an intrusion license is installed, and is relevant only for M2150 intrusion systems.
The IDS code is the card holder's personal code, which can be to gain access to intrusion options at an M2150
intrusion reader, such as to arm or disarm an area. Alternatively, a card holder can present a card to access the
intrusion options. The IDS code can be used only at readers that have the Arming/Disarming Reader option
selected in the "Install/Access Control/Readers" screen. No two card holders can have the same IDS code.
The code is displayed in the IDS Code field only if Card Holder Show PIN Code is selected in your user
permissions ("Maintenance/User & Preferences/Roles" screen).
The length of the IDS code is between 4 and 8 digits, as specified by IDS Code Length in the "Maintenance/User &
Preferences/System Preferences" screen.
Note: IDS codes of more than 6 digits may not be available for all node types and firmware versions. Please check
with your local Technical Support Representative before using IDS codes of more than 6 digits.
If Use Access Control PIN as IDS Code is selected in the "Maintenance/User & Preferences/System Preferences"
screen, a default IDS code is generated when you click in the field, which is the same as the card holder's default

514
Symmetry Software Reference Manual

PIN. Leading zeroes are inserted if the IDS code requires more digits than the PIN. If the IDS code requires fewer
digits than the PIN, the IDS code takes the last "n" digits of the PIN, where "n" is the required length of the IDS
code. You can modify the default if you wish.
If Use Access Control PIN as IDS Code is not set, clicking in the IDSCode field generates a random IDS code.

IDS Code Length


This setting is available if an intrusion license is installed, and is relevant only for M2150 intrusion systems.
This setting defines the required length of intrusion IDS codes, as specified in the "Home/Identity/Card Holders
screen".
IDS codes of more than 4 digits are supported only by "serial enabled" readers.
If you increase the length of the IDS code, leading zeroes are automatically added to any existing IDS codes.
If you decrease the length of the IDS code, the appropriate number of digits are automatically removed from the
beginning of each existing IDS code (for example, 123456 becomes 3456 if you reduce the length from 6 to 4
digits). After decreasing the length, existing IDS codes will not be able to be used until you open and re-save the
details of each card holder. When saving the card details, you are prompted to change the IDS code if it is no
longer unique.
Note: IDS codes of more than 6 digits may not be available for all node types and firmware versions. Please check
with your local Technical Support Representative before using IDS codes of more than 6 digits.

IDS Code Only


In this mode, a person can gain access to the intrusion options at the reader by entering his/her IDS code. This
mode works in parallel with the ability to gain access by presenting a card. Note: IDS code mode is applicable only
to M2150 arming/disarming intrusion readers.
Sending the IDS Code + PIN and User Code Only commands has no effect on Card Only mode or Card + PIN
mode. For example, a reader can be set for both IDS Code Only and Card + PIN. In this case, when the card
owner presents the card, a PIN has to be entered, but if IDS-code mode is on, he/she can enter the IDS code
without a PIN.
Available as: manual, scheduled or trigger command.

IDS Code + PIN


This is the same as above, but the person must enter his/her PIN also.
Available as: manual, scheduled or trigger command.

IDS Code Disable


Prevents a person from gaining access to the intrusion options at the reader by entering his/her IDS code.
Available as: manual, scheduled or trigger command.

Immediate All Cards


This imports all card records for the selected codes from the Lucent\Avaya database.
The system may take up to one minute to start the dial-up call.

Immediate All Changes


Select this option if you want to import all new card holders in the Lucent\Avaya database and changes to existing
card holders now. Only those records that were added to the Lucent\Avaya database between (and including) the
specified dates are imported. The maximum date range is 31 days.
The system may take up to one minute to start the dial-up call.

Import
Choose this option to import a picture that has been previously stored as an 8-bit or 24-bit bitmap file or JPEG file
on your computer.
Framing the picture

515
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Import
Choose this option to import a signature that has been previously stored as an 8-bit or 24-bit bitmap file or JPEG file
on your computer.
When you save changes, the picture/signature is stored in the database with the card details.

Imported Card Permissions Role


This system preference specifies the role to assign to the permissions of each record imported into Symmetry using
the "Operation/Data/Data Import" screen.
The setting has the same effect as selecting a role after an import using the Permissions button in, for example,
the "Home/Identity/Card Holders" screen.

Import Pad
If your computer has a signature pad device attached to one of its COM ports (as set up by the installer), you can
choose this option to obtain the person's signature from the signature pad.
Selecting Import Pad displays a small dialog in which the signature from the pad is displayed. In this dialog, choose
Cancel to exit without accepting the signature, OK to accept the signature, or Clear to try again.

Inactivate Card When Copying


Selecting this option causes a prompt to be displayed when you select Copy in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. The prompt allows you to choose whether or not to inactivate the card you have
copied (that is, set its status to "Inactive"). You may want to inactivate the copied card if, for example, the card has
been lost and you are using Copy to set up a new card.

Inactive
Indicates that the card cannot be used to gain access. If the card is used, the 'Inactive' alarm/event is generated.
The card status is set to inactive if, for example:
 The Force Cardholder Inactive option is selected either manually or automatically. For further
information, please refer to the help for Force Cardholder Inactive.
 The current threat level is greater than or equal to Deactivate at Level.
 The card details have been saved, but the card number has not yet been entered.
 Usage Remaining displays Limit Reached to indicate that the card usage limit has been reached.
 The card has been copied and Inactivate Card When Copying is selected in the
"Maintenance/User & Preferences/System Preferences" screen.
If the Delete Inactive Or Expired Multiple Cards option in the "Maintenance/User & Preferences/System
Preferences" screen is selected, cards that have been inactive for a specified number of days are automatically
deleted.

Inactive
The card was used at a reader, but the card has a status of "inactive" or has passed its badge design expiry date.
The person was not granted access. The status of a card can be viewed in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen.
Click here for additional information about using this message in trigger commands.

Inactive
To list only those cards that have Force Cardholder Inactive or Force Card Inactive selected.

Inactive Date\Time
A card cannot be used from the specified time on the inactive date, irrespective of access rights. Leave the fields
blank if you do not want to set an inactive date.

516
Symmetry Software Reference Manual

Changing the date\time may change the status of a card from Active to Expired, if appropriate.
For a visitor, the Inactive Date may be constrained by the Visitor Maximum No of Days setting in the
"Maintenance/User & Preferences/System Preferences" screen. If, for example, the default value of this setting is
used (1 day), the Inactive Date cannot exceed the Active Date.
If the person's badge has expired (see Badge Expires), the inactive date is automatically set to the date that the
badge expired.
The default time displayed in Inactive Time is determined by Inactive Time in the "Maintenance/User &
Preferences/System Preferences" screen.

Inactive Time
This option determines the default time displayed in the Inactive Time field of the "Home/Identity/Card Holders"
and "Home/Identity/Visitors" screens.

Include
Select the types of events to include in the report:
 Decode Errors
 Other Errors
 Comms Events
 System Events
 Other Events

Include
Select a camera or a camera group (as defined in the "Setup/Device Groups/Cameras" screen).

Include Contractors by Location Code


If you want the imported card holders to include contractors, specify the contractors' location codes in these boxes.
Those card holders who have any of the specified codes in any of their three location codes will be imported.

Note: If there is a new region or classification code in use, you can enter the code in a Include Contractors by
Location Code box.

Include Executives
Select this option if you want the imported card holders to include executives. Those card holders who have
"EXEC" in any of their three location codes will be imported.

Include Inactive Cards


Select this option if you want the report to include cards with a status of "inactive", "expired" or "not yet valid", as
indicated in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen.

Infrared Alarm
A PIR detector at a digital video camera is in an alarm state.

Infrared Normal
A PIR detector at a digital video camera has returned to a normal state.

Input Closed
A monitor point at the device was closed.

517
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Input Opened
A monitor point at the device was opened.

Instruction Messages
This displays messages and prompts during the process.

Intercom Call
For future use.

Intercom Stations and Intercom Groups


This is used to report on alarms/events associated with the use of a Stentofon Alphacom Intercom System. The
options are displayed only if the Intercom Management software is installed.
Choose Intercom Stations to produce a report of all alarms/event from a specified intercom station, or from all
intercom stations.
Choose Intercom Groups to produce a report of all alarms/event from a specified intercom group, or from all
intercom groups.
Choose None if you do not want to report on intercom alarms and events.
For an overview of installing and using the Intercom Management software, please refer to the Intercom
Management Installation and User Guide.

Intrusion Area
An M2150 intrusion area is a group of one or more M2150 intrusion zones, as defined in the "Setup/Device
Groups/Intrusion Areas" screen. All zones in the same area must connect to the same M2150 intrusion node.
Intrusion area access rights can be assigned to card holders via the "Home/Identity/Card Holders" screen. These
allow card holders to arm and disarm the area. The card holder is able to arm or disarm a selected area from any
intrusion reader that is in the same area and is defined as an arming/disarming reader in the "Install/Access
Control/Reader" screen. Reader access rights are not required to arm or disarm an area. However, if access rights
are granted to the intrusion reader and the reader is used to unlock a door, performing a valid access-control
transaction at the reader disarms the area and unlocks the door.
Note: Intrusion area access rights are not relevant to visitors ("Home/Identity/Visitors" screen). Do not assign them
to visitors.

Intrusion Arm/Disarm Tolerance


This setting is available if an intrusion license is installed, and is relevant only for M2150 intrusion systems.
The setting defines a period of grace that allows an area to be armed or disarmed late/early to prevent the alarms
selected in the "Arm/Disarm Warnings" tab of the "Setup/Device Groups/Intrusion Areas" screen.

Intrusion Common Area


An M2150 intrusion common area is for entrance lobbies or other parts of the building that people use to access
several other areas. A common area is automatically armed when the last area that is accessed through the
common area is armed.
In the following example, Area 7 is a common area, and gives access to Areas 1 to 6. If any area in the range 1 to 6
is being armed (e.g. Area 3), and all other areas are armed, Area 7 is armed automatically (assuming that it is not
already armed).

518
Symmetry Software Reference Manual

The keypad used to arm the system displays any condition that prevents the arming of the individual area or the
common area. The user must correct the condition (e.g. an active sensor) before the system can be set.
It is possible to specifically arm a common area (e.g. using a keypad or the Symmetry Command Center), but to be
successful, all areas accessed through the common area must already be set.
To define a common area:
1. Define the area (e.g. Area 7) using the "Setup/Device Groups/Intrusion Areas" screen.
2. Use the Common Areas tab in the "Setup/Device Groups/Intrusion Areas" screen to select the areas that
are accessed through the common area (e.g. Areas 1-6). By selecting areas in this tab, you are declaring
that the area you are defining (e.g. Area 7) is a common area serving the selected areas.

Note: A common area and all its associated areas must be controlled by the same Symmetry node.

Intrusion Operation Warning


An operational warning has occurred during the operation of an M2150 intrusion system.

Intrusion Panel Restored


An intrusion system has returned to being in an online status after being offline.

Intrusion Panel Timed Out


An intrusion system has been offline for the number of minutes specified in the "Install/Intrusion/Intrusion/System
Configuration" screen.

Intrusion System Area


For CU30 and ThorGuard panels, this refers to a group of Symmetry "zone groups". Symmetry and the Hisec
documentation have the same meaning for "area". For other panel types, a Symmetry "area" is a group of
Symmetry "zones"; that is, a group of detectors.

Intrusion System Output


This is an electrical connection on a panel that may, for example, by used to control external equipment or alarm
signaling devices.
For Siemens (Vanderbilt) panels, an output is a "mapping gate", which is used to map physical outputs or other
devices.

Intrusion System Panel


This is the controller unit of an intrusion system.

519
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Intrusion Users
An intrusion user is a card holder who is given access rights to operate a third-party Bosch B9512G, DMP
XR500N\XR550 or ThorGuard intrusion system (e.g. to set or unset the system). Intrusion users are applicable only
if an Intrusion Management license is installed, and are not applicable to M2150 intrusion systems.
You can make a Symmetry card holder an intrusion user by assigning access rights to panels through the Access
Rights tab of the "Home/Identity/Card Holders" screen. This allows the card holder to set, unset and perform other
tasks at keypads, etc. attached to the intrusion system, in the same way as if the user had been created at the
intrusion panel itself.
Before assigning access rights in Symmetry, you must use the "Install/Intrusion/Intrusion/Upload Configuration"
screen (for DMP and ThorGuard panels) or the "Install/Intrusion/Intrusion/System Configuration" screen (for Bosch
panels) to upload data held in the third-party system. This enables Symmetry to know information such as the user
numbers already defined at the panels. You must perform this action each time intrusion user details are changed
directly at an intrusion panel, so that Symmetry is kept synchronized.
When you assign the access rights in Symmetry, you select the panels the card holder is allowed to operate (all
must be the same type), together with the user number, user/pass code, user name and profile ID (or area authority
level) to use for the card holder at the panel. Specify an existing user number to associate the Symmetry card
holder with an existing user at the panel, or specify a new user number if you want to create a new user at the
panel. The data is automatically downloaded to the specified intrusion panels. If required, a manual download can
be performed using the "Maintenance/Download/Intrusion Users" screen.
If you specify the number of an existing intrusion user and, for example, change the user code, you are prompted
whether to update the information at the panels.
The Intrusion Management Installation and User Guide gives an overview of intrusion management and step-by-
step instructions on how to configure and use the software.

Note: The Remove Users from Intrusion Panels setting in the "Maintenance/User & Preferences/System
Preferences" screen controls what happens to user details at panels if a card holder is deleted from Symmetry, or if
the access rights are removed.

Intrusion System Zone


This is a single input to the alarm panel for an alarm detector. Note that in some cases, detectors may be wired in
series, but connect to the panel using a single input; this is still known as a single "zone". Hisec documentation
uses the term "input" to mean a Symmetry "zone".

Intrusion System Zone Group


This term is used only for CU30 and ThorGuard panels, and refers to a group of Symmetry "zones"; that is, a group
of detectors. The grouping is defined by the panel software. Hisec documentation uses the term "zone" to mean a
Symmetry "zone group".

Intrusion Systems Tx, Intrusion Panel, etc.


This option is used to report on alarms/events associated with the use of intrusion systems. Choose the required
category, followed by None, All or a specific item.

Intrusion Zone
An M2150 intrusion zone represents a sensor, such as a PIR movement sensor or a door contact. A zone can be
created by either of the following:
 A monitor point configured as an intrusion zone, as defined in the "Install/Access Control/Monitor
Point" screen.
 The door monitor of an M2150 intrusion reader, as defined in the "Install/Access Control/Reader"
screen. The door monitor is used both for access-control purposes (for example, to monitor Door
Forced conditions), and for intrusion purposes. Note: Please refer to the M2150 Intrusion Guide
for system examples.

520
Symmetry Software Reference Manual

One or more intrusion zones can be in an M2150 intrusion area. A zone cannot be in more than one area.

IP Address Change
The IP address of an Edge Network Video Server has been changed.

IP Camera Offline
An IP camera is offline. The message is displayed when the Offline Monitoring Interval (specified in the Reporting
tab of the camera definition screen) has expired.
Note: This alarm/event message can be generated only for cameras that are assigned to a Symmetry NVR.

IP Camera Online
An IP camera is online.

Issue Level Exceeded


A node has not accepted a card, because the issue level of the card is too high. Only Symmetry M4000 nodes can
accept cards with an issue level greater than 7.

Keycard Holder
If Keycard Holder is selected for a card, readers that have been enabled as keycard readers (by the installer or
command) recognize the card as a keycard.
A keycard holder can switch the reader between keycard-in and keycard-out states (access rights permitting) by
presenting his or her card and swapping the first two and last two digits of the PIN, such as 3412 for a PIN of 1234,
or 78234512 for a PIN of 12345678. PINs such as 1212 and 9999 are therefore not allowed.
When a reader is in keycard-out state, all cards except keycards are denied access, irrespective of access rights.
When a card reader is in keycard-in state, normal operation is resumed.
Keycard mode can be useful if, for example, the door is the point of entry for switching a intruder alarm off, and only
a few people know how to switch the alarm off.

Keycard In
Performs the same action as a keycard holder switching a reader into the keycard-in state. The Keycard In and
Keycard Out commands have no effect if keycard mode is off.
Available as: manual, scheduled or trigger command.

Keycard Mode Off


Causes the reader no longer to operate in keycard mode.
Available as: manual, scheduled or trigger command.

Keycard Mode On
This command causes Series 600 or later reader to operate in keycard mode, which enables a keycard holder or
command to switch the reader between keycard-in and keycard-out states (access rights permitting). A keycard
holder can switch the reader between keycard-in and keycard-out states (access rights permitting) by presenting his
or her card and swapping the first two and last two digits of the PIN, such as 3412 for a PIN of 1234, or 78345612
for a PIN of 12345678. PINs such as 1212 and 9999 are therefore not allowed.
When a reader is in keycard-out state, all cards except keycards are denied access, irrespective of access rights.
When a card reader is in keycard-in state, normal operation is resumed. Keycard mode can be useful if, for
example, the door is the point of entry for switching off an intruder system, and only a few people know how to do it.
A card holder can be made a keycard holder by using the "Home/Identity/Card Holders" screen.
Available as: manual, scheduled or trigger command.

521
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Keycard Out
Performs the same action as a keycard holder switching a reader into the keycard-out state. The Keycard In and
Keycard Out commands have no effect if keycard mode is off.
Available as: manual, scheduled or trigger command.

Keycard set IN/OUT


A keycard holder can switch a keycard reader between keycard-in and keycard-out states (access rights permitting)
by presenting his or her card, followed by PIN with the first and last two digits swapped. For example, this being
3412 for a PIN of 1234, or 78345612 for a PIN of 12345678. When a reader is in keycard-out state, all cards except
keycards are denied access, irrespective of access rights. When a card reader is in keycard-in state, normal
operation is resumed. Keycard mode can be useful if, for example, the door is the point of entry for switching a
burglar alarm off, and only a few people know how to switch the alarm off. Cards can be nominated as keycards by
using the "Home/Identity/Card Holders" screen.

Keycard Set IN
The card is a keycard and has been used to set the reader in keycard-in state.

Keycard Set OUT


The card is a keycard and has been used to set the reader in keycard-out state.

LAN Answered Call


A client PC has answered a call from a LAN chain.

LAN Chain
A LAN chain is a series of interconnected nodes (or intrusion alarm panels) that communicate with an client PC via
a Network Interface Card module (NIC module) in the first node of the chain, or via a device called a PAD.
Communications between the NIC module or PAD and client can be carried out over a network, which may be
shared with other clients.

LAN Connected
A client PC has successfully connected to a LAN chain.

LAN Connecting
A client PC is currently attempting to connect to the specified LAN chain.

LAN Disconnected
A client PC has disconnected from the specified LAN chain.

LAN Error
Indicates that the LAN chain has stopped responding to the client PC, or a response has been received when a
connection has not been made.

LAN Failed Connection


Indicates that a client PC has failed to connect to a LAN chain after the maximum number of retries.

522
Symmetry Software Reference Manual

LAN Retry
Indicates an attempt to establish communications with a LAN chain following a previous attempt that failed. The
number and frequency of retries is set up by the installer.

Last Name
Select this option if you want to list existing people by name.
If you want to be selective about the people to list, type the last name in the box. For example, if you want to find
everyone who has a last name of Smith, choose Last Name and type Smith in the box before selecting Find.
You can use wildcards if required.

Last Name/First/Middle Name


It is advisable to make the person's full name unique, if possible.
You cannot change these for an existing record if Allow Changes to Cardholder Name is not selected in your user
role ("Maintenance/User & Preferences/Roles" screen).

Least Used Card Deleted


The details of the least-used card were removed from a node's database when operating in learn mode.

License Registration Warning


The software needs to be registered in the "Maintenance/Licensing/System Licenses" screen if you want to
continue to use it.

Limit Invalid Logon Attempts


Selecting this option limits the number of invalid password attempts. On the specified number of incorrect attempts,
the user is automatically prevented from logging in. This is achieved by automatic deselection of the Enabled
option in the "Maintenance/User & Preferences/Accounts" screen.
This option does not apply if you have System Admin privileges (as specified in the "Maintenance/User &
Preferences/Roles" screen).

Listing
This button displays an access rights listing for the selected card.

Live
Selecting this option displays another window in which you can view a live image of the person from a suitably
connected video camera. In the new screen, choose Freeze when a good image is displayed. The Freeze button
toggles to Resume, which allows you to obtain a better image, if required.
Framing the picture

Live
Selecting this option displays another window in which you can view a live signature from a suitably connected
video camera. In the new screen, choose Freeze when a good image is displayed. The Freeze button toggles to
Resume, which allows you to obtain a better image, if required.
Framing the picture

Live Video
This command, which is available by right-clicking on an DVR or IP camera on a graphic, displays the live image
from the camera. The option is available if you have permission (through your user role) to use the "Home/Video &
Audio/Virtual Matrix" screen.

523
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

The Show live video from graphics in option in the "Maintenance/User & Preferences/Client Preferences" screen
determines whether the live image is displayed in the "Home/Video & Audio/Virtual Matrix" screen or in a separate
popup window.
If the camera is a 360-degree camera that supports dewarping, the live image will display the camera view and
camera preset selected in the "Setup/Graphics/Setup" screen. You can change the camera view when viewing the
live video.
If you select this command for a camera group (such as from a graphic), the "Home/Video & Audio/Virtual Matrix"
screen opens and displays video from all cameras in the group.

Location
You can use this optional menu to select the location of the device. You can type the location in the field or select
an existing location that you have previously typed.
You can organize or show\hide records by location in the Selection screen. The Selection List Rows Limit option
in the "Maintenance/User & Preferences/Client Preferences" screen determines the maximum number of devices
listed.
The location can also be displayed when viewing alarms and activity (e.g. in the "Home/Monitoring/Alarms" and
"Home/Monitoring/Activity" screens).

Lock Door
Causes the reader to lock the door and operate normally.
Available as: manual, scheduled or trigger command.

Lock Monitor Open


This indicates that the door lock has been opened. This is applicable only when M2150 is being used to replace
third-party access-control equipment that uses a single 2-core cable to monitor the lock sensor, door sensor and
exit-request switch. Please refer to the M2150 Design Guide for further information.

Lock Monitor Secure


This indicates that the door lock has returned to its normal, secure state.

Lost
To list only those people who have lost cards, as marked in the card details.

Lost Card
The card was used at a reader, but the card has been marked as "lost" in the "Home/Identity/Card Holders" or
"Home/Identity/Visitors" screen. The person was not granted access.
Click here for additional information about using this message in trigger commands.

Magstripe encoder
Separate magstripe encoders are not supported in the current version of Symmetry.

Maintenance Zone
You can use this menu to include any alarms or events that originated from nodes in a maintenance zone. The
menu lists each maintenance zone set up in the "Maintenance/Maintenance Zones/Maintenance Zones" screen.
Your user role must include permissions to the "Maintenance/Maintenance Zones/Maintenance Zones" screen for
the menu to include any maintenance zones.
The All option reports activity associated with any maintenance zone, even any previously deleted maintenance
zones.

524
Symmetry Software Reference Manual

Maintenance Zone Activated


A maintenance zone has been made active.

Maintenance Zone Deactivated


A maintenance zone has been deactivated.

Mandatory Intrusion Comments


This setting is available if an intrusion license is installed, and is relevant for M2150 intrusion systems and intrusion
systems supported by the Full Intrusion Management interface.
Selecting this option makes it mandatory for a Symmetry user to enter the "Action Taken" when sending a
command to disarm an area, bypass a zone or disable a zone from either of the following screens:
 The "Home/Monitoring/Command Center" screen.
 The "Home/Monitoring/Graphics" screen, providing the Enable Comments on Graphic system
preference is also selected.
If this option is not selected, the Action Taken field or prompt is displayed when sending the command, but is not
mandatory.

Merge Field
The Merge Field menu is applicable only if the selected trigger is an alarm-based trigger. You can use the menu to
insert fields into the box below the menu.
The fields are for information that varies for each alarm. For example, inserting the "Who" field will include the name
of the person who caused the alarm.
To use this feature, click the mouse pointer in the box (at the position to insert the field), then select the required
field from the menu. You can also use Insert to insert a selected field.
The Merge Field menu contains the following:
 Each card holder and visitor personal data title defined in "Setup/Identity/Personal Data".
 Category and Location - The category and location information from the appropriate device
definition screen. For example, for a reader alarm, this information is taken from the "Install/Access
Control/Reader" screen.
 State - The current state of the alarm, such as "AcknowledgedAndReset".
 What, When, Where, Who - Standard attributes of the alarm.

Message
You can use this box to enter text messages.

Micronodes
Please note that Micronodes are no longer supported.

Minimum Password Length


Use this field to specify the minimum length of passwords.

Modem Error
Indicates that the modem has stopped responding to the client PC, or a response has been received when a
connection has not been made.

525
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Modify Video Settings


Changes the video settings of the selected video server camera. The command is available only for certain camera
types, such as those connected to an ENVS. You can choose to make the settings permanent, or apply them for a
temporary period.
Picture Refresh (Frame Rate)
Picture Size (Resolution)
Permanently apply the settings - Select this option if you want the settings to be permanent (until changed in the
appropriate Camera screen in Symmetry or by another command).
Period - If you want the settings to be temporary, specify the length of time that you want the new settings to apply
for.
Available as: manual, scheduled or trigger command.

Monitor Point Activated


A monitor point on a Digital Video Recorder has been activated.

Monitor Point Changed


A monitor point has changed state (contacts have opened or closed).

Monitor Point Circuit Open


The wires to the monitor point have been open-circuited. This alarm/event is generated only for monitor points that
have three-state, four-state or six-state supervision (as set up by the installer). The message can be generated
even if the monitor point is disabled (for example, by a command).

Monitor Point Circuit Shorted


The wires to the monitor point have been short-circuited. This alarm/event is generated only for monitor points that
have three-state, four-state or six-state supervision (as set up by the installer). The message can be generated
even if the monitor point is disabled (for example, by a command).

Monitor Point in Alarm


Indicates that the monitor point has been triggered; for example, a window has been opened without authority.

Monitor Point Normal


This indicates that the monitor point's cable or alarm is not in one of the above states. When the above messages
are alarms (rather than events), they cannot be cleared until the cable is fixed or the monitor point is reset (unless
you have System Admin privileges as specified in the "Maintenance/User & Preferences/Roles" screen).

Monitor Point Tamper Alarm


The monitor point's tamper switch has been operated. This alarm/event is generated only for monitor points that
have six-state supervision (as set up by the installer). The message can be generated even if the monitor point is
disabled (for example, by a command).

Monitor Point Tamper Normal


The monitor point's tamper switch has been reset. This alarm/event is generated only for monitor points that have
six-state supervision (as set up by the installer).

Monitor Point Deactivated


A monitor point on a Digital Video Recorder has returned to its deactivated state.

526
Symmetry Software Reference Manual

Monitor Point Status on Graphics


Selecting this option causes each monitor point icon on a graphic to include the blue alarm symbol when the
monitor point is in the alarm state. The option affects all existing and new monitor point icons on graphics.

Monitor Points and Monitor Point Groups


This is used to report on alarms/events associated with monitor points.
Choose Monitor Points to produce a report of all alarms/event from a specified monitor point, or from all monitor
points.
Choose Monitor Point Groups to produce a report of all alarms/event from a specified monitor point group, or from
all monitor point groups.
Choose None if you do not want to report on monitor point alarms and events.

Motion Alarm/Detection
Movement detected in a monitored area of a CCTV picture.

Motion Normal
Produced when there is no longer movement detected.

Move
This button enables you to associate the person with a different company. The button is available only if there is
more than one company defined. You can carry out a move, irrespective of the companies defined in your company
group.
Before using this option, make sure that customer/facility codes have been set up in the
"Setup/Configuration/Facility/Customer Codes" screen.

Note: The existing customer code must be in the list of customer codes assigned to the company that the
person will belong to.

The moved record has the following company-specific details reset:


 Badge Design - Set to None.
 Badge Expires - Set blank.
 Access rights - Removed, except those access rights that belong to the new company, as assigned
by a user of that company while the Card Holders By Company option in the "Maintenance/User
& Preferences/System Preferences" screen is deselected.
All other data is retained, including personal data (it is assumed that the new company's personal data titles are the
same).
The button is not available if you are using the "Home/Identity/Visitors" screen and have logged on as a visitor
manager (that is, your user role is "Visitor Management").

Multiple Cards
Specifies whether a card holder can have more than one card (each with a different card number). If you select this
setting, additional options appear in the "Home/Identity/Card Holders" screen that enable you to assign more than
one card per card holder. One of the cards can be a temporary card.
You are not able to deselect this setting if there is a card holder who has more than one card.
For further information, please refer to Using Multiple and Temporary Cards.

Network Address Error


The IP address is incorrect.

527
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Network Loss
The network connection to an Edge Network Video Server has been lost.

Network Restored
The network connection to an Edge Network Video Server has been restored.

New
The record is new and has not yet been saved. A card cannot be used until you have closed the Selection screen.

New
Use this to create a new entry.

No Alarms
There are currently no alarms. You need take no action.

No of Card Holder Activity Images


This determines the maximum number of card holder or visitor images that can be displayed in the
"Home/Monitoring/Activity" or "Home/Monitoring/Activity"/History screen when Display Card Holder Image is
selected in that screen.

Node-Restored On Primary
Following a 'Node Timed Out On Primary' alarm/event, this message is issued following re-establishment of
communications on the primary side of the bi-directional chain of nodes.

Node-Restored On Secondary
Following a 'Node Timed Out On Secondary' alarm/event, this message is issued following re-establishment of
communications on the secondary side of the bi-directional chain of nodes.

Node Back In Service


A node has started to respond to a communications request following a Node Timed Out message.

Node Buffer > 75% full


The event buffer in a node (normally remote) is getting full.
What you need to do

Node Buffer Overflow


The oldest events stored in a node (normally remote) have been overwritten, because the memory was full.
What you need to do

Node Firmware Error


An firmware error has occurred in a node. Contact your supplier.

Node Hardware Error


A hardware error has occurred in a node. Contact your supplier.

528
Symmetry Software Reference Manual

Node Firmware Version Changed


Symmetry has re-established communications with a node, but there has been a change of firmware in the node
while communications were disconnected. The alarm reports the new firmware version.

Node Maintenance (Maintenance Mode)


Placing a node in maintenance mode generates a Node Maintenance alarm and causes all other access control
and intrusion alarms originating from the node or from the Symmetry server to be reported as events. Maintenance
mode allows a service engineer to carry out maintenance work without generating unwanted alarms.
All areas controlled by the node must be disarmed before using maintenance mode.
An intrusion node can be placed in maintenance mode from the "Install/Access Control/Node" screen.
The Node Maintenance alarm cannot be cleared until maintenance mode is deactivated.
See also maintenance zone.

Node Powered Down


A node was powered down due to insufficient power in the battery. The alarm/event is generated when power is
restored.

Node Tamper
The tamper switch on the node has been opened.

Node Tamper Normal


The tamper switch on the node has been closed.

Node Time Codes are 75% Full


The number of time codes, time periods or time periods per time code exceeds 75% of the maximum allowed for
the node. This occurs if, for example, an excessive number of time codes or complex time codes have been defined
in Symmetry.

Node Time Codes Full


The number of time codes, time periods or time periods per time code exceeds the maximum allowed for the node.
This occurs if, for example, an excessive number of time codes or complex time codes have been defined in
Symmetry.

Node Timed Out


A node has not responded to a communications request from the client PC that it is connected to. A Node Timed
Out alarm cannot be cleared in the Acknowledge Alarm screen until a ' Node Back In Service' message is received.

Node Timed Out On Primary


If primary-port communications are lost to a node on a bi-directional chain, this message will be generated and
communications will then be established on the secondary port for this node. If communications to both ports fail,
the 'Node Timed Out' message is issued.

Node Timed Out On Secondary


If secondary-port communications are lost to a node on a bi-directional chain, this message will be generated and
communications will then be established on the primary port for this node. If communications to both ports fail, the
'Node Timed Out' message is issued.

529
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Not Issued
To list only those people who do not have a card number (a card number of zero).

Not Yet Valid


Indicates that the card's active date has not yet been reached.

Not Yet Valid


The card is known to the system, but it has been used before its active date (as set up by using the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen). The person was not given access.
Click here for additional information about using this message in trigger commands.

Not Yet Valid


To list only those people who have a card that has not yet reached its card active date.

Notes
You can choose one of the following:
 No Change to Notes - Select this if you do not want to make changes to the notes saved for each
card holder or visitor selected.
 Bulk Append Notes - Select this to add a note to each of the card holders or visitors selected.
Existing notes for each record will remain; the note you type is appended to any existing notes.
Click the icon to the right of this option to enter the note.
 Bulk Delete Notes - Select this to delete the notes saved for each card holder or visitor selected.
These options affect the notes created the icon in the "Home/Identity/Card Holders" or "Home/Identity/Visitors"
screen. They do not affect the general notes created using the Notes button in these screens.

Notes
The Notes button opens a Notes screen, which allows you to record or read any notes relating to the screen you
are currently using.
Most screens that contain a Notes button also contain the following icon, which has a different use from the Notes
button:

Selecting the above icon enables you to write a note for the individual record you are editing. For example, if you
are using the Card Holders Definition screen, you can select the icon to write a note about the individual card holder
you are editing. If you select the Notes button in the same screen, you can write a note that is displayed no matter
which card holder you are editing.
The above icon changes to the following if a note already exists:

Note: Access to these icons in the Card Holders screen can be controlled using the Card Holder Notes privilege in
the "Maintenance/User & Preferences/Roles" screen.

Not Supported
Not currently supported in this version of Symmetry.

NVR Device URL Missing


The Symmetry software has not been able to retrieve the URL from a plug-in for a camera that has been assigned
to a Symmetry NVR. The camera may be offline.

530
Symmetry Software Reference Manual

NVR Status
Displays Online and Offline messages for a Symmetry NVR.

Offline
The specified device is offline (for example, depending on device type, possibly caused by an unplugged network
cable).

Office Mode On
Switches the selected reader into office mode, which can be used to keep the door unlocked during normal office
hours. This is available only for Aperio locks/readers connected through an Aperio hub to an EN-LDBU node.
Office mode is switched on and off using a scheduled command. The door unlocks on the first granted-access
transaction following the start time of the command and relocks at the end time of the scheduled command. For
further information, please refer to the Aperio Locks Configuration and User Guide.
For further information, please refer to the Aperio Locks Configuration and User Guide.
Available as: scheduled command.

Office Mode Off


Switches office mode off. The reader returns to normal automatic door control mode.
Available as: manual, scheduled or trigger command.

OK
This takes you out of the screen and saves changes.

OK
This takes you out of the screen, saves any changes and starts the import process (if appropriate, at the specified
date and time).

Open
Gives access to the details of the highlighted entry. Use this button after you have selected Find and highlighted an
entry with the mouse. Double-clicking on an entry has the same effect.

Out of Sequence Now At Point


The guard did not clock at the correct patrol tour point.

Outgoing Communications Receiver


The Outgoing Communications Receiver options in the "Maintenance/User & Preferences/System Preferences"
screen are relevant only if you want to send intrusion, reader and monitor point alarms over the network to a DMP
SCS-1R communications receiver.
Note: Alarms are routed to the communications receiver only at the times configured in the
"Operation/Alarms/Routing" screen.
Note: Please refer to the M2150 Intrusion Guide for further information, including mapping between Symmetry
alarms and DMP alarms.
The following options are available:
Network Address - The IP address or network (DNS) name of the communications receiver, as configured in the
communications receiver.
Port Number - The port at the communications receiver that is configured to receive alarms.
Account Number - Details of any alarm sent to the communications receiver include the account number, which
identifies the source of the alarm. The specified account number is used as the default for the "Setup/Device
Groups/Intrusion Areas" screen, which is used for intrusion alarms. Reader alarms use the default account number.
You can specify an account number for monitor point alarms in the "Install/Access Control/Monitor Point" screen.

531
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Send Zone Normal to Receiver - Select this option if you want the Symmetry software to send Zone Normal
events to the communications receiver.
Send Area Arm/Disarm to Receiver - Select this option if you want the Symmetry software to send the following
events to the communications receiver:
Area Armed
Area Disarmed
Area Late to Arm
Enable Encryption and Passphrase - Enable encryption if encrypted communications is required to the
communications receiver. If you enable encryption, you must specify the passphrase, which must match the
passphrase at the communications receiver.

Output Off
Switches off the auxiliary output.
Available as: manual, scheduled or trigger command.

Output On
Switches on the auxiliary output until an Output Off command is used.
Available as: manual, scheduled or trigger command.

Output On/Off/Pulse
An auxiliary output on an Edge Network Video Server has switched on/off/pulsed. The output may be being used to
switch external equipment on or off.

Output Pulse
Switches on the auxiliary output for a predefined period of time (as specified by the installer or in the screen you are
using), then switches it off.
Available as: manual, scheduled or trigger command.

Overdue At Point
The guard has not arrived at a patrol tour point within the time allowed.

Overview of the Client Preferences Screen


This screen enables you to switch on/off various settings that affect only the PC you are currently using.

Overview of this Screen


You can use this screen to define reports that can be run from the "Reports/History/Predefined" menu. You can run
the reports on an ad-hoc basis or automatically at scheduled times and dates.
 Predefined Activity - Gives details of previous events and alarms.
 Predefined User Audit - Gives details of user actions within the screens.
 Predefined Onsite Times - Gives details of the amount of time that card holders have spent on site.
 Predefined Card Holders On Site - Gives details of card holders or visitors who entered the
building via a reader in a selected reader group.
 Predefined Patrols - Gives details of when patrol tours were started and completed and any
infringements of the rules (available only if the Guard Patrol Manager software is installed).
 Predefined Video Archive Audit - Gives details of the last video recording stored in a video storage
folder for selected camera(s).
The reports you set up in this screen can be used by any company.

532
Symmetry Software Reference Manual

Note: If you wish to send scheduled reports to a printer, the Symmetry services must run in a named account that
has access to the printer.

Page View/Normal View


This button toggles the tree view display between the normal view and a whole page view that uses the full screen.
This makes it easier for you to view the access rights when many access rights have been defined.

Panel Fault
A panel fault is produced when, for example, the battery in the intrusion panel is low, or there is a communications
problem.

Panel Reset
Produced when an intrusion panel is reset from a fault or alarm condition.

Passage / Double Swipe Mode


This option is available only if the ASSA ABLOY DSR Lock license is installed. Selecting this option allows the card
holder to use his/her card to unlock doors permanently that have Double Swipe / Passage Mode Enabledselected
in the "Install/Access Control/Reader" screen. Please refer to the Third-Party Access Devices Configuration and
User Guide for further information.

Password
Enter the user's login password, which is case-sensitive. The password must be at least five characters long
(except when entering a password for a visitor manager in the "Home/Identity/Card Holders" screen, which allows a
blank password).
If the Strong Password option is set in the "Maintenance/User & Preferences/System Preferences" screen, the
password must have at least one lowercase character, one uppercase character, one numeric character and one
punctuation mark.
If Allow Use Of Old Passwords is deselected in the "Maintenance/User & Preferences/System Preferences"
screen, the current password will not be able to be reused.
Users can also change their password by using Set Password in "Maintenance/User & Preferences" (if available,
as specified in the user's role).

Password Changed
A user has changed his/her password after connecting to a video server from a Web browser.

Patrol Card
This option is available if you have the Patrols license installed. If you select Patrol Card, the card can be used by
a guard during a patrol tour (as set up in the "Setup/Configuration/Patrol Tours" screen).

Patrol Hold
Temporarily suspends the patrol. The tour resumes automatically when the guard clocks at the next tour point.
Available as: manual command.

Patrol Operations
Select this if you want the report to include patrol tour alarms/events, as set up using the
"Setup/Configuration/Patrol Tours" screen:
Arrived Too Early At Point
Out of Sequence Now at Point
Overdue at Point

533
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Patrol Tour Complete


Patrol Tour Held
Patrol Tour Reset
Patrol Tour Restarted
Patrol Tour Started
Successful Clock At Point

Patrol Reset
Causes the patrol tour to be reset. You must use this command when the patrol is complete to acknowledge that
you have seen that it is finished, otherwise you will not be able to start the patrol again. You can also use this
command at any time to abandon the patrol tour.
Available as: manual command.

Patrol Start
Starts a patrol tour. You need to select the guard's name from the pull-down menu.
Available as: manual command.

Patrol Tour Complete


The guard has completed the patrol tour.

Patrol Tour Held


The patrol tour has been suspended with the Patrol Hold command from the "Home/Monitoring/Command Center"
screen.

Patrol Tour Reset


The patrol tour has been reset with the Patrol Reset command from the "Home/Monitoring/Command Center"
screen. The command can be used to abandon a patrol tour or to acknowledge a completed patrol tour.

Patrol Tour Restarted


The patrol tour has been restarted following a Patrol Hold command from the "Home/Monitoring/Command Center"
screen.

Patrol Tour Started


The patrol tour has been started with the Patrol Start command from the "Home/Monitoring/Command Center"
screen.

Manual Door Control Enabled


Switches the selected reader into PC door control mode. (Otherwise known as manual door control.)
Available as: manual, scheduled or trigger command.
About PC Door Control

Automatic Door Control Enabled


Switches PC door control mode off. The reader returns to normal automatic door control mode.
Available as: manual, scheduled or trigger command.

Pending
The visitor is not currently signed in and the departure date and time are in the future. This indicates that the visitor
may return.

534
Symmetry Software Reference Manual

Personal Data Title


This specifies the method that is to be used to determine the card holders to include in the report. Choosing a title
but leaving the Personal Data box blank enables all card holders who have information defined for that title (in the
"Home/Identity/Card Holders" screen) to be included. For example, if "Contractors" is a title, you could select it to
produce a report on contractors. By entering specific information in the Personal Data box, perhaps using
wildcards, you can be selective about the card holders to include.

Picture Loss (or Video Picture Loss)


The picture from a CCTV camera is obscured (for example, the camera is covered or pointing at a wall). The
command is available only for certain camera types, such as those connected to an ENVS.

Picture OK (or Video Picture Restored )


The CCTV picture is normal.

Picture Refresh (Frame Rate)


This determines the smoothness of the video pictures from the camera. Increasing the number of frames taken per
second increases picture smoothness, but may result in a higher camera data (bit) rate, which increases network
usage and results in larger video files.

Picture Size (Resolution)


A higher resolution produces clearer pictures, but may result in a higher camera data (bit) rate, which increases
network usage and results in larger video files.

PIN Code
The card's PIN (Personal Identification Number). This is for readers that require the entry of a PIN. The PIN need
not be unique.
A default PIN is generated automatically for each new card. You can modify the default if you wish. Holding down
the Ctrl key on your keyboard, then clicking in the PIN Code box causes the system to generate a random PIN.
The Standard PIN Code Length option in the "Maintenance/User & Preferences/System Preferences" screen
specifies the length of PIN codes.
If the card holder has Keycard Holder set in the card details, the first and second digits of the PIN must not be the
same as the final two digits. For example, 1212 and 9999 are not permitted.
For security reasons, the PIN is displayed only if Card Holder Show PIN Code is selected in your user permissions
("Maintenance/User & Preferences/Roles" screen).
The Prevent Consecutive PIN Digits setting in the "Maintenance/User & Preferences/System Preferences" screen
determines whether three or more consecutive or repeating digits are allowed in a PIN code.
A card can be blocked if the PIN number is entered incorrectly a specified number of times. Click here for further
details.
It is possible for a card holder defined in the "Home/Identity/Card Holders" screen to change their PIN at Series 6xx
and later readers (providing the reader has a keypad). For further information, see About Card Commands.

Pre-arm Timer Started


The pre-arm period of an intrusion area auto-arm started.

Pre-arm Timer Stopped


The pre-arm period of an intrusion area auto-arm finished.

535
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Prevent Consecutive PIN Digits


Enabling this system preference prevents the use of three or more repeating or consecutive digits in PINs. For
example, if the option is set, Symmetry would not allow the following PINs to be saved: 1112, 3333, 1222, 1234 or
4321. The following PINs would be acceptable: 1122, 1223 and 1245.
If you set this option on an existing system, Symmetry does not check existing PINs for repeating or consecutive
digits. However, the next time you open and save a card holder or visitor record, Symmetry will check that the rule
is satisfied.
This system preference does not apply to IDS codes.

PTZ Command
A Pan-Tilt-Zoom command was sent to a camera. The message is available only for certain camera types, such as
those connected to an ENVS.

PTZ Preset
Moves the selected IP or DVR camera to a preset position. This command is available only if presets have been
defined for the camera.
This command is not available for 360-degree dewarping cameras that support presets, as for these cameras, the
presets are dependent on camera views.
Available as: manual, scheduled or trigger command.

PTZ Preset Activated


Preset position for a pan-tilt-zoom camera activated.

PTZ Start
Pan, tilt or zoom operation started.

PTZ Stop
Pan, tilt or zoom operation stopped.

Purge Daily Logs After


Specifies the maximum number of days that the system keeps information in the transaction database on the
computer's disk. The oldest data in the database is therefore this number of days prior to the current date. Older
information is deleted automatically from the database. The transaction database records information for reporting
purposes, such as for the "Reports/History/Activity" screen.
Archiving within the number of days specified by this option will ensure that all data is preserved for reporting
purposes.
On systems using the Microsoft SQL Server 2008 R2 Express, databases are restricted to a maximum size of
10GB. If the transaction database grows to within 80% of this maximum (that is, 8GB), the "Transaction Log
Running at Capacity" alarm/event message is generated. The oldest data in the database is deleted automatically
to keep the database size less than 8GB. The additional 20% of spare capacity is required to enable database
restoration to take place from a backup.

Quality and Content


These bar indicators show the quality and content of an enrolled fingerprint.
Each indicator consists of a maximum of five bars. The bars colored dark blue indicate the minimum quality and
content of an enrolled fingerprint, as defined in the "Maintenance/User & Preferences/Accounts" screen.
Once a fingerprint is captured, each bar indicator is updated to show the actual quality and content. The bars are
shown in green if the actual quality and content match or exceed the minimum required values. The bars are shown
in red if this is not the case.
About Quality

536
Symmetry Software Reference Manual

About Content

Random Search On/Off


Determines whether to switch random searches at the reader on or off. See Random Search.

Random Search Probability


Defines the meaning of the high and low search probabilities. The values entered represent the probabilities out of
1000. See Random Search.

Reader Group
All new card holders being imported will be given the selected reader group, except those whose ACCESSSTATUS
is set to "D" (Denied).
This setting does not affect existing card-holder records that are being updated via data import.

Reader Groups
A reader group is a set of one or more readers, as defined in the "Setup/Device Groups/Readers" screen.
When access rights are set up for a reader group, the card can gain access at all readers in the group on the days
and times determined by the selected time code. You can define time codes using the "Operation/Times/Time
Codes" screen.
A Reader Group access right is therefore an access right defined by associating a particular reader group with a
particular time code.
When assigning access rights, the reader groups available for selection include any shared reader groups (as set
up in the "Setup/Device Groups/Shared/Shared Readers" screen) that have been shared to the currently-selected
company.
When viewing existing access rights, shared reader groups are grayed out if they are not shared to the currently-
selected company.

Reader Tamper Normal


This indicates that the reader cover was re-fitted or communications have been restored following a 'Reader
Tamper' alarm/event.

Reader Tamper
The reader has been opened or communications to the reader has been lost. If this message is an alarm, it cannot
be cleared until the reader cover is closed or communications are restored.

Readers
A card can have access rights to an individual reader on the days and times determined by the selected time code.
You can define time codes using the "Operation/Times/Time Codes" screen.
A Reader access right is therefore an access right defined by associating a particular reader with a particular time
code.

Readers and Reader Groups


This is used to report on alarms/events associated with readers/doors.
Choose Readers to produce a report of all alarms/event from a specified reader, or from all readers.
Choose Reader Groups to produce a report of all alarms/event from a specified reader group, or from all reader
groups.
Choose None if you do not want to report on reader/door alarms and events.

537
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Record Video
Automatically records video from the selected IP or DVR camera. A tagged recording is produced. The video clip
will span a specified period of time either side of the event that triggers the command.
Available as: trigger command. Note: This command is not intended to be used as a manual or scheduled
command; use Start Recording instead.
Selecting the command displays the following options:
 Pre Event Time (Pre-Period) - This determines length of time before the event that the video clip
should start. For example, if you specify one minute, the video clip will start one minute before the
event.
For an IP camera, pre-event video is available only if recorded by a previous command.
DVRs should normally be set up to record continuously, and therefore pre-event video is normally
available for a DVR.
 Post Event Time (Post-Period) - This determines length of time after the event that the video clip
should end. For example, if you specify one minute, the video clip will end one minute after the
event.

Note: There may be small delay of a few seconds between the time the command is issued and the time the
recording actually starts. This is avoided if the camera is already recording at the time the command is issued (for
example, using the camera's pre-event buffer).

Recording Failed
The Symmetry NVR is unable to record correctly. This may occur if, for example, the connection to a camera that
should be recording has been lost.

Recording Restored
A recording at a Symmetry NVR has restarted following a "Recording failed".

Recording Stopped, Insufficient Space


There is insufficient disk space left in a Symmetry NVR video repository to store a new recording without deleting
video that is less than a day old. Video less than one day old is never deleted.

Re-enable Stopped Cards


This command unblocks all cards that have been blocked by a random search.
Available as: manual, scheduled or trigger command.

Region Offline/Online
Region Offline indicates that communications with the named Symmetry region have been lost. This may be caused
by a temporary network interruption.
A Region Online message is generated when communications are re-established.

Remove
This button removes access rights. Select the individual access right, or the whole rights branch, to remove, then
select Remove.
You can also select this option via the right-click menu, from the appropriate entry in the tree view.

Remove IDS Block


If a user enters an IDS code incorrectly three times in a row at an M2150 arming/disarming reader, the reader is
blocked for IDS code entry for five minutes. The reader can be unblocked using this command.

538
Symmetry Software Reference Manual

Report Title
This is the unique name of the report.

Report Title
This option determines the number of existing reports listed when you select Find. If the option is blank, all reports
of the specified type are listed. If you want to narrow the search, type the report name in the box. You can find a
range of reports by using wildcards.

Representing
The name of the organization the visitor is representing.

Request Card File


A node has requested the server to send the node's card database.
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Daylight Savings


A node has requested the server to send the daylight-savings database.
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Dial-Up File


A node has requested the server to send the dial-up database.
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Doors File


A node has requested the server to send the door parameters database.
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Holiday File


A node has requested the server to send the holiday database ("Operation/Times/Holiday").
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request If/Then File


A node has requested the server to send the trigger commands database ("Operation/Commands/Trigger").
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Logical Functions


A node has requested the server to send details of the classification of each message (alarm, event or not
reported).
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

539
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Request Misc Files


A node has requested the server to send various miscellaneous files.
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Monitor Point File


A node has requested the server to send the monitor point database (installer's screen).
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Reader File


A node has requested the server to send the readers database.
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Scheduled Commands


A node has requested the server to send the scheduled commands database ("Operation/Commands/Scheduled").
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Request Time Code File


A node has requested the server to send the time codes database ("Operation/Times/Time Codes").
This message may be displayed when a node is first powered up or when the node has been powered down for a
long time. It is for information only, and no action is normally necessary.

Reset
This button reloads the currently-assigned access rights from the database. A warning prompt reminds you that
unsaved changes to the access rights will be lost.

Reset Alarm
This trigger command causes the alarm condition at the CCTV switcher unit to be reset.
This command is applicable only when using an external CCTV switcher unit that supports the alarm feature.
Available as: trigger command.

Reset Passback
For zonal (including zonal local) antipassback, this command causes the card to be put into the neutral zone. For
timed antipassback, it causes the delay period for reuse of the card to be zeroed.
Note:
 Sending a Set All Cards to Neutral command applies the command to all cards.
 Use the "Setup/Identity/Anti-Passback" screen if you want to disable (or re-enable) antipassback
checking at all nodes on a selected chain.
 If a person has multiple cards, as set up in the "Home/Identity/Card Holders" screen, this command
resets antipassback for all of the person's cards.
Reset Passback is not available if you have logged into the Symmetry software using a "visitor management"
username.
Click here for an introduction to antipassback.

540
Symmetry Software Reference Manual

Retry n
Indicates that following the initial attempt to connect to a remote site failed, a retry is currently being attempted. The
number and frequency of retries is set up by the installer. By default, there are three retries, with a one-minute
interval between them. "n" is the retry number currently trying to connect.

Return to Schedule
This command causes the status of the device to return to the status specified by its scheduled commands (if any).
For example, consider a reader that has the following scheduled command:
Unlock Door (start command) at 08:00
Lock Door (stop command) at 18:00
Sending a Return to Schedule command at any time between 08:00 and 18:00 will unlock the door if it has been
locked by another command (such as from the Command Center). Sending a Return to Schedule command at any
time after 18:00 will re-lock the door if it is unlocked.
Return to Schedule considers all scheduled commands set up for the selected device, even those that span
midnight.
Available as: manual, scheduled or trigger command.

Route Holiday/Advance/Retard Checks to


This option enables you to select the client PC at which to display the Holiday Check or Advance/Retard warning
dialog.
The Holiday Check dialog is automatically displayed when a user logs in at any time during the 7-day period prior to
any holiday date that has the Holiday Check 7 Days Prior option selected in the "Operation/Times/Holiday"
screen.
The Advance/Retard dialog is automatically displayed when a user logs in at any time during the 7-day period prior
to any advance/retard date shown in the "Maintenance/Time/System Time" screen, providing Advance and Retard
Check 7 Days Prior is selected in the "Maintenance/User & Preferences/System Preferences" screen.
The dialog enables the user to check that the date is correct before it occurs, and has the following buttons:
 OK - Prevents the message from being displayed again for the date (details of the user who selects
OK are saved in the History log).
 Cancel - Causes the message to be displayed again at the next login.

Run
Select this button when you are ready to produce the report.

Run
Select this button to produce the listing.

Run Command Line


You can use this command to execute a specified executable (.exe) or batch (.bat) file. The file must be in the
"Applications" folder located in the Symmetry software installation folder (default Security Management System).
Note: For a batch file, if no explicit path is defined for the output in the batch file (such as dir > output.txt), by default
the output file is saved to the Symmetry software installation folder.
Available as: scheduled or trigger command.

S600 Alarm LED


Series 6xx and later readers are fitted with an Alarm LED (light-emitting diode), which is marked by a bell symbol.
The LED can be switched on and off by a trigger command as follows:
 S600 Alarm LED On - Switches on the alarm LED until the S600 Alarm LED Off command is sent.
 S600 Alarm LED Off - Switches off the alarm LED

541
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

 S600 Alarm LED Pulse - Switches on the alarm LED for 10 seconds.
 S600 Alarm LED Flash - Flashes the alarm LED for 10 seconds.
Available as: trigger command.

S600 Reader Buzzer


Series 6xx and later readers are fitted with a buzzer, which can be switched on and off by a trigger command as
follows:
 S600 Reader Buzzer On - Switches on the buzzer until the S600 Reader Buzzer Off command is
sent (series 6xx readers and later only).
 S600 Reader Buzzer Off - Switches off the buzzer (series 6xx readers and later only).
 S600 Reader Buzzer Pulse - Switches on the buzzer for 10 seconds (series 6xx readers and later
only).
Available as: trigger command.

S600 Switch LED


The following commands affect the reader's card-command LED:
 S600 Switch LED On - Switches on the card-command LED.
 S600 Switch LED Off - Switches off the card-command LED.
 S600 Switch LED Pulse - Switches on a reader's card-command LED for 10 seconds.
 S600 Switch LED Flash - Flashes a reader's card-command LED for 10 seconds.
About Card Commands
Available as: trigger command.

SALTO Message
This message is generated by a SALTO locking system. Please refer to the SALTO documentation for details of the
meaning of this message.

Save Alarm Comments to Log


Selecting this option causes the comments inserted by a user when acknowledging an alarm to be saved in the log
file. Otherwise, the comments are 'thrown away' immediately the alarm is cleared.

Save User Screen Positions


Select this option if you want the system to record the screens that are currently open when users log out. The next
time a user logs in, the system automatically opens the same screens, and displays the screens in their original
locations.

Scan
Click this button to scan the visitor's business card. After clicking Scan, follow the prompts, which vary depending
on the scanning device you are using. Frame the picture in the Live Video screen that appears.
Any TWAIN-compatible scanning device is supported.

Scheduled Operation
A scheduled command was executed.

Script Alarm
Not used.

542
Symmetry Software Reference Manual

Script Error
There is an error in a command script sent to a video server.

Script Event
Not used.

Script Upload
A command script containing software has been received by a video server.

Search Required
The card holder is required to have a random search.

Secure Access
If you send this command, people are able to access the selected elevator floor (or all floors in the selected group)
only after a valid access-control transaction.
Available as: manual, scheduled or trigger command.

Select Region for Employees


Select the employee region. Those card holders who have the specified region in any of their three location codes
will be imported.

Note: If there is a new region or classification code in use, you can enter the code in a Include Contractors by
Location Code box.

Select Sector to use


Select the sector on the smart card to write to/read from. Under normal circumstances, you should use the default
(normally 15), unless the sector is used for another purpose.Special firmware may be required for smart card
readers if you choose a sector other than 15.
The DefaultSector setting in multimax.ini determines the default sector.
The option is not available when using DESFire encoding.

Selecting an Item
You can select an item by using one of the following methods:
 Double-clicking the mouse on the item.
 Clicking the mouse on the item and selecting OK or Open, depending on screen.
 Using the arrow keys and pressing Enter.

Selection List Rows Limit


This option determines the maximum number of items listed in:
 Various Selection screens, such as in the "Install/Access Control/Monitor Point" and "Install/Video &
Audio/Camera Views" screens.
 "Devices available" boxes when setting up groups using screens in the "Setup/Device Groups"
menu. For example, Selection List Rows Limit determines the maximum number of monitor
points listed under Available Monitor Points in the "Setup/Device Groups/Monitor Points" screen.
 The Hours box in the "Operation/Times/Time Codes" screen.
 The Time Codes box in the "Operation/Commands/Scheduled" and "Operation/Commands/Trigger"
screens.

543
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

 The available items and time code boxes in the Assign Access Rights screen (e.g. displayed when
you are assigning access rights in the "Home/Identity/Card Holders" screen).
A message is displayed in the appropriate screen when the number of entries exceeds the limit imposed by
Selection List Rows Limit.
The default value is 500. The minimum value is 10.

Send Command
Sends the command set up for the intercom, as specified in the "Install/Video & Audio/Intercom/Stations" screen.
Typically, the command is used to open a door or barrier for the caller.

Serial Message Names


The names of these messages are defined in the "Install/System/Serial Devices/Messages" screen.
Available as: Manual, scheduled and trigger command.
Introduction to Serial Messages and Devices

Serial Port Command


A command has been received at the serial port of a video server.

Server Offline
A digital video server is offline. The message is displayed when the Offline Monitoring Interval specified in the
Reporting tab of the device definition screen has expired.

Server Online
A digital video server is now online.

Server Restarted
A digital video server has been restarted.

Set All Cards to a Specific APB Zone


Sets all cards that are in a specified antipassback zone to another zone. This command is applicable to zonal
antipassback only.
Click here for an introduction to antipassback.
Available as: scheduled command.

Set all Cards to Neutral


Readers can be installed as antipassback readers to prevent people from 'passing back' their card to a second
person to gain entry or exit.
For zonal antipassback, Set all Cards to Neutral causes all cards belonging to all companies (irrespective of your
company group) to be put into the neutral zone. For timed antipassback, it causes the delay period for reuse of
every card to be zeroed.

Note: You can use Reset Passback in the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen to
perform the same action for a single person.

Click here for an introduction to antipassback.


Available as: manual or scheduled command.

544
Symmetry Software Reference Manual

Set for Batch Printing


Choose this option if you do not yet wish to print the badge. It serves as a reminder that the badge has not yet been
printed. You can print all badges flagged in this way in one operation by using the "Home/Identity/Print Badges"
screen.

Note: If the person has more than one card defined in the "Home/Identity/Card Holders" screen (not applicable
to Central Card Handler clients), a badge printed in the "Home/Identity/Print Badges" screen will use the card
number of the first card.

An alternative method of deselecting this option is by using the Reset button in the "Home/Identity/Print Badges"
screen.

Note: If you intend to print badges using the "Home/Identity/Print Badges" screen and people use different
badge designs and encoding formats, it's a good idea first to specify the each person's badge design and
encoding format (using the Badge button) before using the "Home/Identity/Print Badges" screen.

Show Alarm Handling


This is relevant if two or more clients receive the same alarm. If selected and the default Alarms screen appearance
is used, a padlock icon is displayed next to the alarm if it is currently open on another client. If selected and the
combined Alarms screen appearance is used, the icon is displayed if the alarm is currently selected on another
client.

Show All
This button displays or hides all unassigned advanced access rights in the tree view.
For example, if the advanced access right titles Advanced 2 to Advanced 16 do not have access rights defined,
they are not normally shown. Selecting Show All reveals these sections in the tree view.
You can also select this option via the right-click menu from any entry in the tree view.

Show Background Image


Determines how the image selected by Find Image (and displayed in Background Image File Name) is displayed
in the main area of the window. Select:
 None - If you do not want a background image to be displayed.
 Center - If you want the image to be centered in the window, without any enlargement or reduction.
 Tile - If you want the image to be repeated to fill the full area of the window. This is useful only if the
image is smaller than the window area.
 Stretch - If you want the image to be enlarged or reduced so that the image occupies the whole of
the window area.

Note: The image is not displayed if Enable Alarm Banner is selected and there is an unacknowledged alarm.
Note: If the background shows an image selected with Find Image, and you want to revert to the default (card)
image, select None, click OK, re-enter the "Maintenance/User & Preferences/Client Preferences" screen and
choose Center, Time or Stretch.

Show Card Number with Alarm/Event


Selecting this option causes the relevant card number to be automatically displayed with alarm/event messages in
the "Home/Monitoring/Alarms" and "Home/Video & Audio/Intercom Control" screen.

545
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Show Door Status on Graphics


Selecting this option causes the door icon on graphics to change to reflect the open/closed status of the door. The
option affects all existing and new door icons on graphics.
When deselecting this option, you are prompted choose whether to disable reporting of door status messages
(Door Open and Door Closed) at the node level. Click:
 Yes - If you want the node to ignore these messages, so that they are not recorded as alarms or
events. (The messages are set to Disabled in the "Install/Access Control/Reader" and
"Install/System/Default Settings/Reader" screens.)
 No - If you want the node to continue to report the messages. Selecting No increases system
activity, and therefore select it only if you want to produce reports or alarms of when doors are
opened and closed.
 Cancel - If you want to cancel the change.
Note for installers: Selecting the option sets Door Open and Door Closed to "alarm" for all readers defined in the
"Install/Access Control/Reader" screen. It also changes the default settings in the "Install/System/Default
Settings/Reader" screen. However, alarm reporting is not affected, and therefore by default Door Open and Door
Closed alarms will not occur. The option is not applicable to doors controlled by Micronodes.

Show with Alarm/Event


The selected information is added to the end of alarm/event messages in parentheses. For example, if you select
Card Number, the alarm/event message "Granted Access [1234]" is generated if card 1234 is granted access.

Signaling Duress
Standard Access-Control Readers
For a standard non-fingerprint access-control reader, duress is signaled by preceding the PIN by a 0 and not
entering the last digit.
S81x Fingerprint Access-Control Readers
If S81x fingerprint readers are being used, a "duress" finger can be specified during the fingerprint enrollment
procedure.
When a reader is in single-fingerprint mode, use of the non-duress fingerprint during an access-control
transaction allows normal access, but use of the duress fingerprint causes the "duress" alarm/event to be
generated, indicating that the person is being forced to gain access under duress (although access is still
granted).
When a reader is in two-fingerprint mode, the duress transaction occurs only if the duress finger is used before
the non-duress fingerprint.
A duress alarm/event is generated only if the reader being used is set up for duress mode, as defined in the
Reader Definition.
Intrusion Readers
To signal duress at a reader while arming or disarming an M2150 intrusion system, the person either precedes
the PIN with a 0 and does not enter the last digit, or adds a predefined offset to the PIN, depending on the
setting of Symmetry Intrusion Duress Mode in the "Maintenance/User & Preferences/System Preferences"
screen. The help for this setting provides examples.

Sign In
Click this button when the visitor has arrived and signed in. The visitor status changes to Active.
This button is not available if you have logged in as a visitor manager (that is, your user role is "Visitor
Management") and Disable Visitor Login Sign In/Out is set in the "Maintenance/User & Preferences/System
Preferences" screen.
The button is not available if Stop is selected.

546
Symmetry Software Reference Manual

Sign Out
Click this button when the visitor has left and signed out.
This button is not available if you have logged in as a visitor manager (that is, your user role is "Visitor
Management") and Disable Visitor Login Sign In/Out is set in the "Maintenance/User & Preferences/System
Preferences" screen.

Single Fingerprint Mode


Causes an S81x fingerprint reader to request a single fingerprint. If two fingerprints are enrolled on a card, but an
s81x fingerprint reader is in single-fingerprint mode, either of the two fingerprints can be used to gain access.
Available as: manual, scheduled or trigger command.

Site number
This is the site number "key" required to read/write DESFire cards. The value is read only and has been
automatically read from the DESFire sentinel.

Encode
This button saves any changes you have made (the same as Save in the Definition screen) and displays the
Encode screen, which allows you to encode a smart card.
The button is available only when the Card Encoding Module license is enabled.
You may not have access to this button, depending on your user permissions, as set up in the "Maintenance/User &
Preferences/Roles" screen.
The installer must use the "Install/System/Client Ports" screen to define the type of encoder and how it connects to
the client.
Note:
If Prevent Duplicate Credential Encoding is set in the "Maintenance/User & Preferences/System
Preferences" screen, the same card credentials cannot be encoded onto more than one card. For further
details, please refer to the help for Prevent Duplicate Credential Encoding in the System Preference screen.

SNTP Clock Adjusted


The time at an Edge Network Video Server has been updated from a Simple Network Time Protocol (SNTP) server.

Source
Select the source of the log information from this pull-down list.
Select On Line Database to use the log stored in the current Symmetry database, or User Defined to use
the log from an archive created using the "Operation/Data/Archive" screen.
If you choose User Defined, use the Browse button to select the archive, which must be on a network
drive. The whole archive is restored to the SQL backup folder on the hard disk, so disk space must be
available for this to be carried out.

Standard PIN Code Length


This setting defines the length of card PIN codes. For example, as specified in the "Home/Identity/Card Holders"
screen.
If you increase the length of the PIN code, leading zeroes are automatically added to any existing PIN codes.
If you decrease the length of the PIN code, the appropriate number of digits are automatically removed from the
beginning of any existing PIN codes (for example, 123456 becomes 3456).

547
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Note: PIN codes of more than 4 digits may not be available for certain node types - please refer to your local
technical support representative. PIN codes of more than 4 digits are supported only by Wiegand (with an
integrated keypad) or serial current-loop readers.
If the length of the PIN code is more than 4 digits and M2100 or M2150 nodes are being used, set the
ForceCaFor21002150DBU to 1 in the ini file at the Symmetry server to enable cards to be downloaded to these
nodes. Restart the Symmetry Support Service and the Symmetry Client Service at all clients hosting
communications to the nodes.

Start Recording
Starts to record the video images from the selected IP camera(s).
Note that since this command does not produce a tagged recording, the recording may be overwritten at a later
date and therefore may not be available for video playback.
Available as: manual, scheduled or trigger command.

Note: There may be small delay of a few seconds between the time the command is issued and the time the
recording actually starts. This is avoided if the camera is already recording at the time the command is issued (for
example, using the ENVS pre-event buffer).

Start/End Date
Refer to the help for Immediate All Changes.

Startup Transaction
The node has been warm or cold started.

Station Busy
The intercom is engaged.

Station Cleared
The intercom fault has been cleared.

Station Fault
The intercom has gone offline or has a fault.

Station Free
Generated when a call is started from an intercom, and when an intercom connection has been terminated.
In the Alarms screen, "Where" may indicate the intercom that started the call, or the intercom that finished the call.

Connect Request
Generated when an attempt to connect to an intercom has been made. For example, a user of the "Home/Video &
Audio/Intercom Control" screen may be answering a call request, or two different intercoms elsewhere in the
building may be starting a call.
In the Alarms screen, "Where" indicates the intercom that received the call, and "Who" indicates the intercom that
started the call.

Stop
Indicates that the card holder must be stopped from entering the building. The status results from selecting the
Stop option.

548
Symmetry Software Reference Manual

Stop
This option changes the status of the card to "Stop" and automatically selects Force Cardholder Inactive.
Although this option has a similar effect to Force Cardholder Inactive, you can use it to distinguish those card
holders who must be stopped from entering the building, rather than those who are no longer active. The Select by
Status option in the Selection screen allows you to list those card holders who have a stopped status.
In the "Home/Identity/Visitors" screen, selecting Stop disables the Sign In button.
The card holder cannot be made active by any means if he or she has a stopped status.
You can disable the option by configuring the appropriate roles in the "Maintenance/User & Preferences/Roles"
screen.

Stop Recording
Stops recording the video images from the selected IP camera(s).
Available as: manual, scheduled or trigger command.

Stopped
To list cards that must be stopped from entering the building. This status is the result of selecting the Stop option in
the card or visitor details.

Storage Media Check Failed


A check of the hard disk in an Edge Network Video Server has failed.

Storage Media Check OK with Errors


A check of the hard disk in an Edge Network Video Server has completed successfully. Errors on the disk have
been corrected successfully.

Storage Media Corrupted


An error has been found in the filing system of a hard disk in an Edge Network Video Server.

Storage Media Hardware Failure


Not used.

Storage Media Hardware Lifetime Warning


Not used.

Storage Media Not Present


The Edge Network Video Server does not contain a hard disk.

Storage Media Quota Reached


The hard disk of an Edge Network Video Server is full.

Strong Password
Selecting this option forces new passwords to be case sensitive, contain at least one numeric character, one
uppercase character, one lowercase character and one punctuation mark. In addition, a password will not be able
to contain any full word of the user's username.

Successful Clock At Point


The guard clocked at the correct patrol point within the time allowed.

549
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Switch Live Video


Switches live video from the selected IP or DVR camera to a cell in the "Home/Video & Audio/Virtual Matrix" screen.
This command also operates for a camera group.
Available as: manual, scheduled or trigger command.
Command options:
 To - Select the Symmetry client PC. The live video is displayed only at the selected Symmetry client
PC.
 Cell - Select the Virtual Matrix cell in which to display the live video. If the cell number is not
displayed in the "Home/Video & Audio/Virtual Matrix" screen when the command is executed, the
operator is prompted whether to display the video in an alternative cell.
Selecting Next Available Cell causes the video to be displayed in an unoccupied cell. If there is no
unoccupied cell when the command is executed, the operator is prompted whether to display the video in
an alternative cell.
 Remove After - This is displayed only when setting up a trigger command. Specify the number of
seconds you want the video to be displayed in the cell. The video is not removed if the cell is
selected at the time of removal.
 View - For 360-degree cameras that support dewarping, you can choose one of the dewarped
camera views, if it has any. The camera will switch to display the view you select.
 PTZ Preset - You can choose one of the camera's PTZ presets set up for the camera, if it has any.
The camera will switch to display the PTZ preset you select. For 360-degree cameras, the camera
view you select may affect the available presets, since each view can have different presets (as
configured in the camera definition screen in Symmetry).

Switch Matrix View


Displays the selected view in the "Home/Video & Audio/Virtual Matrix" screen of the selected client.
Available as: manual, scheduled or trigger command.

Symmetry Intrusion Duress Mode


This setting is available if your system includes an intrusion system license. The setting specifies the duress mode
for M2150 intrusion system readers that have Duress Mode enabled in the Modes tab of the "Install/Access
Control/Readers" screen.
If Symmetry Intrusion Duress Mode is set to Standard, users can signal that they are arming or disarming the
system under duress by preceding their PIN with a zero and not entering the final digit. For example, if the user's
PIN is 1234, they can generate a "Duress" alarm by entering 0123.
You can choose a different duress signaling method by setting Symmetry Intrusion Duress Mode to Offset, and
selecting an offset value. In this case, users signal duress by adding the selected offset to their PIN. For example, if
the user's PIN is 1234 and the offset is, for example -5, they can generate a "Duress" alarm by entering 1229. If the
PIN is 1234 and the offset is +5, they can generate a "Duress" alarm by entering 1239.

Note: To enable duress signalling, display the Modes tab of the "Install/Access Control/Readers" screen,
enable Duress Mode and set IDS Code Mode to IDS Code + PIN.

System Alarm
A Digital Video Recorder has generated a "System Alarm", possibly generated by other third-party equipment.

Temporary
To list only card holders who have a temporary card.

Task <name>
Indicates that a task defined in the "Home/Monitoring/Tasks" screen has been set up or is overdue.

550
Symmetry Software Reference Manual

Threat
This button is available only if the Threat Level Manager license is installed and you have selected either Normal
Rights or an individual advanced access right.
Clicking the button displays a dialog that allows you to specify the threat levels at which the selected access rights
are activated and deactivated.

Threat
This button is available only if the Threat Level Manager license is installed and you have selected Assigned
AccessRights.
Clicking the button displays a dialog that allows you to specify the threat levels at which the selected access rights
are activated and deactivated.

Time Code
All new card holders being imported will be given the selected time code, except those whose ACCESSSTATUS is
set to "D" (Denied).
This setting does not affect existing card-holder records that are being updated via data import.

Time Line Key


Key:
 Blue areas - Standard recordings.
 Red areas - Tagged recordings created by a bookmark, or a Record Video command that was
actioned by an alarm condition.
 Yellow areas - User recordings.
 Purple areas - Bookmarked recordings.
 Green areas - Tagged recordings created by a Record Video command that was actioned by an
event condition.
 Combinations of the above colors - Overlapping types of recording.
 Red circular indicator (above the time line) - Shows alarms that actioned a Record Video command.
Hovering the mouse pointer over the indicator provides details of the alarm.
 Shaded areas - Times associated with a tagged or user recording that are not available.
 Cross-hatched areas - Recordings that have been purged.
 Gaps - Periods when no recording was carried out.

Timed All Changes


Select this option if you want to import all new card holders in the Lucent\Avaya database and changes to existing
card holders every day at the specified time.

Today's Visitors
The purpose of this option is to list all visitors who are expected now, and all other visitors who are or were on site
today. The system lists:
 All visitors who should be on site, as determined from their arrival/departure times.
 All visitors who are currently signed in.
 All visitors who signed out any time today.

Toggle Mode Activate and Deactivate


These commands are available if the reader's node supports advanced toggle mode, as configured in the
"Install/Access Control/Node" screen.

551
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

About toggle mode


Available as: manual, scheduled or trigger command.

Too Many Login Failures


Symmetry has re-established communications with a node, but there have been three or more unauthorized login
attempts to the node while communications were disconnected.
Node login passwords are specified in the "Install/Access Control/Chains/LAN" or "Install/Access
Control/Chains/Node" screen.
This message can be generated only for nodes with specific firmware - please contact your technical support
representative for details.

Transaction Log Running at Capacity


This message is displayed only for systems using the Microsoft SQL Server 2008 R2 Express. The message
indicates that size of the transaction database has reached 8GB, which is 80% of the maximum capacity of a
database (10GB). The oldest data in the database is deleted automatically to keep the database size less than
8GB.
Set Purge Daily Logs After in the "Maintenance/User & Preferences/System Preferences" screen to a shorter
period, and archive the database more frequently.

Trigger Operation
A trigger command was executed.

Two Fingerprints Mode


Causes an S81x fingerprint reader to request two fingerprints.
Available as: manual, scheduled or trigger command.

Uncategorized
Select this if you want the report to include other miscellaneous alarms/events, such as those generated by:
 The Symmetry system itself.
 Third-party systems that have imported transactions into the import database (see the Data Connect
Manual).
 SALTO communications offline messages.
This information is not normally associated with any particular company.

Uncategorized Intrusion
Select this option to include other intrusion alarms/events.

Unique Employee Reference


When this option is selected, the Employee Ref in the "Home/Identity/Card Holders" screen must not be blank and
must not be the same as the Employee Ref of any other person. Whenever you save or import card details, the
system will check that these conditions are met.
This option can be selected only if:
a) There are no card holders defined, or
b) All card holders have an employee reference, and each employee reference is unique.

Unknown Card
The card is of the correct type and is formatted correctly, but has not been allocated to a person in the
"Home/Identity/Card Holders" or "Home/Identity/Visitors" screen. The person was not granted access.
Click here for additional information about using this message in trigger commands.

552
Symmetry Software Reference Manual

Unknown Fingerprint
Indicates that the fingerprint presented to a fingerprint reader was not recognized. The person was not granted
access.

Unlock Door
Causes the reader to unlock the door until it receives a Lock Door command. The door is unlocked, even if the
reader is in keycard-out state. For a reader that is used in an elevator, Unlock Door causes all floors to be
selectable (and there is no need for people to present their cards).
Available as: manual, scheduled or trigger command.

Usage Remaining
Specifies the number of times the card can be used. Each time the card is used, the value reduces by one until
Limit Reached is displayed. When the limit has been reached, the status of the card changes to Inactive.
Set to No Limit if you do not want to set a limit on the number of times the card can be used.
Depending on the setting of Node Supports Card Usage Remaining in the "Install/Access Control/Node" screen,
tracking of card usage is carried out either by the node's controlling client alone, or by the controlling client and
node. The latter method is the most secure.

Use Access Control PIN as IDS Code


This setting is available if an intrusion license is installed, and is relevant only for M2150 intrusion systems.
Select this setting if you want the default IDS code in the "Home/Identity/Card Holders" screen to be the same as
the card holder's PIN when you click in the IDS Code field. This causes an IDS Code to be assigned automatically
to the card holder.
If IDS Code Length is greater than PIN Code Length, leading zeroes are added to the IDS code. The IDS code
cannot contain fewer digits than Standard PIN Code Length.
Setting this option also causes cards that are imported using the Data Connect module to be assigned an IDS code
that is the same as the PIN code. Leading zeroes are added if the IDS code requires more digits than the PIN code.

User Access Denied


An Edge Network Video Server has refused access to a user who is attempting to log in from a Web browser (such
as Internet Explorer).

User Access Granted


An Edge Network Video Server has allowed access to a user who has logged in from a Web browser (such as
Internet Explorer).

User Added
A new video server user has been added by a person who is configuring the video server from a Web browser.

User Alarm
A user-defined alarm set up at a Digital Video Recorder has occurred.

User Alarm Activated


A user alarm set up at a NICE Digital Video Recorder has been activated.

User Alarm Deactivated


A user alarm set up at a NICE Digital Video Recorder has been deactivated.

553
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

User Code Lockout


This message occurs if somebody has entered, in succession, five incorrect card and/or PIN numbers into a reader
that is in user-code mode. User-code mode will be disabled for five minutes.
Click here for additional information about using this message in trigger commands.

User Code Only


In this mode, which is suitable only for Series-6xx and later readers, a person can gain access by pressing the #
key, entering the card number and pressing the * key (or at Javelin readers the "X" key, card number and then the
checkmark/tick key). This mode works in parallel with the ability to gain access by presenting a card. Note: User
code mode is not applicable for M2150 arming/disarming intrusion readers.
Sending the User Code + PIN and User Code Only commands has no effect on Card Only mode or Card + PIN
mode. For example, a reader can be set for both User Code Only and Card + PIN. In this case, when the card
owner presents the card, a PIN has to be entered, but if user-code mode is on, he/she can enter the card number
without a PIN.
Available as: manual, scheduled or trigger command.

User Code + PIN


This is the same as above, but the person must enter his/her PIN after the * (or checkmark/tick) key.
Sending the User Code + PIN and User Code Only commands has no effect on Card Only mode or Card + PIN
mode. For example, a reader can be set for both User Code Only and Card + PIN. In this case, when the card
owner presents the card, a PIN has to be entered, but if user-code mode is on, he/she can enter the card number
without a PIN.
Available as: manual, scheduled or trigger command.

User Code Disable


Causes the reader no longer to operate in User Code + PIN or User Code Only mode.
Sending the User Code + PIN and User Code Only commands has no effect on Card Only mode or Card + PIN
mode. For example, a reader can be set for both User Code Only and Card + PIN. In this case, when the card
owner presents the card, a PIN has to be entered, but if user-code mode is on, he/she can enter the card number
without a PIN.
Available as: manual, scheduled or trigger command.

User Comments
Select this if you want a report sent to a printer or file that includes alarms to include additional information, such as
when the alarm was acknowledged, cleared and reset, and the comments added in the Acknowledge Alarm screen.
If the report is displayed on the screen, only the first comment can be viewed, but this is always included in a report
that includes alarms, irrespective of whether or not User Comments is selected.

Note: Comments are included in an activity report only for those alarms that have been cleared.

User Deleted
A video server user has been deleted by a person who is configuring the video server from a Web browser.

User Edited
The details of a video server user have been edited by a person who is configuring the video server from a Web
browser.

User Initiated Door Command


Select this if you want the report to include changes to door times, as actioned by card holders from keypad readers
(Series 6xx or later).

554
Symmetry Software Reference Manual

It is possible for a card holder to change his/her PIN from a reader only if the Command Card Holder option is set
in the "Home/Identity/Card Holders" screen, and the reader has the User Initiated Door Time option set in the
"Install/Access Control/Reader" screen.
For further information, see About Card Commands.

User PIN
If User PIN Active has been selected, specify the PIN.

User PIN Active


Select this option if the card uses a Personal Identification Number (PIN) that has to be specified to allow the data
to be read or written. This is often used for a Common Access Card (CAC).
This is available only if you have selected DES Fire Encoding.

User PIN Changed


The specified card holder has changed his/her pin from a reader that has a keypad.
The card holder has the Command Card Holder option set in the "Home/Identity/Card Holders" screen, and the
reader has the User Initiated PIN option set in the "Install/Access Control/Reader" screen.
See About Card Commands.

Username
Enter a unique login username. Case is not important.

Vacation
Indicates that the current time is within a vacation period, as specified in the Vacation tab of the
"Home/Identity/Card Holders" screen. The card holder will not be able to gain access.

Vacation
To list only card holders who are currently on vacation, as specified in the Vacation tab of the "Home/Identity/Card
Holders" screen.

Valid Card Transaction


This message represents a valid access-control transaction at a reader specified in a trigger command, where the
IF part of the trigger command is set to Valid Card Transaction.
Selecting Valid Card Transaction in the IF part of a trigger command will cause the THEN action to take place
when the specified card makes a valid access-control transaction at the specified reader.
If the card has the Conditional Card option set in the "Home/Identity/Card Holders" screen, the card does not open
the door; the card can be used only to activate trigger commands or as part of a patrol tour transaction. If the card
does not have the Conditional Card option set, the door will be opened, access rights permitting.
After selecting Valid Card Transaction in a trigger command, select the card using the Select a Card button, and
if required, select the Any Reader option if you do not require the message to come from a specific reader.

VCA
A digital video camera has generated a Video Content Analysis (VCA) alarm, as configured at the camera. For
example, an object may have been detected in the image.

Vehicle
The registration/license number of the visitor's vehicle.

555
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Verbose Bulk Card Amendment Logging


Select this option if you want to record additional information when making changes in the "Home/Identity/Bulk Card
Amendments" dialog. The extra log information is displayed in User Audit reports ("Reports/History/User Audit").

Verify
Select this option to verify that the enrolled fingerprint(s) can be matched with live fingerprint(s) with the specified
acceptance threshold. Follow the prompts.
The Force Fingerprint Verification setting in the "Maintenance/User & Preferences/Client Preferences" screen
determines the number of verification passes (default is three).
If any of the verification passes is not successful, the acceptance threshold is automatically lowered and you are
prompted to try again. Click Retry if you want to continue with the current attempt using the new acceptance
threshold, or Verify to repeat the whole verification procedure again, using the original setting.
You will see the message "The lowest acceptance threshold has been reached" if the system has attempted to
reduce the acceptance threshold below that specified in your user privileges, as set in the "Maintenance/User &
Preferences/Accounts" screen.

Video Connected/Reconnected
The video signal to a camera attached to a Digital Video Recorder has been established.

Video Instant Replay


Automatically displays a window showing a replay of video recorded by a selected IP or DVR camera.
Available as: manual and trigger command.
Command options:
 Select Client to display the video (To) - Select the Symmetry client PC at which to display the
recorded video.
 Pre Event Time (Pre-Period) - This determines length of time before the event that the replay will
start. For example, if you specify one minute, the replay will start one minute before the event.
For an IP camera, pre-event video is available only if recorded by a previous command.
DVRs should normally be set up to record continuously, and therefore pre-event video is normally
available for a DVR.

Video Loss Detected


The video signal to a camera attached to a Digital Video Recorder has been lost. This may have been caused by an
object being placed in front of the camera lens.

Video Lost or Video Disconnected


The video signal to a camera attached to a Digital Video Recorder has been lost.

Video Purged Early, Check NVR Config


There was insufficient empty space left in a Symmetry NVR video repository to store a new recording, and therefore
an older recording was purged to make space. The NVR deletes standard recordings that are less than the
minimum age (as set in the NVR web interface) in preference to tagged recordings that are less than the minimum
age. Video less than one day old is never deleted.

Video Server Restarted - Unexpected Error


The video server was restarted after a system error, rather than after a manual restart or firmware upgrade.

Video Signal Loss


There is no video signal from a camera connected to a camera port of a video server.

556
Symmetry Software Reference Manual

Video Signal Restored/OK


The video signal is normal.

View
A "view" defines the camera images to display in the "Home/Video & Audio/Virtual Matrix" screen, and the positions
of those images on the screen. Views are created by selecting the Save button in the "Home/Video & Audio/Virtual
Matrix" screen.

View
Click this button to view an enlarged image of the business card.

Visiting
Select or enter the name of the person the visitor is visiting. You can choose the name of any card holder defined in
the "Home/Identity/Card Holders" screen or enter a name directly into the field (the name need not exist).
The menu has an automatic filtering feature to prevent it from containing a large number of names. If you enter a
surname or part of a surname with wildcards, the menu will contain only those surnames that match the text. For
example, entering M* causes the menu to display only surnames starting with an "M". Once you have selected a
name from the menu, the menu contains only that name. You can reset the menu by selecting (None).
If you have logged into the Symmetry software for "visitor management", the Visiting field is grayed out and
displays the name of the card holder currently logged in.

Visitor Active
To list visitors who are currently signed in.

Visitor Card Holder Deactivated


The visitor card has been automatically set to inactive in the "Home/Identity/Visitors" screen.
Deactivation was caused by the visitor being granted access at a reader that has Deactivate Visitor Cards
selected in the "Install/Access Control/Reader" screen. This feature is typically used at readers that allow visitors to
exit the site.

Visitor Card Name


Select this option if you want to choose the visitors to list according to their name.
If you want to be selective about the visitors to list, type the last name and/or first name in the box. For example, if
you want to find all visitors who have a last name of Clarke, type Clarke in the Visitor Last Name box.
You can use wildcards if required.

Visitor Card Number


Select this option to list existing visitors by card number.
If you want to be selective about the visitors to list, type the card number in the box.
You can use wildcards if required.

Visitor Cards
Set this option if you want to find visitors, rather than standard card holders.

Visitor Closed
To list visitors who are not signed in and whose departure date and time is in the past. This indicates that an
additional visit is not planned.

557
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Visitor Data Title


Select a particular Visitor Data Title and leave the Visitor Data box blank before selecting Find to list all visitors
who have information specified for that data title. By typing specific personal information in the Visitor Data box,
you can be even more selective about the visitors to include. You can use wildcards if required.

Visitor Data Title


This specifies the method that is to be used to determine the card holders to include in the report. Choosing a title
but leaving the Visitor Data box blank enables all visitors who have information defined for that title (in the
"Home/Identity/Visitors" screen) to be included. By entering specific information in the Visitor Data box, perhaps
using wildcards, you can be selective about the visitors to include.

Visitor Escort
Select this option if the card holder is allowed to escort visitors (as set up in the "Home/Identity/Visitors" screen).
The Visitors tab is displayed when you select this option (the card holder must have a card number). You can use
the tab to specify the visitors that the card holder has been nominated to escort. The tab also lists the visitors who
have not yet been assigned an escort.

Visitor Escort
Select the person who has been nominated to escort the visitor. Only those card holders who have been nominated
for this role (as selected by the Visitor Escort option in the "Home/Identity/Card Holders" screen) and who have an
"active" card status can be selected.
The menu has an automatic filtering feature to prevent it from containing a large number of names. If you enter a
surname or part of a surname with wildcards, the menu will contain only those surnames that match the text. For
example, entering M* causes the menu to display only surnames starting with an "M". Once you have selected a
name from the menu, the menu contains only that name. You can reset the menu by selecting (None).
Clicking the following button displays the Find Visitor Escort screen, which provides additional filtering options for
selecting the visitor escort:

Visitor Escort is automatically set to the same name as selected in Visiting if the card holder selected is a
nominated visitor escort.
If Visitor Escort is Mandatory is selected in the "Maintenance/User & Preferences/System Preferences" screen,
selection of a visitor escort is mandatory (except when the card has an "Inactive" status).
If the Auto Unassign Expired Visitor Cards setting is selected in the "Maintenance/User & Preferences/System
Preferences" screen, the escort is automatically removed when the visitor's card expires.

Visitor Escort is Mandatory


Specifies whether selection of an escort is mandatory for a visitor defined in the "Home/Identity/Visitors" screen.
Inactive visitor cards can exist without a specified escort.

Visitor Last Name


Select this option if you want to find existing visitors by name.
If you want to be selective about the visitors to list, type the last name in the box. For example, if you want to find all
visitors who have a last name of Smith, choose Visitor Last Name and type Smith in the box before selecting Find.
You can use wildcards if required.

Visitor Management Login is Default


This option determines the default state of Allow Visitor Management Login for this Cardholder in the
"Home/Identity/Card Holders" screen. Selecting this option causes the option in the "Home/Identity/Card Holders"
screen to be automatically set for each new card holder.

558
Symmetry Software Reference Manual

Visitor Maximum No of Days


When selected, this allows you to specify the maximum number of days that a visitor's card remains valid from the
active date. This setting affects the inactive date of new cards.
By default, the option is selected, and Maximum no. of Days is set to 1. If you change this setting, it affects only
new cards and existing cards that are later modified.

Visitor Pending
To list visitors who are not signed in and whose departure date and time are in the future. This indicates that the
visitor may return.

Visitor Representing
Select this option if you want to list visitors who are representing a chosen organization. Type the organization
name in the Visitor Representing box. If you leave the box blank, all visitors will be listed.
You can use wildcards if required.
The organization a visitor is representing is specified in the "Home/Identity/Visitors" screen.

Visitor Selection By Today


Selecting this option causes Arriving and Departing in the "Home/Identity/Visitors" Selection screen to default to
today (except when the Visitor Card Number filter is selected, since it is more likely that you are attempting to find
a previous visitor if you select this filter).

Visitor Visiting
Select this option if you want to list visitors who are visiting a chosen person.
Use the Visiting pull-down list to select the name of the person the visitor is visiting.
Choose None if you want to list all visitors who do not have the name of the person they are visiting defined in the
"Home/Identity/Visitors" screen. (Other filters on the screen may prevent some visitors from being listed.)

Warning Overwriting Standard Recordings


Standard recordings on the video server are being overwritten to make space for new recordings.

Warning Overwriting Tagged Recordings


Tagged recordings on the video server are being overwritten to make space for new recordings.

Warning: Simulated Transactions Active


Enable Simulated Transactions has been selected in the "Maintenance/User & Preferences/Client Preferences"
screen.

Wrong Hand Template


The hand presented at the Hand Geometry Unit (HGU) reader is not known to the system. The person was not
granted access.
Overview of Biometric Templates and HGUs

Wrong Issue Number


The card presented at the reader is known to the system, but it contains an old issue number (as set up by using
the "Home/Identity/Card Holders" or "Home/Identity/Visitors" screen). The person was not granted access.

559
Workflow Designer Priority Screen ("Setup/Workflow/Workflow Designer")

Wrong PIN
The card is known to the system, but the person entered the wrong PIN (as set up by using the "Home/Identity/Card
Holders" or "Home/Identity/Visitors" screen). The person was not granted access.
Click here for additional information about using this message in trigger commands.

Zone Bypassed
An intrusion zone has been bypassed. Bypassed zones do not report alarms.
For M2150 intrusion systems, a bypassed zone returns to its normal (non-bypassed) state when the zone's area is
disarmed.

Zone Circuit Open


The cable to the sensor of an M2150 intrusion zone has an open-circuit tamper condition.
This alarm/event is generated only for zones that have three-state, four-state or six-state supervision (as set up by
the installer). The message can be generated even if the zone is disabled (for example, by a command).

Zone Circuit Shorted


The cable to the sensor of an M2150 intrusion zone has a short-circuit tamper condition.
This alarm/event is generated only for zones that have three-state, four-state or six-state supervision (as set up by
the installer). The message can be generated even if the zone is disabled (for example, by a command).

Zone Disabled
Disabled zones apply to Siemens (Vanderbilt), M2150, DSC and ThorGuard intrusion systems. An intrusion zone
that is disabled cannot report intrusion alarms.

Zone Enabled
An intrusion zone is enabled if it is not bypassed or disabled.
A Zone Enabled alarm/event occurs when a disabled state is removed.

Zone Forced Armed


A force-armed zone is one that is armed automatically by the intrusion system (not applicable to Bosch B9512G
systems). This can occur if the zone is in a triggered condition while the area is being armed. In this case, the area
may be armed automatically after a specified period of time, or when the zone returns to its normal state, depending
on type of intrusion system.

Zone Group Armed with Security Reduced


This is applicable only to ThorGuard and CU30 systems. A zone group that has security reduced may be the result
of only partially arming the zone group.

Zone in Alarm
An intrusion zone is in an alarm state.

Zone in Fault
An intrusion zone is in an fault or tamper condition.

Zone In Tamper
This is applicable for Siemens (Vanderbilt), M2150, DSC, CU30 and ThorGuard intrusion systems and indicates
zone tamper condition.
For CU30 and ThorGuard systems, a zone tamper is temporary and changes to a zone alarm.

560
Symmetry Software Reference Manual

For M2150 systems, this alarm/event is generated only for zones that have six-state supervision (as set up by the
installer). The message indicates that the tamper switch in the sensor has been activated, and can be generated
even if the monitor point is disabled (for example, by a command).

Zone Normal
The intrusion zone has returned to its normal state.

Zone Point Closed


This alarm/event message occurs when an M2150 intrusion zone with normally-open alarm contacts is triggered.
Note: If this message is set to Disabled in the "Install/Access Control/Monitor Point" screen, an alarm message is
generated when the zone is in an armed state, but not while it is disarmed. Setting the message to Alarm or Event
causes an alarm or event message whenever the contacts are triggered.

Zone Point Open


This alarm/event message occurs when an M2150 intrusion zone with normally-closed alarm contacts is triggered.
Note: If this message is set to Disabled in the "Install/Access Control/Monitor Point" screen, an alarm message is
generated when the zone is in an armed state, but not while it is disarmed. Setting the message to Alarm or Event
causes an alarm or event message whenever the contacts are triggered.

Zone Reset
An intrusion zone was reset from an alarm or fault condition.

Zone Tamper Normal


The tamper switch of the M2150 intrusion zone has been reset. This alarm/event is generated only for zones that
have six-state supervision (as set up by the installer).

561
Index

1 Number 315
1DCB configuration 257 Preferences 339, 342
7 Real-time printing of 106, 221, 339
75xx camera reporting at server level 106
Defining 290 Reports 122, 156
79xx encoder Routing 101
Defining 290 Routing to different computers 6
A Setting up alarm instructions 106
Access codes Sound 103, 106
Global 154, 212 Viewing previous alarms 371
Standard 84 Alarm client 221
Access point Alarm comments
Defining 120 Defining 99
Overview of 434 Alarm Controller 360
Access rights Alarm definitions
Assigning 383 Defining 103
Defined in badge design 401 Alarm instructions
Report of 152 Defining 97
Setting up 58 Using the alarm definitions 103
Acknowledge alarm 368 Alarm screen
Acknowledge multiple alarms 370 Appearance 381
ACR 360 Alarm/Event/Ignore classification
Activation code 446 At server 106
Activity Alarms
Current 13, 221 Messages A-D 375
Filter 207 Messages E-M 377
Report 122, 156 Messages N-Z 378
ACU 360 Ancillary
Add Comment screen 373 Definition 316
Administration client 221 Antipassback
Advance/retard clock 354 Enabling/disabling 189
Advanced access titles Overview of 423
Setting up 212 Setting up 219, 232, 241, 257
Advanced reports 127, 131, 135, 139, 143, 147 Approving official
Alarm Defining 187
Acknowledging 368, 370 Mandatory 339
Banner 342 Archiving the log 114
Changing the message text 106 Area occupancy 186
Clearing 368, 370 ASSA ABLOY
Color 103, 106 Adding the DSR 241
Commands 99 Adding the lock 257
Comments configuration report 155 Auxiliary groups
Dial-out/in 222, 239, 240, 428 Configuration report 155
Instructions configuration report 155 Defining 162
Masking 417 Auxiliary output
Messages 375 Changing status of 18, 25
Monitoring alarms 6 Configuration report 155
Node 241 Definition 271

562
Symmetry Software Reference Manual

Finding location of 16 Camera assignment to NVR 309


Switching on via card-relay nodes 219, 241 Car parks 186
Axis camera Card
Defining 289 Activity report 122, 156
Axis IP camera Blocks 188
Defining 292 Bulk amendments 72
B Card & PIN mode 489
Background image (client preferences) 342 Card-only mode 489
Backups 115 Command 58
Badge Details 58
Formats 172 Downloading data to nodes 346
Previewing 389 Enabling issue levels 339
Printing 75, 389 Encoding card number 352
Producing for card holder 58 Format 219, 220
Badge designs 172 Listing 151, 153
Access rights 401 Multiple 469
Barriers 30, 120, 434 Number aliases 188
Baud rates 222 Reading card number 353
Bi-directional chain 222 Setting up and specifying status of 58
Biometric (HGU) node 426 Temporary 469
Biometric template 58 Trigger 58
Bioscrypt enrollment reader 222 Watching use of by registering in card details 58
Bookmarked recording 449 Card commands 361
Building control Card data titles 189, 191
Associated monitor points 268 Card holder
Associated readers 257 Defining 58
Graphic location 16 Exporting details of 113
Status of 18, 25 Importing details of 111
Bulk amendments 72 Locating 71
By Pass Off 257 Number in area 186
Bypass relay operation 257 Report of access rights 152
C Report of details 151
Cable supervision 257, 268 Report of people onsite 124, 157
Call Station Setting up personal data titles 189, 191
Definition (Intercoms) 321 Visitor 64
Camera Card holders by company 339
75xx 290 Card personal data
Associations 312 Defining 192
Axis 289 Cardman encoder 222
Axis IP 292 Card-relay nodes 219, 241, 433
Changing status of 18 Cards
Definition 315 Maximum 241
Displaying on Selected Monitor 53 Cardwatch 58
Group 160 CCTV
ONVIF 298 Alarm commands 99
Pan Overview of 427
tilt Virtual matrix 38
zoom CCTV Ancillary
focus Definition 316
pre-set 30, 53 CCTV camera
Panasonic IP 302 Defining in access point 120
Sony IP 305 Definition 315
Symmetry IP 307 Displaying in Controls screen 30
Tour 38 Displaying on Selected Monitor 53
Usage 427 In Controls option 434
Views 310 Pan

563
Index

tilt Setting up 118


zoom Control point
focus Defining 120
pre-set 30, 53 Overview of 434
Switcher Unit 222 Control points
CCTV Control Input Controlling 30
Definition 317 Controls
CCTV Control Output Control Centers 117, 431
Definition 319 Control Input definition 317
CCTV Monitor Control Intercom definition 318
Definition 317 Control Output definition 319
CCTV switcher 222 Defining 118, 120
Definition 314 Multi-user 117, 431
Chain Overview of 434
Downloading 348 Using 30
Chain Address 241 Current activity screen 13
Chains 222, 231, 232, 236, 351, 464 Customer code 58, 213, 257
Client D
Definition (Intercoms) 320 DANE 219, 241
Client name and type 221 Data
Client ports 222 Backups 115
Client types 221 Exporting 113
Clock Information screen 354 Importing 111
Command Titles (identity verification) 218
Alarm 99 Date 354
Area occupancy 186 Daylight savings 354
Card 58 Debugging 355
Center 18, 25 Device assignment to company 230
Configuration report 155 Dial-In chain 222
List of 394 Dial-out/in alarms 222, 239, 240
Predefined 92 Overview of 428
Sending from graphics 16 Dial-Up 222, 236, 351
Sending to one or more devices 18, 25 Digital video
Command, Role 338 Camera group 160
Commend NVR settings 324
Control Centers 117, 431 Playback 45
Intercom definition 318 Replaying recorded sequence 122
Intput definition 317 Virtual matrix 38
Multi-user systems 117, 431 Directory
Output definition 319 Group 404
Overview of using 434 Link 116
Port definition 222 Settings 404
Comments Directory/LDAP Authentication Module 116, 362, 404
Saving in log 339 Disconnected doors 273
Common areas 164 Disk capacity 339
Communications Door
Debugging 355 Disconnected 273
Communications settings 231 Door (see also Reader)
Company Cable supervision 257
Definition 230 Configuration report 155
Groups 231 Finding location of 16
Selecting 30 Open/closed times 257, 350, 361
Configuration Report of access through 152
Viewing 154 Door Alarm Node Executed 241
Contact number 339 Door, Alarms 405
Control group Downloading data 346, 347, 348

564
Symmetry Software Reference Manual

Duress mode 257 Region definition 325


E Graphic
Elevator node Screen 16
M2100 Cabs 241 Graphics
Email alarms 101, 103, 106 Adding devices to 203
Email profiles 201 Auto display 342
Employee Reference Installing 202
Card definition 58 Using 16
Preferences 339 H
EN-1DBC configuration 257 Hand Geometry Unit (HGU) 58, 222, 426
Encode Cards screen 352 Hardware types 222
Encoder 222 Hardwired chain 222, 231
79xx 290 Help
Encoding smart cards 406 Introduction to 1
EN-DBU 241 Printing 1
Entry point (identity verification) 214 Hisec integration 285
ENVS Holidays
Downloading 348 Configuration report 155
Event Defining 83
Messages 375 Routing of Check dialog 339
Events Home 77
Uploading 351 Hours
Viewing old 371 Defining 78
Executive card 58 I
Exit request Identiry verification
Cable supervision 257 Viewing 68
Relock options 257 Identity verification
Exiting Symmetry 3 Data titles 218
Exporting details 113 View definition 216
Extended card commands 361 Identiy verification
F Entry point defintion 214
Facility code 213 Import Now 111
Filter Importing details 111
Activity 207 Installation Wizard 219
Fingerprint Instructions
Data 429 Setting up alarm instructions 106
Encoding 406 Intercom
Enrollment - S81x readers 447 Group 168
Enrollment - Suprema 446 Intercom Control screen (Stentofon alphacom) 55
Force verification 342 Intercom Screen (Zenitel Pulse) 48
Quality/Quantity/Threshold 334 Intercoms
Quality/Quantity/Threshold - S813 readers 447 Client definition 320
Readers 222 For Controls option 30, 120, 318, 434
Threshold (client preferences) 342 For Stentofon Alphacom system 55, 222
Floor groups For Zenitel Pulse system 48
Configuration report 155 Stations definition 321
Defining 167 Intrusion areas 164
Report of card holders using 152 Intrusion Status toolbar 414
Format of card 220 Intrusion system
Full Screen 77 Changing status of 18
G Definition 275
GEMPLUS encoder 222 Status colors 286
Global Transaction definition 279
Access Code 212 Transactions 279
Access Code Report 154 Upload configuration 283
Connection 326 IP Address 232

565
Index

IP camera Monitor groups


Axis 292 Configuration report 155
Panasonic 302 Monitor point
Sony 305 Alarms report 122, 156
Symmetry 307 Alarms/events 106, 268
Issue level Cable supervision 268
Enabling 339 Changing status of 16, 18, 25
K Configuration report 155
Keycard mode 58, 521 Defaults 219
L Definitions 268
LAN chains 222, 232, 351, 464 Finding location of 16
LAN nodes 241 Groups 163
Language 334, 339 multiNODE-2000 426
Learn mode 241 multiNODE-2100
Licensing Cabs 241
Activation code 446 Elevator node output numbering 271
RDS/Citrix client 357 HGU templates 426
System 356 Multiple alarm acknowledgement 370
Locator screen 71 Multiple cards 58, 469
Lock-out mode 415 Muster
Log Defining 179
Archiving 114 Running 179
Backup 115 Muster, Reset 418
Comments 339 N
Purging 339 NAC file 351
Viewing 467 Name of client 221
Viewing contents of 371 Network LAN chains 222, 232, 351
Logging off Network name 221
Automatic (client preferences) 342 Node
Automatic (system preferences) 339 Alarms (routing of) 101
Logging on 1 Alarms/events 106, 241
Logoff 3 Card-relay 219, 241
Logon Defaults 219
Automatic 342 Definition 241
Cancel button 342 Downloading 347, 348
Command line 339 LAN 232, 241, 464
Invalid Attempts 339 Status 351
Visitor management 339 Version 351
Lost cards Node, Download Priority 349
Registering in card details 58 Notes
M Defining 418
M2150 intrusion areas 164 NVR
M4000 Camera assignment 309
Adding a node 241 Introduction to 366
Maintenance Settings 324
Mode 241, 363 O
Zone 358, 363 Onsite Beyond Limit 158
Manual Door Control 257 Onsite cards report 124, 157
Masked alarms 417 Onsite time report 123, 157
Messages ONVIF camera
Viewing current 13 Defining 298
Viewing old 371 Output Controller 360
Mifare Pegoda encoder 222 Output groups
Modem 232, 236 Configuration report 155
Monitor Defining 167
Definition 317 Report of card holders using 152

566
Symmetry Software Reference Manual

Output point Sounder 542


Overview of 434 Reader groups
Output relays 434 Configuration report 155
P Defining 161
Panasonic IP Camera Report of card holders using 152
Defining 302 Reading smart cards 353
Password Recording types 449
Changing 328 Region defintion 325
Strong 339 Remote sites 236
Use of old 339 Uploading events from 351
Patrol tours Report
Configuration report 155 Advanced 127, 131, 135, 139, 143, 147
Defining 210 Of access rights 152
Starting, holding and resetting 18, 25 Of activity 122, 156
Patrols report 124 Of alarms
PC Door Control 68, 219, 241, 439 events and messages 371
Permissions 440 Of card holder details 151
Personal data Of cards on site 124, 157
Configuration report 155 Of readers 444
Personal details of card holder 58, 189, 191 Of system configuration 155
PIN Of system events 125
Changing 361 Of time spent on site 123, 157
Entry errors causing blocked cards 339 Of visitor details 153
Mode 489 Of who has access through door 152
Setting up 58 Patrols 124
Polling 231, 232 Predefined 127, 131, 135, 139, 143, 147, 443
Ports 231, 236 User audit 123, 156
Defining connections 222 Video Archive Audit 125
Predefined command 92 Report, Onsite Beyond Limit 158
Predefined reports Reports
Creating 443 Configuration report 155
Definition screen 127, 131, 135, 139, 143, 147 Role
Preferences 339, 342 Configuration report 155
Pre-held time 257 Defining 328
Primary bi-directional chain 222 Role, Command 338
Print 3 S
Printing Help 1 Scheduled commands
Privileges 1 Configuration report 155
R Defining 87
Random search 443 Screens
RDS/Citrix client Positions of 339
Licensing 357 Secondary bi-directional chain 222
Read a Card screen 353 Secondary dial-in chain 222
Reader Secure logon 334, 429
Alarms report 122, 156 Serial
Alarms/events 106, 257 Device definition 228
Card Formats 219 Message definition 229
Changing status of 18, 25, 257 Serial Messages
Configuration report 155, 444 Introduction to 412
Defaults 219 Server services 364
Definitions 257 Service Monitor 364
Finding location of 16 Services 364
Interfaces 219 SetMSS1 utility 232
LED 541 Setup (Configuration) Listings 155
Modes 257 Shared floor/output group 171
Port 257 Defining 171

567
Index

Shared reader group Defining 80


Defining 169 Timing diagrams 257
Signature pad 58, 222 Toggle mode 257
Smart card Toolbar
Encoding 406 Customizing 4
Fingerprint data 429 Intrusion 414
HGU data 426 Traffic lights 30, 120, 434
Reading 353 Transactions
Smart card encoder 222 Report of 122, 156
Smart card reader 222 Viewing last 58
Smart card writer 222 Trigger 58
Sony IP Camera Card 58
Defining 305 Trigger commands
Standard recording 449 Configuration report 155
Starting Symmetry 1 Defining 93
Status colors 286 Troubleshooting 346
Status inputs 434 Cards not functioning 346
Status of comms 355 Two-card timeout 257
Status of devices 18, 25 U
Stentofon Alphacom Intercom System 55, 222, 320, Upgrade Manager 351
321 Uploading events from remote sites 351
Suprema fingerprint reader 446 User
Switcher Report 156
Definition 314 User account
Switcher unit Setting up 334
Alarms 315 User audit
Ancillary definition 316 Report 123
Camera definition 315 User code & PIN mode 554
COM port 222 User code mode 554
Monitor definition 317 User interface 1
Overview of 427 Users
Symmetry Configuration report 155
Starting 1 V
Symmetry IP Camera Vacations 58
Defining 307 Video Archive Audit 125
System Video playback 45
Alarms/events 106 Video status 57
Licensing 356 View (identity verification) 216
Reports 125 Views (camera) 310
System 3000 card-block data 348 Virtual matrix 38
System Admin privileges 328 Visitor
System log Deactivating 257, 437
Viewing 467 Defining 64
T Escort mandatory 339
Tagged recording 449 Locating 71
Tasks Overview of Visitor Management 437
Setting up 34 Report of details 153
Telephone links 232, 236 Visitor personal data
Temporary card 469 Defining 193
Threat level W
Changing 29 Wildcards 472
Commands 450 Window Options 3
Configuring 209 With chains client 221
Time 354 Workflow
Time code Alarm conditions 473
Configuration report 155 Designer 194

568
Symmetry Software Reference Manual

Z Zone
Zenitel Pulse 48 Maintenance 358, 363
Zenitel Pulse Intercom System 320, 321

569

You might also like