Configure event monitoring windows, Naming event monitoring windows – Keri Systems Doors16 User Manual

Page 118

Advertising
background image

Doors™ Users Guide

Keri Systems, Inc.

October 1998

01821-001

Page 118

Revision 2.1

2.

To disable auto-collection, click on the box beside the "Auto-collection if buffer full
warning" message. When the box does not have a check mark, auto-collection is disabled
(see Figure 100).

3.

Click on the

button. If the auto-collection information is not saved before

clicking any other button or exiting the setup monitor window, the data entered is lost and
must be re-entered.

4.

Now update the access control network with the new information. Click on the

button on the tool bar (for details on the update process refer to the Update the Network
section found later in this users guide).

NOTE: Even with auto-collection enabled, it is possible (but unlikely) to lose events during
the upload process if new events are recorded by the controller faster than it can upload
existing events to the host computer. To prevent this, change the controller Threshold
Percentage value from its default of 80% to a lower value (see the Set the Dial-Out Threshold
Percentage section in this users guide).

NOTE: When a controller dials the host computer to upload the contents of its buffer, it will
only try to dial-out once. If it is not successful in making the connection with the host
computer, it will not try again. It will wait for the next time the host computer connects with
the controller and then will upload the contents of its buffer. If the buffer has filled prior to
the host comptuer making contact with the controller, the oldest events in the buffer may be
lost as the newest events overwrite the oldest events.

Configure Event Monitoring Windows

Event monitoring allow an operator to configure up to three windows which display filtered,
real-time events occurring on the access control system. This allows an operator to create
custom monitoring windows, each dedicated to monitoring specific types of events.
There are two processes involved in configuring event windows: naming the windows and
assigning the events to be tracked by the windows.

Naming Event Monitoring Windows

The View One Name, View Two Name, and View Three Name fields allow an operator to
assign a descriptive name of up to 32 characters for each of the three monitor screens. In this
example, the view three name field will be named for monitoring door access events.

1.

Click in the View Three Name field.

2.

Delete the MONITOR VIEW 3 name in the field (use any combination of backspaces,
deletes, and highlighting and deleting to clear the text out of the field).

3.

Type Door Access Events. The resulting window should look similar to Figure 101.

Advertising