Arm/disarm an intrusion zone – GE v6 User Manual

Page 108

Advertising
background image

Secure Perfect 6.1.1 User Manual

106

database. The data will be appended to the archive database until you decide the archive database has
grown too large.
The factors in determining whether the archive database is too large can be:

The size of your hard drive.

The performance you receive when running history reports.

The length of time you need to keep data.

Other factors specifically related to your installation.

To remove data from the archive database:

1. BACK UP YOUR SECURE PERFECT ARCHIVE DATABASE! You will have to back up the Secure

Perfect Archive database using utilities provided by SQL Server 2000 or by using the Secure
Perfect Maintenance Utility. After you perform the backup, label and store the media in a safe
place.

If you do not back up the SecurePerfectArchive, you will lose all the data stored in it.

2. Select

the

Administration menu, then Parameters.The Parameter Form opens with the Settings

tab displayed.

3. Select

the

Clear Archive tab. The Earliest Date in Archive DB and Latest Date in Archive DB

fields will indicate dates once you have clicked the Show Date button. If you do not have any
records in your archive database, the two date fields will state

No Record

.

4. Choose

the

Start Date of the data that you want to remove from your archive database by

selecting the month, then the day to begin your archive.

5. Choose

the

End Date of the data that you want to remove from your archive database by selecting

the month, then the day to end your archive.

6. Click

Delete.

7. Click

OK.

The deletion of an archive database is taking place in the background. Progress is indicated on

the status bar in the lower right side of the screen. The process may take hours to complete. The
length of time is dependent on the size of the archive database and the hardware components of
your computer.

8. Upon completion, a message displays: The records from the Archive database has been

successfully deleted! Click OK.

Arm/Disarm an Intrusion Zone

Arm/Disarm an Intrusion Zone Using Access Rights
Any card and keypad reader or keypad within a defined zone can be used to arm and disarm the zone
with a valid access right for the reader and an Intrusion Zone assigned.

Click the Show me icon to view a step-by-step animated demo.

Arm = * 1 # followed by a valid card read.

If all alarm points are reset (not in an active state of alarm) and all doors closed, then all
readers are placed offline (doors locked) and alarm points are monitored on. The
corresponding Digital Output is fired as selected on the Intrusion Zone Form.

When the zone is successfully armed, all readers in the zone provide visual indication that
the zone is armed.

We recommend using CASI brand readers, configured to display the PIN light ON or

flashing, depending on the selected reader model. A Zone armed transaction is generated
and displays on the Activity Monitor Form.

When a zone is not successfully armed due to an invalid zone configuration on the Access
Right Form, an Arm/Disarm Failed, Invalid Access Right transaction is generated.

If any alarm points are set (in an active state of alarm) or a door is open, the zone does not
become armed. An Arm/disarm Failed Zone not secure transaction is generated and
displayed on the Activity Monitor Form.

Advertising