AMAG SYMMETRY MANUAL PDF

Applying the License Key In order to add the license key to your symmetry system, go to Maintenance tab and select System Licensing. Select Add and enter your license key information. Once the license has been applied, restart Symmetry to configure the new options. Set the Import Database Scan Period to as often as you would like Symmetry to scan for newly imported transaction records. Select OK.

Author:Tasho Mauzahn
Country:Bahrain
Language:English (Spanish)
Genre:Personal Growth
Published (Last):26 September 2013
Pages:437
PDF File Size:14.15 Mb
ePub File Size:12.30 Mb
ISBN:402-6-15384-527-3
Downloads:28905
Price:Free* [*Free Regsitration Required]
Uploader:Kilkree



The intercoms are normally sited outside the building, such as at doors, parking barriers and other entrances. Typically, the intercoms are used by visitors or other personnel to request entry. The software is a fully-integrated component of the SMS software. It enables operators to respond to calls using the same user interface used to manage other forms of security, such as access control, intrusion and video monitoring.

This enhances operator efficiency by avoiding the need to learn and operate different systems. An incoming call is indicated by the appropriate intercom button flashing with a colored border, and by a sound, which can be different for each intercom.

The screen lists all outstanding call requests in a list box on the right-hand side of the screen. This allows the system to be used in busy environments where many incoming call requests may be made at the same time. Figure 1: Intercom Control Screen The integrated features of the software enable the operator to control other security devices while responding to a call.

For example, when answering a call, the operator is able to unlock a door, barrier or other device by clicking the Command button. Historical reporting of calls is fully integrated with the reporting features provided with the main SMS software. This allows reports of call activity to be included in reports of other security management activity. Trigger commands may, for example, be used to start a tagged CCTV recording. Figure 5 shows an example.

Here are some examples: Standardized user interface — Call requests can be managed using the same SMS software that is used to manage other forms of security, such as access control, intrusion and video monitoring. This simplifies system operation, reduces training costs and improves efficiency. Integrated control of other SMS devices — In response to calls, operators are able to unlock doors and barriers or operate other security devices connected to the security management system.

Automated control — Trigger commands can be set up to provide automatic responses to call requests. For example, a tagged CCTV recording could start when a call request is received. Standardized reporting — Call activity can be reported using the same screens and report layouts used for other security activity reporting.

Easy management of busy sites — Multiple calls from different locations can be easily managed from a single screen. A dedicated Intercom Control screen displays and prioritizes all call requests. Call handling from Graphics — Operators can respond to calls from a plan, picture or map of the site.

The following description is for version You need to specify the settings that will enable the Stentofon system to communicate with the SMS Software. Click the Serial Ports button. In this example TCP port number is used. If you are using a serial link, this must be the client that the Stentofon system is physically connected to.

If a serial link is used, specify the COM port that the Stentofon system is connected to in the Port menu, and choose Intercom System in the Allocation menu.

There can be only one intercom system per SMS installation. Specify the static IP address of the Stentofon system, and the Port Number, as specified when setting up the communication settings in AlphaPro. Each client must be sited next to an intercom to enable the user to communicate with callers. In Station Number, enter the number known to the intercom control unit that identifies the intercom being used at the client.

Each intercom port on the Stentofon system has a station number. Select Show as a Call Station if you want other intercom clients to make calls to this client, or if you want to set up trigger commands triggered by calls from this client.

Typically, these are located at entrances, delivery points, parking barriers, etc. The intercom may have been set up to provide a specific ID, or the ID may be dependent on the button pushed. All other call requests will be ignored. Command This enables you to associate a command with the intercom.

There are two types of command: Pulse output - Switches on the auxiliary output selected in the menu to the right for a predefined period of time as specified by the installer , then switches it off. Grant Access - Performs the same action as a valid access-control transaction at the reader selected in the menu to the right i. Associated Sound If required, use the Browse button to select a sound.

This may be useful if, for example, you want to start a recording when a call request button is pressed. A call request is started when a call request button is pressed at an intercom, typically by visitors or other personnel who require access to the building. After speaking with the caller, you can press a Command button, which can perform an action such as opening a door or barrier.

The screen can also be used to speak with people at other intercoms around the building, even if no call request has been received.

The following illustration shows the key features of the Intercom Control screen. Figure 13 Receiving Call Requests When a call request is received from an intercom, it is listed in the Requests area on the right of the screen, and the corresponding button changes to the following with a flashing pale blue border: The Requests area can list multiple call requests.

The call requests are listed in order of receipt, with the oldest at the top. Each intercom can be associated with a different sound, and the sound played is always the one associated with the call request at the top of the list. Answering Call Requests When a call request is received, you can choose to open a line between the intercom located at your PC and the intercom from which the call request was made. You can answer a call request as follows: 1. Press the intercom button with the pale blue border , or select the call request from the Requests list and click the Connect button.

Clicking Connect without selecting a call request connects to the first in the list. It is not possible for more than one user to connect to the same intercom at the same time. If you have to wait to connect to the intercom e. When a successful connection is made, the button changes to the following orange border : 4. Speak with the person at the intercom. Pressing the button sends the command.

Typically, the command is used to open a door or barrier for the caller. When you want to terminate the conversation, click the button shown above or choose Connect again.

The call request is removed from the list, and the button changes to display the default icon. Calling Other Intercoms You can open a line to any intercom simply by clicking on the button associated with the intercom you want to connect to, even if no call request has been received. Once a successful connection is made, the button of the intercom you are using if shown is displayed as follows and the one you are connecting to is displayed with an orange border. If the intercom has been associated with a command, the Command button is enabled while you are connected to it.

You can terminate the call simply by clicking the button again or another button. Note: Any two intercoms currently communicating are indicated with the above button icon. This enables you to determine which intercoms are currently in use. Answering Calls from the Acknowledge Alarm Screen The Connect button is displayed when acknowledging an alarm if an intercom has generated a Call Request alarm.

You can use Connect to start an audio link between your intercom and the intercom making the call request. When you click Connect, the button name changes to Disconnect, which allows you to disconnect the link. The link is automatically disconnected when you close the Acknowledge Alarm screen. The following icon is used: The border of the icon flashes in pale blue when a call request is received.

Right-clicking the icon and selecting Connect opens the audio link to the intercom and the color changes to orange flashing. Choose All if you want to include the alarms and events, no matter which intercom they relate to. Choose an intercom or group if you want to include alarms and events only if they have been produced from the specified intercom or an intercom in the group.

HOSPITAL BYLAWS RUMAH SAKIT PDF

AMAG Access Control and Security Management System

Symmetry solutions range from two doors to enterprise systems and provide flexibility, scalability and performance. Symmetry is an open system that merges access control with video, intrusion, identity management, visitor management and audio, plus countless additional technologies. Symmetry provides a single security management system that will adapt to your environment and meet your security needs. Customers can take advantage of mobile apps that allow users to manage their video from a mobile device. It ensures that only individuals with agreed approvals and requirements have access to secure areas, ensuring you meet compliance requirements.

EFECTO CITOPATICO DE LOS VIRUS PDF

Locks Installation And User Guide AMAG Symmetry V8 Manual Software Issue 8.0.1

.

Related Articles