30.01.2015 Views

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

Picture Perfect 4.6 User Manual - UTCFS Global Security Products

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 2<br />

Getting started<br />

17<br />

Table 5.<br />

Monitors Menu (continued)<br />

Sub-Menu<br />

Performance<br />

Log<br />

Tour<br />

Function<br />

A monitor used to view server system performance.<br />

A real time monitor that lists the contents of the <strong>Picture</strong> <strong>Perfect</strong> log file, /cas/log/log.mmdd where<br />

mmdd is the current month and day.<br />

Example: /cas/log/log.1105 for the log file for November 5th<br />

If you have the optional Guard Tours package, this monitor displays tour activity.<br />

Table 6.<br />

Configuration Menu<br />

Sub-Menu<br />

Facilities<br />

Function<br />

An application used to create and edit Facility records that group your database records into meaningful<br />

units.<br />

Micros Micros An application used to create and edit Micro records to identify each micro controller<br />

and define how it operates and communicates.<br />

Inputs<br />

Outputs<br />

Ports<br />

Modems<br />

Network Ports<br />

Keys<br />

Input Groups<br />

Inputs<br />

Output Groups<br />

Outputs<br />

Input Group<br />

Events<br />

Output Group<br />

Events<br />

An application used to create and edit Port records to define serial ports for micro<br />

controller communications.<br />

An application used to create and edit Modem records to define the types of modems<br />

that you intend to use for dial-up communication.<br />

An application used to create and edit Network Port records to define ports for network<br />

micro controller communication.<br />

An application used to secure transmission between the host and the network micro by<br />

means of a key to create an encryption pattern.<br />

An application used to create and edit Input Group records to trigger output groups<br />

when any individual inputs in the input group are detected.<br />

An application used to create and edit Input records to define the characteristics and the<br />

purpose of each input point.<br />

An application used to create and edit Output Group records to which individual outputs<br />

can be assigned. When an input group triggers an output group, all outputs assigned to<br />

the group activate.<br />

An application used to create and edit Output records to define the characteristics and<br />

the purpose of each output point.<br />

An application used to create and edit Input Group Event records to enable or disable a<br />

specific input group and/or to change its state to off according to a schedule.<br />

An application used to create and edit Output Group Event records to enable or disable<br />

a specific output group and/or to change its state to off according to a schedule.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!