12.07.2015 Views

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Lock Programming Devices CyberLock Programmer, USB CyberLock Programmer, GrandMaster CyberKey, and a standard user key if so configured.Serial Cablex A custom cable that is used to update LAN Authorizer firmware. The LANAuthorizer interface is a telephone jack connector (RJ-11). The PC interface is available in either9-pin or 25-pin serial connectors. Pin-out specifications are available on request.Sounds, KeyAlarm or Siren, single beep, triple beep, short buzz or chatter, long buzz or chatter.USB Station - A communicator which attaches to a computers USB port. It uses the CyberLinkapplication to communicate with the CyberAudit?Web server, and can also be used as a chargingstation for rechargeable CyberKeys.Web Authorizer - An Authorizer which communicates using secure HTTP to CyberAudit-Web at100MbS, can use DHCP to obtain an IP address, and can communicate with the CyberAudit?Webserver over the Internet.SoftwareAccess Matrix - The CyberAudit-Web Access Matrix displays the People and CyberLocks in thesystem and facilitates granting access. It lists People and people tags vertically. CyberLocks andtheir tags are listed horizontally.Administrator Administrators are those who may log in to CyberAudit-Web, view audit trails orother administrators activities, or make changes to components in the system.Administrator Permissions Permissions control functions of the CyberAudit-Web available tothat node. Each permission shown corresponds to a function in the program.Communicators Communicators are the devices by which CyberKeys and CyberLocks aredownloaded and programmed. The categories of Communicators includes Authorizers, PortableLinks, Stations, and Vaults.CyberLink A Java client application that enables using an IR Encoder. USB Station, or aCyberKey II with CyberAudit-Web. It is also used to set up the networking on Web Stations andSingle CyberKey Vaults and can be used with the CyberAudit RFID Reader to capture the ID ofthe cards.Disabling Point A lock that has one or more CyberKey IDs in its lost key list. Keys in the list willbe disabled upon contact. They will cease to work in any lock until reprogrammed as a non-lostkey.Emergency Key A key that has been granted temporary access to all locks in a subsystem by aGrand Master key. Temporary access time ranges include 1 to 64 minutes, 1 to 24 hours or 1 to127 days.IR Encoder A custom USB to Infrared adapter made to use with CyberKeys. An IR Encoderfunctions with the CyberLink software. Unlike an IrDA adapter, the IR Encoder shows up as aremoveable drive on both Windows and Mac OSX systems.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!