12.07.2015 Views

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Special Event ActionsTable 7-2: Paging/Email <strong>Configuration</strong> Activities and ScreensTask <strong>Configuration</strong> Dialog Box Description1. Create Variables Options>SystemVariables>Paging (Tab)• Identifies either a direct connect or modem paging service• Identifies the server used to send email2. Configure theHardware/PagingCarrierHardware>Paging Carriers>New/Edit>Carrier• Defines the paging carrier service and puts it online• Defines paging service connection information (direct,modem, telephone number, internet)3. Define Recipient Configure>Recipient>New/Edit>Recipient4. Configure Message Configure>Page Message>New/Edit>Page Message• Defines the recipient and puts it online• Defines the pin/carrier used for this recipient• Defines the email address for this recipient• Defines a paging message and puts it online• Defines text and options for the message• Identifies the recipient of the messageLocal ActionsLocal actions are C• CURE <strong>800</strong>/<strong>800</strong>0 actions that operate on the securitydevice that activated the event rather than on a specific target. Events that uselocal actions are always activated by keypad commands, and are availableonly on iSTAR configurations.Local actions are currently available for intrusion zones and for doors. Eventsthat initiate local actions must be activated from an RM keypad on the door,or on a door that is part of an intrusion zone.Local Actions and Intrusion ZonesLocal actions are frequently used in intrusion zones, because they allow youto use the same event to control any zone. For example, a keypad commandthat initiates a local action to disarm an intrusion zone can be used by guardsto disarm any zone within a building, so long as the security personnel entersthe command from the reader on a door that is in the intrusion zone.7–16 C•CURE <strong>800</strong>/<strong>800</strong>0 <strong>Software</strong> <strong>Configuration</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!