12.07.2015 Views

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

C•CURE 800/8000 Software Configuration Guide - Tyco Security ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring Arm and Disarm (iSTAR Zones)Card ControlYou can configure iSTAR intrusion zones to arm and disarm on presentationof a valid card and required inputs. You can also used keypad command. Youcan restrict access by requiring:• Cards with a specific clearance• Card with a specific clearance and in a specific personnel group.Disarm OptionsUse the Card Method used to disarm drop-down arrow on the DisarmingTab to specify card control disarm options.Table 12-5: Card Control Disarming OptionsDisarm OptionNoneValid card onlyActive input and valid cardDescriptionNo card action necessary. Typically select to disarm with anevent.Present a valid card.Press active input (such as a key activated switch) and validcard.Arm OptionsUse the Card method used to arm drop-down arrow on the Arming Tab tospecify card control arm options.Table 12-6: Card Control Arming OptionsArm OptionNoneKeypress and valid cardActive input and valid cardDescriptionNo card action necessary. Typically selected to arm with anevent.Press CMD/ENT twice, followed by a valid card.Press active input (such as a key activated switch) and validcard.C•CURE <strong>800</strong>/<strong>800</strong>0 <strong>Software</strong> <strong>Configuration</strong> <strong>Guide</strong> 12–15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!